123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371 |
- ## <summary>TCP/IP encryption</summary>
- ########################################
- ## <summary>
- ## Execute ipsec in the ipsec domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_domtrans',`
- gen_require(`
- type ipsec_t, ipsec_exec_t;
- ')
- domtrans_pattern($1, ipsec_exec_t, ipsec_t)
- ')
- ########################################
- ## <summary>
- ## Connect to IPSEC using a unix domain stream socket.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_stream_connect',`
- gen_require(`
- type ipsec_t, ipsec_var_run_t;
- ')
- files_search_pids($1)
- stream_connect_pattern($1, ipsec_var_run_t, ipsec_var_run_t, ipsec_t)
- ')
- ########################################
- ## <summary>
- ## Execute ipsec in the ipsec mgmt domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_domtrans_mgmt',`
- gen_require(`
- type ipsec_mgmt_t, ipsec_mgmt_exec_t;
- ')
- domtrans_pattern($1, ipsec_mgmt_exec_t, ipsec_mgmt_t)
- ')
- ########################################
- ## <summary>
- ## Connect to racoon using a unix domain stream socket.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_stream_connect_racoon',`
- gen_require(`
- type racoon_t, ipsec_var_run_t;
- ')
- files_search_pids($1)
- stream_connect_pattern($1, ipsec_var_run_t, ipsec_var_run_t, racoon_t)
- ')
- ########################################
- ## <summary>
- ## Get the attributes of an IPSEC key socket.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_getattr_key_sockets',`
- gen_require(`
- type ipsec_t;
- ')
- allow $1 ipsec_t:key_socket getattr;
- ')
- ########################################
- ## <summary>
- ## Execute the IPSEC management program in the caller domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_exec_mgmt',`
- gen_require(`
- type ipsec_exec_t;
- ')
- can_exec($1, ipsec_exec_t)
- ')
- ########################################
- ## <summary>
- ## Send ipsec mgmt a general signal.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- #
- interface(`ipsec_signal_mgmt',`
- gen_require(`
- type ipsec_mgmt_t;
- ')
- allow $1 ipsec_mgmt_t:process signal;
- ')
- ########################################
- ## <summary>
- ## Send ipsec mgmt a null signal.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- #
- interface(`ipsec_signull_mgmt',`
- gen_require(`
- type ipsec_mgmt_t;
- ')
- allow $1 ipsec_mgmt_t:process signull;
- ')
- ########################################
- ## <summary>
- ## Send ipsec mgmt a kill signal.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- #
- interface(`ipsec_kill_mgmt',`
- gen_require(`
- type ipsec_mgmt_t;
- ')
- allow $1 ipsec_mgmt_t:process sigkill;
- ')
- ######################################
- ## <summary>
- ## Send and receive messages from
- ## ipsec-mgmt over dbus.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_mgmt_dbus_chat',`
- gen_require(`
- type ipsec_mgmt_t;
- class dbus send_msg;
- ')
- allow $1 ipsec_mgmt_t:dbus send_msg;
- allow ipsec_mgmt_t $1:dbus send_msg;
- ')
- ########################################
- ## <summary>
- ## Read the IPSEC configuration
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`ipsec_read_config',`
- gen_require(`
- type ipsec_conf_file_t;
- ')
- files_search_etc($1)
- allow $1 ipsec_conf_file_t:file read_file_perms;
- ')
- ########################################
- ## <summary>
- ## Match the default SPD entry.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_match_default_spd',`
- gen_require(`
- type ipsec_spd_t;
- ')
- allow $1 ipsec_spd_t:association polmatch;
- allow $1 self:association sendto;
- ')
- ########################################
- ## <summary>
- ## Set the context of a SPD entry to
- ## the default context.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_setcontext_default_spd',`
- gen_require(`
- type ipsec_spd_t;
- ')
- allow $1 ipsec_spd_t:association setcontext;
- ')
- ########################################
- ## <summary>
- ## write the ipsec_var_run_t files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_write_pid',`
- gen_require(`
- type ipsec_var_run_t;
- ')
- files_search_pids($1)
- write_files_pattern($1, ipsec_var_run_t, ipsec_var_run_t)
- ')
- ########################################
- ## <summary>
- ## Create, read, write, and delete the IPSEC pid files.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed access.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_manage_pid',`
- gen_require(`
- type ipsec_var_run_t;
- ')
- files_search_pids($1)
- manage_files_pattern($1, ipsec_var_run_t, ipsec_var_run_t)
- ')
- ########################################
- ## <summary>
- ## Execute racoon in the racoon domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_domtrans_racoon',`
- gen_require(`
- type racoon_t, racoon_exec_t;
- ')
- domtrans_pattern($1, racoon_exec_t, racoon_t)
- ')
- ########################################
- ## <summary>
- ## Execute racoon and allow the specified role the domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access.
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`ipsec_run_racoon',`
- gen_require(`
- type racoon_t;
- ')
- ipsec_domtrans_racoon($1)
- role $2 types racoon_t;
- ')
- ########################################
- ## <summary>
- ## Execute setkey in the setkey domain.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- #
- interface(`ipsec_domtrans_setkey',`
- gen_require(`
- type setkey_t, setkey_exec_t;
- ')
- domtrans_pattern($1, setkey_exec_t, setkey_t)
- ')
- ########################################
- ## <summary>
- ## Execute setkey and allow the specified role the domains.
- ## </summary>
- ## <param name="domain">
- ## <summary>
- ## Domain allowed to transition.
- ## </summary>
- ## </param>
- ## <param name="role">
- ## <summary>
- ## Role allowed access..
- ## </summary>
- ## </param>
- ## <rolecap/>
- #
- interface(`ipsec_run_setkey',`
- gen_require(`
- type setkey_t;
- ')
- ipsec_domtrans_setkey($1)
- role $2 types setkey_t;
- ')
|