diff options
author | 2012-10-24 11:09:54 +0200 | |
---|---|---|
committer | 2012-10-24 17:01:56 +0200 | |
commit | 9e68f358e7816a2fde4e48938be20110b5620dba (patch) | |
tree | d6243836c0b537db9f05784b69bc883b9fe17e30 /policy | |
parent | Tab clean up in the rhsmcertd file context file (diff) | |
download | hardened-refpolicy-9e68f358e7816a2fde4e48938be20110b5620dba.tar.gz hardened-refpolicy-9e68f358e7816a2fde4e48938be20110b5620dba.tar.bz2 hardened-refpolicy-9e68f358e7816a2fde4e48938be20110b5620dba.zip |
Changes to the rhsmcertd policy module
Ported from Fedora with changes
Signed-off-by: Dominick Grift <dominick.grift@gmail.com>
Diffstat (limited to 'policy')
-rw-r--r-- | policy/modules/contrib/rhsmcertd.if | 46 | ||||
-rw-r--r-- | policy/modules/contrib/rhsmcertd.te | 18 |
2 files changed, 42 insertions, 22 deletions
diff --git a/policy/modules/contrib/rhsmcertd.if b/policy/modules/contrib/rhsmcertd.if index 137605a2..6dbc905b 100644 --- a/policy/modules/contrib/rhsmcertd.if +++ b/policy/modules/contrib/rhsmcertd.if @@ -1,8 +1,8 @@ -## <summary>Subscription Management Certificate Daemon policy</summary> +## <summary>Subscription Management Certificate Daemon.</summary> ######################################## ## <summary> -## Transition to rhsmcertd. +## Execute rhsmcertd in the rhsmcertd domain. ## </summary> ## <param name="domain"> ## <summary> @@ -21,11 +21,12 @@ interface(`rhsmcertd_domtrans',` ######################################## ## <summary> -## Execute rhsmcertd server in the rhsmcertd domain. +## Execute rhsmcertd init scripts +## in the initrc domain. ## </summary> ## <param name="domain"> ## <summary> -## Domain allowed access. +## Domain allowed to transition. ## </summary> ## </param> # @@ -39,7 +40,7 @@ interface(`rhsmcertd_initrc_domtrans',` ######################################## ## <summary> -## Read rhsmcertd's log files. +## Read rhsmcertd log files. ## </summary> ## <param name="domain"> ## <summary> @@ -59,7 +60,7 @@ interface(`rhsmcertd_read_log',` ######################################## ## <summary> -## Append to rhsmcertd log files. +## Append rhsmcertd log files. ## </summary> ## <param name="domain"> ## <summary> @@ -78,7 +79,8 @@ interface(`rhsmcertd_append_log',` ######################################## ## <summary> -## Manage rhsmcertd log files +## Create, read, write, and delete +## rhsmcertd log files. ## </summary> ## <param name="domain"> ## <summary> @@ -112,8 +114,8 @@ interface(`rhsmcertd_search_lib',` type rhsmcertd_var_lib_t; ') - allow $1 rhsmcertd_var_lib_t:dir search_dir_perms; files_search_var_lib($1) + allow $1 rhsmcertd_var_lib_t:dir search_dir_perms; ') ######################################## @@ -137,7 +139,8 @@ interface(`rhsmcertd_read_lib_files',` ######################################## ## <summary> -## Manage rhsmcertd lib files. +## Create, read, write, and delete +## rhsmcertd lib files. ## </summary> ## <param name="domain"> ## <summary> @@ -156,7 +159,8 @@ interface(`rhsmcertd_manage_lib_files',` ######################################## ## <summary> -## Manage rhsmcertd lib directories. +## Create, read, write, and delete +## rhsmcertd lib directories. ## </summary> ## <param name="domain"> ## <summary> @@ -175,7 +179,7 @@ interface(`rhsmcertd_manage_lib_dirs',` ######################################## ## <summary> -## Read rhsmcertd PID files. +## Read rhsmcertd pid files. ## </summary> ## <param name="domain"> ## <summary> @@ -194,8 +198,8 @@ interface(`rhsmcertd_read_pid_files',` #################################### ## <summary> -## Connect to rhsmcertd over a unix domain -## stream socket. +## Connect to rhsmcertd with a +## unix domain stream socket. ## </summary> ## <param name="domain"> ## <summary> @@ -235,12 +239,13 @@ interface(`rhsmcertd_dbus_chat',` ###################################### ## <summary> -## Dontaudit Send and receive messages from +## Do not audit attempts to send +## and receive messages from ## rhsmcertd over dbus. ## </summary> ## <param name="domain"> ## <summary> -## Domain allowed access. +## Domain to not audit. ## </summary> ## </param> # @@ -256,8 +261,8 @@ interface(`rhsmcertd_dontaudit_dbus_chat',` ######################################## ## <summary> -## All of the rules required to administrate -## an rhsmcertd environment +## All of the rules required to +## administrate an rhsmcertd environment. ## </summary> ## <param name="domain"> ## <summary> @@ -274,10 +279,10 @@ interface(`rhsmcertd_dontaudit_dbus_chat',` interface(`rhsmcertd_admin',` gen_require(` type rhsmcertd_t, rhsmcertd_initrc_exec_t, rhsmcertd_log_t; - type rhsmcertd_var_lib_t, rhsmcertd_var_run_t; + type rhsmcertd_var_lib_t, rhsmcertd_var_run_t, rhsmcertd_lock_t; ') - allow $1 rhsmcertd_t:process signal_perms; + allow $1 rhsmcertd_t:process { ptrace signal_perms }; ps_process_pattern($1, rhsmcertd_t) rhsmcertd_initrc_domtrans($1) @@ -293,4 +298,7 @@ interface(`rhsmcertd_admin',` files_search_pids($1) admin_pattern($1, rhsmcertd_var_run_t) + + files_search_locks($1) + admin_pattern($1, rhsmcertd_lock_t) ') diff --git a/policy/modules/contrib/rhsmcertd.te b/policy/modules/contrib/rhsmcertd.te index 783f6788..cab89e95 100644 --- a/policy/modules/contrib/rhsmcertd.te +++ b/policy/modules/contrib/rhsmcertd.te @@ -1,4 +1,4 @@ -policy_module(rhsmcertd, 1.0.0) +policy_module(rhsmcertd, 1.0.1) ######################################## # @@ -26,14 +26,18 @@ files_pid_file(rhsmcertd_var_run_t) ######################################## # -# rhsmcertd local policy +# Local policy # +allow rhsmcertd_t self:capability sys_nice; +allow rhsmcertd_t self:process { signal setsched }; allow rhsmcertd_t self:fifo_file rw_fifo_file_perms; allow rhsmcertd_t self:unix_stream_socket create_stream_socket_perms; manage_dirs_pattern(rhsmcertd_t, rhsmcertd_log_t, rhsmcertd_log_t) -manage_files_pattern(rhsmcertd_t, rhsmcertd_log_t, rhsmcertd_log_t) +append_files_pattern(rhsmcertd_t, rhsmcertd_log_t, rhsmcertd_log_t) +create_files_pattern(rhsmcertd_t, rhsmcertd_log_t, rhsmcertd_log_t) +setattr_files_pattern(rhsmcertd_t, rhsmcertd_log_t, rhsmcertd_log_t) manage_files_pattern(rhsmcertd_t, rhsmcertd_lock_t, rhsmcertd_lock_t) files_lock_filetrans(rhsmcertd_t, rhsmcertd_lock_t, file) @@ -43,13 +47,17 @@ manage_files_pattern(rhsmcertd_t, rhsmcertd_var_lib_t, rhsmcertd_var_lib_t) manage_dirs_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t) manage_files_pattern(rhsmcertd_t, rhsmcertd_var_run_t, rhsmcertd_var_run_t) +files_pid_filetrans(rhsmcertd_t, rhsmcertd_var_run_t, { file dir }) +kernel_read_network_state(rhsmcertd_t) kernel_read_system_state(rhsmcertd_t) corecmd_exec_bin(rhsmcertd_t) +dev_read_rand(rhsmcertd_t) dev_read_urand(rhsmcertd_t) +files_list_tmp(rhsmcertd_t) files_read_etc_files(rhsmcertd_t) files_read_usr_files(rhsmcertd_t) @@ -57,3 +65,7 @@ miscfiles_read_localization(rhsmcertd_t) miscfiles_read_generic_certs(rhsmcertd_t) sysnet_dns_name_resolve(rhsmcertd_t) + +optional_policy(` + rpm_read_db(rhsmcertd_t) +') |