1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
|
## <summary>GNU terminal multiplexer.</summary>
#######################################
## <summary>
## The role template for the screen module.
## </summary>
## <param name="role_prefix">
## <summary>
## The prefix of the user role (e.g., user
## is the prefix for user_r).
## </summary>
## </param>
## <param name="user_role">
## <summary>
## The role associated with the user domain.
## </summary>
## </param>
## <param name="user_domain">
## <summary>
## The type of the user domain.
## </summary>
## </param>
#
template(`screen_role_template',`
gen_require(`
attribute screen_domain;
attribute_role screen_roles;
type screen_exec_t, screen_tmp_t;
type screen_home_t, screen_runtime_t;
')
########################################
#
# Declarations
#
type $1_screen_t, screen_domain;
userdom_user_application_domain($1_screen_t, screen_exec_t)
domain_interactive_fd($1_screen_t)
role screen_roles types $1_screen_t;
roleattribute $2 screen_roles;
########################################
#
# Local policy
#
dontaudit $1_screen_t self:capability sys_tty_config;
domtrans_pattern($3, screen_exec_t, $1_screen_t)
ps_process_pattern($3, $1_screen_t)
allow $3 $1_screen_t:process { ptrace signal_perms };
dontaudit $3 $1_screen_t:unix_stream_socket { read write };
allow $1_screen_t $3:process signal;
allow $3 screen_tmp_t:dir { manage_dir_perms relabel_dir_perms };
allow $3 screen_tmp_t:file { manage_file_perms relabel_file_perms };
allow $3 screen_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
allow $3 screen_home_t:dir { manage_dir_perms relabel_dir_perms };
allow $3 screen_home_t:file { manage_file_perms relabel_file_perms };
allow $3 screen_home_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
allow $3 screen_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
userdom_user_home_dir_filetrans($3, screen_home_t, dir, ".screen")
userdom_user_home_dir_filetrans($3, screen_home_t, file, ".screenrc")
userdom_user_home_dir_filetrans($3, screen_home_t, file, ".tmux.conf")
manage_dirs_pattern($3, screen_runtime_t, screen_runtime_t)
manage_files_pattern($3, screen_runtime_t, screen_runtime_t)
manage_lnk_files_pattern($3, screen_runtime_t, screen_runtime_t)
manage_fifo_files_pattern($3, screen_runtime_t, screen_runtime_t)
corecmd_bin_domtrans($1_screen_t, $3)
corecmd_shell_domtrans($1_screen_t, $3)
auth_domtrans_chk_passwd($1_screen_t)
auth_use_nsswitch($1_screen_t)
userdom_user_home_domtrans($1_screen_t, $3)
tunable_policy(`use_samba_home_dirs',`
fs_cifs_domtrans($1_screen_t, $3)
')
tunable_policy(`use_nfs_home_dirs',`
fs_nfs_domtrans($1_screen_t, $3)
')
')
|