]> git.ipfire.org Git - people/stevee/selinux-policy.git/blob - policy/modules/services/radius.te
Module version bump for c17ad38 5271920 2a2b6a7 01c4413 c4fbfae a831710
[people/stevee/selinux-policy.git] / policy / modules / services / radius.te
1 policy_module(radius, 1.11.0)
2
3 ########################################
4 #
5 # Declarations
6 #
7
8 type radiusd_t;
9 type radiusd_exec_t;
10 init_daemon_domain(radiusd_t, radiusd_exec_t)
11
12 type radiusd_etc_t;
13 files_config_file(radiusd_etc_t)
14
15 type radiusd_etc_rw_t;
16 files_type(radiusd_etc_rw_t)
17
18 type radiusd_initrc_exec_t;
19 init_script_file(radiusd_initrc_exec_t)
20
21 type radiusd_log_t;
22 logging_log_file(radiusd_log_t)
23
24 type radiusd_var_lib_t;
25 files_type(radiusd_var_lib_t)
26
27 type radiusd_var_run_t;
28 files_pid_file(radiusd_var_run_t)
29
30 ########################################
31 #
32 # Local policy
33 #
34
35 # fsetid is for gzip which needs it when run from scripts
36 # gzip also needs chown access to preserve GID for radwtmp files
37 allow radiusd_t self:capability { chown dac_override fsetid kill setgid setuid sys_resource sys_tty_config };
38 dontaudit radiusd_t self:capability sys_tty_config;
39 allow radiusd_t self:process { getsched setsched sigkill signal };
40 allow radiusd_t self:fifo_file rw_fifo_file_perms;
41 allow radiusd_t self:unix_stream_socket create_stream_socket_perms;
42 allow radiusd_t self:tcp_socket create_stream_socket_perms;
43 allow radiusd_t self:udp_socket create_socket_perms;
44
45 allow radiusd_t radiusd_etc_t:dir list_dir_perms;
46 read_files_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_t)
47 read_lnk_files_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_t)
48 files_search_etc(radiusd_t)
49
50 manage_dirs_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
51 manage_files_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
52 manage_lnk_files_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
53 filetrans_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_rw_t, { dir file lnk_file })
54
55 manage_dirs_pattern(radiusd_t, radiusd_log_t, radiusd_log_t)
56 manage_files_pattern(radiusd_t, radiusd_log_t, radiusd_log_t)
57 logging_log_filetrans(radiusd_t, radiusd_log_t,{ file dir })
58
59 manage_files_pattern(radiusd_t, radiusd_var_lib_t, radiusd_var_lib_t)
60
61 manage_sock_files_pattern(radiusd_t, radiusd_var_run_t, radiusd_var_run_t)
62 manage_files_pattern(radiusd_t, radiusd_var_run_t, radiusd_var_run_t)
63 files_pid_filetrans(radiusd_t, radiusd_var_run_t, { file sock_file })
64
65 kernel_read_kernel_sysctls(radiusd_t)
66 kernel_read_system_state(radiusd_t)
67
68 corenet_all_recvfrom_unlabeled(radiusd_t)
69 corenet_all_recvfrom_netlabel(radiusd_t)
70 corenet_tcp_sendrecv_generic_if(radiusd_t)
71 corenet_udp_sendrecv_generic_if(radiusd_t)
72 corenet_tcp_sendrecv_generic_node(radiusd_t)
73 corenet_udp_sendrecv_generic_node(radiusd_t)
74 corenet_tcp_sendrecv_all_ports(radiusd_t)
75 corenet_udp_sendrecv_all_ports(radiusd_t)
76 corenet_udp_bind_generic_node(radiusd_t)
77 corenet_udp_bind_radacct_port(radiusd_t)
78 corenet_udp_bind_radius_port(radiusd_t)
79 corenet_tcp_connect_mysqld_port(radiusd_t)
80 corenet_tcp_connect_snmp_port(radiusd_t)
81 corenet_sendrecv_radius_server_packets(radiusd_t)
82 corenet_sendrecv_radacct_server_packets(radiusd_t)
83 corenet_sendrecv_mysqld_client_packets(radiusd_t)
84 corenet_sendrecv_snmp_client_packets(radiusd_t)
85 # for RADIUS proxy port
86 corenet_udp_bind_generic_port(radiusd_t)
87 corenet_dontaudit_udp_bind_all_ports(radiusd_t)
88 corenet_sendrecv_generic_server_packets(radiusd_t)
89
90 dev_read_sysfs(radiusd_t)
91
92 fs_getattr_all_fs(radiusd_t)
93 fs_search_auto_mountpoints(radiusd_t)
94
95 corecmd_exec_bin(radiusd_t)
96 corecmd_exec_shell(radiusd_t)
97
98 domain_use_interactive_fds(radiusd_t)
99
100 files_read_usr_files(radiusd_t)
101 files_read_etc_files(radiusd_t)
102 files_read_etc_runtime_files(radiusd_t)
103
104 auth_use_nsswitch(radiusd_t)
105 auth_read_shadow(radiusd_t)
106 auth_domtrans_chk_passwd(radiusd_t)
107
108 libs_exec_lib_files(radiusd_t)
109
110 logging_send_syslog_msg(radiusd_t)
111
112 miscfiles_read_localization(radiusd_t)
113 miscfiles_read_generic_certs(radiusd_t)
114
115 userdom_dontaudit_use_unpriv_user_fds(radiusd_t)
116 userdom_dontaudit_search_user_home_dirs(radiusd_t)
117
118 optional_policy(`
119 cron_system_entry(radiusd_t, radiusd_exec_t)
120 ')
121
122 optional_policy(`
123 logrotate_exec(radiusd_t)
124 ')
125
126 optional_policy(`
127 mysql_read_config(radiusd_t)
128 mysql_stream_connect(radiusd_t)
129 ')
130
131 optional_policy(`
132 samba_read_var_files(radiusd_t)
133 ')
134
135 optional_policy(`
136 seutil_sigchld_newrole(radiusd_t)
137 ')
138
139 optional_policy(`
140 udev_read_db(radiusd_t)
141 ')