123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428 |
- policy_module(mta, 2.8.6)
- ########################################
- #
- # Declarations
- #
- attribute mailcontent_type;
- attribute mta_exec_type;
- attribute mta_user_agent;
- attribute mailserver_delivery;
- attribute mailserver_domain;
- attribute mailserver_sender;
- attribute user_mail_domain;
- attribute_role user_mail_roles;
- type etc_aliases_t;
- files_type(etc_aliases_t)
- type etc_mail_t;
- files_config_file(etc_mail_t)
- type mail_home_t alias mail_forward_t;
- userdom_user_home_content(mail_home_t)
- type mail_home_rw_t;
- userdom_user_home_content(mail_home_rw_t)
- type mqueue_spool_t;
- files_mountpoint(mqueue_spool_t)
- type mail_spool_t;
- files_mountpoint(mail_spool_t)
- type sendmail_exec_t;
- mta_agent_executable(sendmail_exec_t)
- mta_base_mail_template(system)
- role system_r types system_mail_t;
- mta_base_mail_template(user)
- typealias user_mail_t alias { staff_mail_t sysadm_mail_t };
- typealias user_mail_t alias { auditadm_mail_t secadm_mail_t };
- userdom_user_application_type(user_mail_t)
- role user_mail_roles types user_mail_t;
- typealias user_mail_tmp_t alias { staff_mail_tmp_t sysadm_mail_tmp_t };
- typealias user_mail_tmp_t alias { auditadm_mail_tmp_t secadm_mail_tmp_t };
- userdom_user_tmp_file(user_mail_tmp_t)
- ########################################
- #
- # Common base mail policy
- #
- allow user_mail_domain self:capability { setuid setgid chown };
- allow user_mail_domain self:process { signal_perms setrlimit };
- allow user_mail_domain self:fifo_file rw_fifo_file_perms;
- allow user_mail_domain mta_exec_type:file entrypoint;
- allow user_mail_domain mail_home_t:file { append_file_perms read_file_perms };
- manage_dirs_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
- manage_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
- manage_lnk_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
- userdom_user_home_dir_filetrans(user_mail_domain, mail_home_rw_t, dir, "Maildir")
- userdom_user_home_dir_filetrans(user_mail_domain, mail_home_rw_t, dir, ".maildir")
- read_files_pattern(user_mail_domain, { etc_mail_t etc_aliases_t }, { etc_mail_t etc_aliases_t })
- manage_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
- read_lnk_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
- allow user_mail_domain sendmail_exec_t:lnk_file read_lnk_file_perms;
- can_exec(user_mail_domain, { mta_exec_type sendmail_exec_t })
- kernel_read_crypto_sysctls(user_mail_domain)
- kernel_read_system_state(user_mail_domain)
- kernel_read_kernel_sysctls(user_mail_domain)
- kernel_read_network_state(user_mail_domain)
- kernel_request_load_module(user_mail_domain)
- corenet_all_recvfrom_netlabel(user_mail_domain)
- corenet_tcp_sendrecv_generic_if(user_mail_domain)
- corenet_tcp_sendrecv_generic_node(user_mail_domain)
- corenet_sendrecv_all_client_packets(user_mail_domain)
- corenet_tcp_connect_all_ports(user_mail_domain)
- corenet_tcp_sendrecv_all_ports(user_mail_domain)
- corecmd_exec_bin(user_mail_domain)
- dev_read_urand(user_mail_domain)
- domain_use_interactive_fds(user_mail_domain)
- files_read_etc_runtime_files(user_mail_domain)
- files_read_usr_files(user_mail_domain)
- files_search_spool(user_mail_domain)
- files_dontaudit_search_pids(user_mail_domain)
- fs_getattr_all_fs(user_mail_domain)
- init_dontaudit_rw_utmp(user_mail_domain)
- logging_send_syslog_msg(user_mail_domain)
- miscfiles_read_localization(user_mail_domain)
- tunable_policy(`use_samba_home_dirs',`
- fs_manage_cifs_dirs(user_mail_domain)
- fs_manage_cifs_files(user_mail_domain)
- fs_read_cifs_symlinks(user_mail_domain)
- ')
- tunable_policy(`use_nfs_home_dirs',`
- fs_manage_nfs_dirs(user_mail_domain)
- fs_manage_nfs_files(user_mail_domain)
- fs_read_nfs_symlinks(user_mail_domain)
- ')
- optional_policy(`
- courier_manage_spool_dirs(user_mail_domain)
- courier_manage_spool_files(user_mail_domain)
- courier_rw_spool_pipes(user_mail_domain)
- ')
- optional_policy(`
- exim_domtrans(user_mail_domain)
- exim_manage_log(user_mail_domain)
- exim_manage_spool_files(user_mail_domain)
- exim_read_var_lib_files(user_mail_domain)
- ')
- optional_policy(`
- files_getattr_tmp_dirs(user_mail_domain)
- postfix_exec_master(user_mail_domain)
- postfix_read_config(user_mail_domain)
- postfix_search_spool(user_mail_domain)
- postfix_rw_inherited_master_pipes(user_mail_domain)
- ifdef(`distro_redhat',`
- postfix_config_filetrans(user_mail_domain, etc_aliases_t, { dir file lnk_file sock_file fifo_file })
- ')
- ')
- optional_policy(`
- procmail_exec(user_mail_domain)
- ')
- optional_policy(`
- qmail_domtrans_inject(user_mail_domain)
- ')
- optional_policy(`
- sendmail_manage_log(user_mail_domain)
- sendmail_log_filetrans_sendmail_log(user_mail_domain, file)
- ')
- optional_policy(`
- uucp_manage_spool(user_mail_domain)
- ')
- ########################################
- #
- # System local policy
- #
- allow system_mail_t self:capability { dac_override fowner };
- read_files_pattern(system_mail_t, etc_mail_t, etc_mail_t)
- read_files_pattern(system_mail_t, mailcontent_type, mailcontent_type)
- allow system_mail_t mail_home_t:file manage_file_perms;
- userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".esmtp_queue")
- userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".forward")
- userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, ".mailrc")
- userdom_user_home_dir_filetrans(system_mail_t, mail_home_t, file, "dead.letter")
- allow system_mail_t user_mail_domain:dir list_dir_perms;
- allow system_mail_t user_mail_domain:file read_file_perms;
- allow system_mail_t user_mail_domain:lnk_file read_lnk_file_perms;
- corecmd_exec_shell(system_mail_t)
- dev_read_rand(system_mail_t)
- dev_read_sysfs(system_mail_t)
- fs_rw_anon_inodefs_files(system_mail_t)
- selinux_getattr_fs(system_mail_t)
- term_dontaudit_use_unallocated_ttys(system_mail_t)
- init_use_script_ptys(system_mail_t)
- userdom_use_user_terminals(system_mail_t)
- init_rw_stream_sockets(system_mail_t)
- init_use_fds(system_mail_t)
- apt_use_fds(system_mail_t)
- apt_use_ptys(system_mail_t)
- optional_policy(`
- gen_require(`
- type crond_tmp_t;
- ')
- allow system_mail_t crond_tmp_t:file write;
- ')
- optional_policy(`
- apache_read_squirrelmail_data(system_mail_t)
- apache_append_squirrelmail_data(system_mail_t)
- apache_dontaudit_append_log(system_mail_t)
- apache_dontaudit_rw_stream_sockets(system_mail_t)
- apache_dontaudit_rw_tcp_sockets(system_mail_t)
- apache_dontaudit_rw_sys_script_stream_sockets(system_mail_t)
- ')
- optional_policy(`
- phpfpm_dontaudit_rw_stream_sockets(system_mail_t)
- phpfpm_dontaudit_rw_tcp_sockets(system_mail_t)
- ')
- optional_policy(`
- permit_in_unconfined_r(system_mail_t)
- unconfined_use_fds(system_mail_t)
- ')
- optional_policy(`
- arpwatch_manage_tmp_files(system_mail_t)
- ifdef(`hide_broken_symptoms',`
- arpwatch_dontaudit_rw_packet_sockets(system_mail_t)
- ')
- ')
- optional_policy(`
- bugzilla_search_content(system_mail_t)
- bugzilla_dontaudit_rw_stream_sockets(system_mail_t)
- ')
- optional_policy(`
- clamav_stream_connect(system_mail_t)
- clamav_append_log(system_mail_t)
- ')
- optional_policy(`
- cron_read_system_job_tmp_files(system_mail_t)
- cron_dontaudit_write_pipes(system_mail_t)
- cron_rw_system_job_stream_sockets(system_mail_t)
- ')
- optional_policy(`
- courier_stream_connect_authdaemon(system_mail_t)
- ')
- optional_policy(`
- cvs_read_data(system_mail_t)
- ')
- optional_policy(`
- fail2ban_dontaudit_rw_stream_sockets(system_mail_t)
- fail2ban_append_log(system_mail_t)
- fail2ban_rw_inherited_tmp_files(system_mail_t)
- ')
- optional_policy(`
- logrotate_read_tmp_files(system_mail_t)
- ')
- optional_policy(`
- logwatch_read_tmp_files(system_mail_t)
- ')
- optional_policy(`
- milter_getattr_all_sockets(system_mail_t)
- ')
- optional_policy(`
- nagios_read_tmp_files(system_mail_t)
- ')
- optional_policy(`
- manage_dirs_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
- manage_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
- manage_lnk_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
- manage_fifo_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
- manage_sock_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
- files_etc_filetrans(system_mail_t, etc_aliases_t, { file lnk_file sock_file fifo_file })
- ')
- optional_policy(`
- sxid_read_log(system_mail_t)
- ')
- optional_policy(`
- userdom_dontaudit_use_user_ptys(system_mail_t)
- optional_policy(`
- cron_dontaudit_append_system_job_tmp_files(system_mail_t)
- ')
- ')
- optional_policy(`
- spamassassin_stream_connect_spamd(system_mail_t)
- ')
- optional_policy(`
- smartmon_read_tmp_files(system_mail_t)
- ')
- ########################################
- #
- # MTA user agent local policy
- #
- userdom_use_user_terminals(mta_user_agent)
- optional_policy(`
- apache_append_log(mta_user_agent)
- ')
- optional_policy(`
- arpwatch_manage_tmp_files(mta_user_agent)
- ifdef(`hide_broken_symptoms',`
- arpwatch_dontaudit_rw_packet_sockets(mta_user_agent)
- ')
- optional_policy(`
- cron_read_system_job_tmp_files(mta_user_agent)
- ')
- ')
- ########################################
- #
- # Mailserver delivery local policy
- #
- allow mailserver_delivery self:fifo_file rw_fifo_file_perms;
- allow mailserver_delivery mail_spool_t:dir list_dir_perms;
- create_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
- read_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
- append_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
- create_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
- read_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
- manage_dirs_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
- manage_files_pattern(mailserver_delivery, { mail_home_t mail_home_rw_t }, { mail_home_t mail_home_rw_t })
- manage_lnk_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".esmtp_queue")
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".forward")
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, ".mailrc")
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_t, file, "dead.letter")
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_rw_t, dir, "Maildir")
- userdom_user_home_dir_filetrans(mailserver_delivery, mail_home_rw_t, dir, ".maildir")
- read_files_pattern(mailserver_delivery, system_mail_tmp_t, system_mail_tmp_t)
- tunable_policy(`use_samba_home_dirs',`
- fs_manage_cifs_dirs(mailserver_delivery)
- fs_manage_cifs_files(mailserver_delivery)
- fs_read_cifs_symlinks(mailserver_delivery)
- ')
- tunable_policy(`use_nfs_home_dirs',`
- fs_manage_nfs_dirs(mailserver_delivery)
- fs_manage_nfs_files(mailserver_delivery)
- fs_read_nfs_symlinks(mailserver_delivery)
- ')
- optional_policy(`
- arpwatch_search_data(mailserver_delivery)
- ')
- optional_policy(`
- dovecot_manage_spool(mailserver_delivery)
- dovecot_domtrans_deliver(mailserver_delivery)
- ')
- optional_policy(`
- files_search_var_lib(mailserver_delivery)
- mailman_domtrans(mailserver_delivery)
- mailman_read_data_symlinks(mailserver_delivery)
- ')
- optional_policy(`
- postfix_rw_inherited_master_pipes(mailserver_delivery)
- ')
- optional_policy(`
- uucp_domtrans_uux(mailserver_delivery)
- ')
- ########################################
- #
- # User local policy
- #
- manage_files_pattern(user_mail_t, mail_home_t, mail_home_t)
- userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".esmtp_queue")
- userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".forward")
- userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, ".mailrc")
- userdom_user_home_dir_filetrans(user_mail_t, mail_home_t, file, "dead.letter")
- dev_read_sysfs(user_mail_t)
- userdom_use_user_terminals(user_mail_t)
- mta_manage_aliases(user_mail_t)
- optional_policy(`
- allow user_mail_t self:capability dac_override;
- userdom_rw_user_tmp_files(user_mail_t)
- postfix_read_config(user_mail_t)
- postfix_list_spool(user_mail_t)
- ')
|