123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287 |
- ## <summary>Update firewall filtering to ban IP addresses with too many password failures.</summary>
- ########################################
- ## <summary>
- ## Execute a domain transition to run fail2ban.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_domtrans',`
- gen_require(`
- type fail2ban_t, fail2ban_exec_t;
- ')
- corecmd_search_bin($1)
- domtrans_pattern($1, fail2ban_exec_t, fail2ban_t)
- ')
- ########################################
- ## <summary>
- ## Execute the fail2ban client in
- ## the fail2ban client domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_domtrans_client',`
- gen_require(`
- type fail2ban_client_t, fail2ban_client_exec_t;
- ')
- corecmd_search_bin($1)
- domtrans_pattern($1, fail2ban_client_exec_t, fail2ban_client_t)
- ')
- ########################################
- ## <summary>
- ## Execute fail2ban client in the
- ## fail2ban client domain, and allow
- ## the specified role the fail2ban
- ## client domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_run_client',`
- gen_require(`
- attribute_role fail2ban_client_roles;
- ')
- fail2ban_domtrans_client($1)
- roleattribute $2 fail2ban_client_roles;
- ')
- #####################################
- ## <summary>
- ## Connect to fail2ban over a
- ## unix domain stream socket.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_stream_connect',`
- gen_require(`
- type fail2ban_t, fail2ban_var_run_t;
- ')
- files_search_pids($1)
- stream_connect_pattern($1, fail2ban_var_run_t, fail2ban_var_run_t, fail2ban_t)
- ')
- ########################################
- ## <summary>
- ## Read and write inherited temporary files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_rw_inherited_tmp_files',`
- gen_require(`
- type fail2ban_tmp_t;
- ')
- files_search_tmp($1)
- allow $1 fail2ban_tmp_t:file { read write };
- ')
- ########################################
- ## <summary>
- ## Do not audit attempts to use
- ## fail2ban file descriptors.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain to not audit.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_dontaudit_use_fds',`
- gen_require(`
- type fail2ban_t;
- ')
- dontaudit $1 fail2ban_t:fd use;
- ')
- ########################################
- ## <summary>
- ## Do not audit attempts to read and
- ## write fail2ban unix stream sockets
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain to not audit.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_dontaudit_rw_stream_sockets',`
- gen_require(`
- type fail2ban_t;
- ')
- dontaudit $1 fail2ban_t:unix_stream_socket { read write };
- ')
- ########################################
- ## <summary>
- ## Read and write fail2ban unix
- ## stream sockets.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_rw_stream_sockets',`
- gen_require(`
- type fail2ban_t;
- ')
- allow $1 fail2ban_t:unix_stream_socket rw_stream_socket_perms;
- ')
- ########################################
- ## <summary>
- ## Read fail2ban lib files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_read_lib_files',`
- gen_require(`
- type fail2ban_var_lib_t;
- ')
- files_search_var_lib($1)
- allow $1 fail2ban_var_lib_t:file read_file_perms;
- ')
- ########################################
- ## <summary>
- ## Read fail2ban log files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`fail2ban_read_log',`
- gen_require(`
- type fail2ban_log_t;
- ')
- logging_search_logs($1)
- allow $1 fail2ban_log_t:file read_file_perms;
- ')
- ########################################
- ## <summary>
- ## Append fail2ban log files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_append_log',`
- gen_require(`
- type fail2ban_log_t;
- ')
- logging_search_logs($1)
- allow $1 fail2ban_log_t:file append_file_perms;
- ')
- ########################################
- ## <summary>
- ## Read fail2ban pid files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`fail2ban_read_pid_files',`
- gen_require(`
- type fail2ban_var_run_t;
- ')
- files_search_pids($1)
- allow $1 fail2ban_var_run_t:file read_file_perms;
- ')
- ########################################
- ## <summary>
- ## All of the rules required to
- ## administrate an fail2ban environment.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`fail2ban_admin',`
- gen_require(`
- type fail2ban_t, fail2ban_log_t, fail2ban_tmp_t;
- type fail2ban_var_run_t, fail2ban_initrc_exec_t;
- type fail2ban_var_lib_t, fail2ban_client_t;
- ')
- allow $1 { fail2ban_t fail2ban_client_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { fail2ban_t fail2ban_client_t })
- init_labeled_script_domtrans($1, fail2ban_initrc_exec_t)
- domain_system_change_exemption($1)
- role_transition $2 fail2ban_initrc_exec_t system_r;
- allow $2 system_r;
- logging_list_logs($1)
- admin_pattern($1, fail2ban_log_t)
- files_list_pids($1)
- admin_pattern($1, fail2ban_var_run_t)
- files_search_var_lib($1)
- admin_pattern($1, fail2ban_var_lib_t)
- files_search_tmp($1)
- admin_pattern($1, fail2ban_tmp_t)
- fail2ban_run_client($1, $2)
- ')
|