]> git.ipfire.org Git - people/stevee/selinux-policy.git/blame - refpolicy/policy/modules/admin/netutils.te
move old strict, targeted, and mls policies to archive
[people/stevee/selinux-policy.git] / refpolicy / policy / modules / admin / netutils.te
CommitLineData
4fc91539 1
0e1c461e 2policy_module(netutils,1.1.2)
4fc91539
CP
3
4########################################
5#
6# Declarations
7#
8
9type netutils_t;
10type netutils_exec_t;
c9428d33 11init_system_domain(netutils_t,netutils_exec_t)
4fc91539
CP
12role system_r types netutils_t;
13
14type netutils_tmp_t;
c9428d33 15files_tmp_file(netutils_tmp_t)
4fc91539 16
493d6c4a 17type ping_t;
4fc91539 18type ping_exec_t;
c9428d33 19init_system_domain(ping_t,ping_exec_t)
4fc91539
CP
20role system_r types ping_t;
21
493d6c4a 22type traceroute_t;
4fc91539 23type traceroute_exec_t;
c9428d33 24init_system_domain(traceroute_t,traceroute_exec_t)
4fc91539
CP
25role system_r types traceroute_t;
26
4fc91539
CP
27########################################
28#
29# Netutils local policy
30#
31
32# Perform network administration operations and have raw access to the network.
33allow netutils_t self:capability { net_admin net_raw setuid setgid };
34allow netutils_t self:process { sigkill sigstop signull signal };
35allow netutils_t self:netlink_route_socket { bind create getattr nlmsg_read nlmsg_write read write };
dc67f782
CP
36allow netutils_t self:packet_socket create_socket_perms;
37allow netutils_t self:udp_socket create_socket_perms;
2e0a8801 38allow netutils_t self:tcp_socket create_stream_socket_perms;
4fc91539 39
dc67f782
CP
40allow netutils_t netutils_tmp_t:dir create_dir_perms;
41allow netutils_t netutils_tmp_t:file create_file_perms;
103fe280 42files_tmp_filetrans(netutils_t, netutils_tmp_t, { file dir })
4fc91539 43
b24f35d8
CP
44kernel_search_proc(netutils_t)
45
0fd9dc55
CP
46corenet_tcp_sendrecv_all_if(netutils_t)
47corenet_raw_sendrecv_all_if(netutils_t)
48corenet_udp_sendrecv_all_if(netutils_t)
49corenet_tcp_sendrecv_all_nodes(netutils_t)
50corenet_raw_sendrecv_all_nodes(netutils_t)
51corenet_udp_sendrecv_all_nodes(netutils_t)
52corenet_tcp_sendrecv_all_ports(netutils_t)
53corenet_udp_sendrecv_all_ports(netutils_t)
bd70373d 54corenet_non_ipsec_sendrecv(netutils_t)
0fd9dc55
CP
55corenet_tcp_bind_all_nodes(netutils_t)
56corenet_udp_bind_all_nodes(netutils_t)
0907bda1 57corenet_tcp_connect_all_ports(netutils_t)
0fd9dc55
CP
58
59fs_getattr_xattr_fs(netutils_t)
4fc91539 60
15722ec9 61domain_use_interactive_fds(netutils_t)
4fc91539 62
8fd36732 63files_read_etc_files(netutils_t)
4fc91539 64# for nscd
c9428d33 65files_dontaudit_search_var(netutils_t)
4fc91539 66
1c1ac67f 67init_use_fds(netutils_t)
1815bad1 68init_use_script_ptys(netutils_t)
ab940a4c 69
c9428d33
CP
70libs_use_ld_so(netutils_t)
71libs_use_shared_libs(netutils_t)
4fc91539 72
c9428d33 73logging_send_syslog_msg(netutils_t)
4fc91539
CP
74
75miscfiles_read_localization(netutils_t)
76
d1b9d922
CP
77sysnet_read_config(netutils_t)
78
15722ec9 79userdom_use_all_users_fds(netutils_t)
4fc91539 80
d1b9d922 81ifdef(`targeted_policy',`
1815bad1
CP
82 term_use_generic_ptys(netutils_t)
83 term_use_unallocated_ttys(netutils_t)
d1b9d922
CP
84')
85
bb7170f6 86optional_policy(`
ab940a4c
CP
87 nis_use_ypbind(netutils_t)
88')
4fc91539 89
4fc91539
CP
90########################################
91#
92# Ping local policy
93#
94
8f882ffc 95allow ping_t self:capability { setuid net_raw };
4fc91539
CP
96dontaudit ping_t self:capability sys_tty_config;
97
dc67f782
CP
98allow ping_t self:tcp_socket create_socket_perms;
99allow ping_t self:udp_socket create_socket_perms;
4fc91539 100allow ping_t self:rawip_socket { create ioctl read write bind getopt setopt };
0e1c461e 101allow ping_t self:packet_socket { create ioctl read write bind getopt setopt };
4fc91539 102
0fd9dc55
CP
103corenet_tcp_sendrecv_all_if(ping_t)
104corenet_udp_sendrecv_all_if(ping_t)
105corenet_raw_sendrecv_all_if(ping_t)
106corenet_raw_sendrecv_all_nodes(ping_t)
107corenet_tcp_sendrecv_all_nodes(ping_t)
108corenet_udp_sendrecv_all_nodes(ping_t)
109corenet_tcp_sendrecv_all_ports(ping_t)
110corenet_udp_sendrecv_all_ports(ping_t)
bd70373d 111corenet_non_ipsec_sendrecv(ping_t)
0fd9dc55
CP
112corenet_udp_bind_all_nodes(ping_t)
113corenet_tcp_bind_all_nodes(ping_t)
4fc91539 114
0fd9dc55 115fs_dontaudit_getattr_xattr_fs(ping_t)
4fc91539 116
15722ec9 117domain_use_interactive_fds(ping_t)
4fc91539 118
8fd36732 119files_read_etc_files(ping_t)
c9428d33 120files_dontaudit_search_var(ping_t)
4fc91539 121
c9428d33
CP
122libs_use_ld_so(ping_t)
123libs_use_shared_libs(ping_t)
4fc91539 124
c9428d33 125sysnet_read_config(ping_t)
98a8ead4 126sysnet_dns_name_resolve(ping_t)
4fc91539 127
c9428d33 128logging_send_syslog_msg(ping_t)
4fc91539 129
cf6a7d89 130ifdef(`hide_broken_symptoms',`
1c1ac67f 131 init_dontaudit_use_fds(ping_t)
cf6a7d89
CP
132')
133
134ifdef(`targeted_policy',`
1815bad1
CP
135 term_use_unallocated_ttys(ping_t)
136 term_use_generic_ptys(ping_t)
0fd9dc55
CP
137 term_use_all_user_ttys(ping_t)
138 term_use_all_user_ptys(ping_t)
cf6a7d89
CP
139',`
140 tunable_policy(`user_ping',`
141 term_use_all_user_ttys(ping_t)
142 term_use_all_user_ptys(ping_t)
143 ')
3eed1090 144')
4fc91539 145
bb7170f6 146optional_policy(`
ab940a4c
CP
147 nis_use_ypbind(ping_t)
148')
4fc91539 149
bb7170f6 150optional_policy(`
1815bad1 151 nscd_socket_use(ping_t)
493d6c4a
CP
152')
153
bb7170f6 154optional_policy(`
15722ec9 155 pcmcia_use_cardmgr_fds(ping_t)
cf6a7d89
CP
156')
157
bb7170f6 158optional_policy(`
1c1ac67f 159 hotplug_use_fds(ping_t)
ebdc3b79
CP
160')
161
4fc91539
CP
162########################################
163#
164# Traceroute local policy
165#
166
167allow traceroute_t self:capability { net_admin net_raw setuid setgid };
dc67f782
CP
168allow traceroute_t self:rawip_socket create_socket_perms;
169allow traceroute_t self:packet_socket create_socket_perms;
4fc91539 170allow traceroute_t self:netlink_route_socket { bind create getattr nlmsg_read read write };
8f882ffc 171allow traceroute_t self:udp_socket create_socket_perms;
4fc91539
CP
172
173kernel_read_system_state(traceroute_t)
174kernel_read_network_state(traceroute_t)
175
0fd9dc55
CP
176corenet_tcp_sendrecv_all_if(traceroute_t)
177corenet_udp_sendrecv_all_if(traceroute_t)
178corenet_raw_sendrecv_all_if(traceroute_t)
179corenet_raw_sendrecv_all_nodes(traceroute_t)
180corenet_tcp_sendrecv_all_nodes(traceroute_t)
181corenet_udp_sendrecv_all_nodes(traceroute_t)
182corenet_tcp_sendrecv_all_ports(traceroute_t)
183corenet_udp_sendrecv_all_ports(traceroute_t)
bd70373d 184corenet_non_ipsec_sendrecv(traceroute_t)
0fd9dc55
CP
185corenet_udp_bind_all_nodes(traceroute_t)
186corenet_tcp_bind_all_nodes(traceroute_t)
8f882ffc
DM
187# traceroute needs this but not tracepath
188corenet_raw_bind_all_nodes(traceroute_t)
2705f9a0 189corenet_tcp_connect_all_ports(traceroute_t)
4fc91539 190
0fd9dc55 191fs_dontaudit_getattr_xattr_fs(traceroute_t)
4fc91539 192
15722ec9 193domain_use_interactive_fds(traceroute_t)
4fc91539 194
8fd36732 195files_read_etc_files(traceroute_t)
c9428d33 196files_dontaudit_search_var(traceroute_t)
4fc91539 197
c9428d33
CP
198libs_use_ld_so(traceroute_t)
199libs_use_shared_libs(traceroute_t)
4fc91539 200
c9428d33 201logging_send_syslog_msg(traceroute_t)
4fc91539
CP
202
203miscfiles_read_localization(traceroute_t)
204
205#rules needed for nmap
f0c985ca
KM
206dev_read_rand(traceroute_t)
207dev_read_urand(traceroute_t)
c9428d33 208files_read_usr_files(traceroute_t)
4fc91539 209
8f882ffc
DM
210sysnet_read_config(traceroute_t)
211
212ifdef(`targeted_policy',`
1815bad1
CP
213 term_use_unallocated_ttys(traceroute_t)
214 term_use_generic_ptys(traceroute_t)
8f882ffc
DM
215')
216
3eed1090 217tunable_policy(`user_ping',`
0fd9dc55
CP
218 term_use_all_user_ttys(traceroute_t)
219 term_use_all_user_ptys(traceroute_t)
3eed1090 220')
4fc91539 221
bb7170f6 222optional_policy(`
ab940a4c
CP
223 nis_use_ypbind(traceroute_t)
224')
4fc91539 225
bb7170f6 226optional_policy(`
1815bad1 227 nscd_socket_use(traceroute_t)
493d6c4a 228')