123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394 |
- ## <summary>Berkeley Internet name domain DNS server.</summary>
- ########################################
- ## <summary>
- ## Execute bind server in the bind domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`bind_initrc_domtrans',`
- gen_require(`
- type named_initrc_exec_t;
- ')
- init_labeled_script_domtrans($1, named_initrc_exec_t)
- ')
- ########################################
- ## <summary>
- ## Execute ndc in the ndc domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`bind_domtrans_ndc',`
- gen_require(`
- type ndc_t, ndc_exec_t;
- ')
- corecmd_search_bin($1)
- domtrans_pattern($1, ndc_exec_t, ndc_t)
- ')
- ########################################
- ## <summary>
- ## Send generic signals to bind.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_signal',`
- gen_require(`
- type named_t;
- ')
- allow $1 named_t:process signal;
- ')
- ########################################
- ## <summary>
- ## Send null signals to bind.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_signull',`
- gen_require(`
- type named_t;
- ')
- allow $1 named_t:process signull;
- ')
- ########################################
- ## <summary>
- ## Send kill signals to bind.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_kill',`
- gen_require(`
- type named_t;
- ')
- allow $1 named_t:process sigkill;
- ')
- ########################################
- ## <summary>
- ## Execute ndc in the ndc domain, and
- ## allow the specified role the ndc domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`bind_run_ndc',`
- gen_require(`
- attribute_role ndc_roles;
- ')
- bind_domtrans_ndc($1)
- roleattribute $2 ndc_roles;
- ')
- ########################################
- ## <summary>
- ## Execute bind in the named domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`bind_domtrans',`
- gen_require(`
- type named_t, named_exec_t;
- ')
- corecmd_search_bin($1)
- domtrans_pattern($1, named_exec_t, named_t)
- ')
- ########################################
- ## <summary>
- ## Read dnssec key files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_read_dnssec_keys',`
- gen_require(`
- type named_conf_t, named_zone_t, dnssec_t;
- ')
- read_files_pattern($1, { named_conf_t named_zone_t }, dnssec_t)
- ')
- ########################################
- ## <summary>
- ## Read bind named configuration files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_read_config',`
- gen_require(`
- type named_conf_t;
- ')
- read_files_pattern($1, named_conf_t, named_conf_t)
- ')
- ########################################
- ## <summary>
- ## Write bind named configuration files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_write_config',`
- gen_require(`
- type named_conf_t;
- ')
- write_files_pattern($1, named_conf_t, named_conf_t)
- allow $1 named_conf_t:file setattr_file_perms;
- ')
- ########################################
- ## <summary>
- ## Create, read, write, and delete
- ## bind configuration directories.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_manage_config_dirs',`
- gen_require(`
- type named_conf_t;
- ')
- manage_dirs_pattern($1, named_conf_t, named_conf_t)
- ')
- ########################################
- ## <summary>
- ## Search bind cache directories.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_search_cache',`
- gen_require(`
- type named_conf_t, named_cache_t, named_zone_t;
- ')
- files_search_var($1)
- allow $1 named_conf_t:dir search_dir_perms;
- allow $1 named_zone_t:dir search_dir_perms;
- allow $1 named_cache_t:dir search_dir_perms;
- ')
- ########################################
- ## <summary>
- ## Create, read, write, and delete
- ## bind cache files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_manage_cache',`
- gen_require(`
- type named_cache_t, named_zone_t;
- ')
- files_search_var($1)
- allow $1 named_zone_t:dir search_dir_perms;
- manage_files_pattern($1, named_cache_t, named_cache_t)
- manage_lnk_files_pattern($1, named_cache_t, named_cache_t)
- ')
- ########################################
- ## <summary>
- ## Set attributes of bind pid directories.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_setattr_pid_dirs',`
- gen_require(`
- type named_var_run_t;
- ')
- allow $1 named_var_run_t:dir setattr_dir_perms;
- ')
- ########################################
- ## <summary>
- ## Set attributes of bind zone directories.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_setattr_zone_dirs',`
- gen_require(`
- type named_zone_t;
- ')
- allow $1 named_zone_t:dir setattr_dir_perms;
- ')
- ########################################
- ## <summary>
- ## Read bind zone files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_read_zone',`
- gen_require(`
- type named_zone_t;
- ')
- files_search_var($1)
- read_files_pattern($1, named_zone_t, named_zone_t)
- ')
- ########################################
- ## <summary>
- ## Create, read, write, and delete
- ## bind zone files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_manage_zone',`
- gen_require(`
- type named_zone_t;
- ')
- files_search_var($1)
- manage_files_pattern($1, named_zone_t, named_zone_t)
- ')
- ########################################
- ## <summary>
- ## Send and receive datagrams to and from named. (Deprecated)
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`bind_udp_chat_named',`
- refpolicywarn(`$0($*) has been deprecated.')
- ')
- ########################################
- ## <summary>
- ## All of the rules required to
- ## administrate an bind environment.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`bind_admin',`
- gen_require(`
- type named_t, named_tmp_t, named_log_t;
- type named_cache_t, named_zone_t, named_initrc_exec_t;
- type dnssec_t, ndc_t, named_conf_t, named_var_run_t;
- type named_keytab_t;
- ')
- allow $1 { named_t ndc_t }:process { ptrace signal_perms };
- ps_process_pattern($1, { named_t ndc_t })
- init_labeled_script_domtrans($1, named_initrc_exec_t)
- domain_system_change_exemption($1)
- role_transition $2 named_initrc_exec_t system_r;
- allow $2 system_r;
- files_list_tmp($1)
- admin_pattern($1, named_tmp_t)
- logging_list_logs($1)
- admin_pattern($1, named_log_t)
- files_list_etc($1)
- admin_pattern($1, { named_keytab_t named_conf_t })
- files_list_var($1)
- admin_pattern($1, { dnssec_t named_cache_t named_zone_t })
- files_list_pids($1)
- admin_pattern($1, named_var_run_t)
- bind_run_ndc($1, $2)
- ')
|