123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213 |
- policy_module(amavis, 1.15.5)
- ########################################
- #
- # Declarations
- #
- ## <desc>
- ## <p>
- ## Determine whether amavis can
- ## use JIT compiler.
- ## </p>
- ## </desc>
- gen_tunable(amavis_use_jit, false)
- type amavis_t;
- type amavis_exec_t;
- init_daemon_domain(amavis_t, amavis_exec_t)
- type amavis_etc_t;
- files_config_file(amavis_etc_t)
- type amavis_initrc_exec_t;
- init_script_file(amavis_initrc_exec_t)
- type amavis_var_run_t;
- files_pid_file(amavis_var_run_t)
- type amavis_var_lib_t;
- files_type(amavis_var_lib_t)
- type amavis_var_log_t;
- logging_log_file(amavis_var_log_t)
- type amavis_tmp_t;
- files_tmp_file(amavis_tmp_t)
- type amavis_quarantine_t;
- files_type(amavis_quarantine_t)
- type amavis_spool_t;
- files_type(amavis_spool_t)
- ########################################
- #
- # Local policy
- #
- allow amavis_t amavis_var_lib_t:file map;
- allow amavis_t self:capability { kill chown dac_override setgid setuid };
- dontaudit amavis_t self:capability sys_tty_config;
- allow amavis_t self:process signal_perms;
- allow amavis_t self:fifo_file rw_fifo_file_perms;
- allow amavis_t self:unix_stream_socket { accept connectto listen };
- allow amavis_t self:tcp_socket { listen accept };
- allow amavis_t amavis_etc_t:dir list_dir_perms;
- read_files_pattern(amavis_t, amavis_etc_t, amavis_etc_t)
- read_lnk_files_pattern(amavis_t, amavis_etc_t, amavis_etc_t)
- manage_dirs_pattern(amavis_t, amavis_quarantine_t, amavis_quarantine_t)
- manage_files_pattern(amavis_t, amavis_quarantine_t, amavis_quarantine_t)
- manage_sock_files_pattern(amavis_t, amavis_quarantine_t, amavis_quarantine_t)
- manage_dirs_pattern(amavis_t, amavis_spool_t, amavis_spool_t)
- manage_files_pattern(amavis_t, amavis_spool_t, amavis_spool_t)
- manage_lnk_files_pattern(amavis_t, amavis_spool_t, amavis_spool_t)
- manage_sock_files_pattern(amavis_t, amavis_spool_t, amavis_spool_t)
- filetrans_pattern(amavis_t, amavis_spool_t, amavis_var_run_t, sock_file)
- manage_files_pattern(amavis_t, amavis_tmp_t, amavis_tmp_t)
- allow amavis_t amavis_tmp_t:dir setattr_dir_perms;
- files_tmp_filetrans(amavis_t, amavis_tmp_t, file)
- manage_dirs_pattern(amavis_t, amavis_var_lib_t, amavis_var_lib_t)
- manage_files_pattern(amavis_t, amavis_var_lib_t, amavis_var_lib_t)
- manage_lnk_files_pattern(amavis_t, amavis_var_lib_t, amavis_var_lib_t)
- manage_sock_files_pattern(amavis_t, amavis_var_lib_t, amavis_var_lib_t)
- allow amavis_t amavis_var_log_t:dir setattr_dir_perms;
- manage_files_pattern(amavis_t, amavis_var_log_t, amavis_var_log_t)
- manage_sock_files_pattern(amavis_t, amavis_var_log_t, amavis_var_log_t)
- logging_log_filetrans(amavis_t, amavis_var_log_t, { sock_file file dir })
- manage_dirs_pattern(amavis_t, amavis_var_run_t, amavis_var_run_t)
- manage_files_pattern(amavis_t, amavis_var_run_t, amavis_var_run_t)
- manage_sock_files_pattern(amavis_t, amavis_var_run_t, amavis_var_run_t)
- files_pid_filetrans(amavis_t, amavis_var_run_t, { dir file sock_file })
- can_exec(amavis_t, amavis_exec_t)
- kernel_read_kernel_sysctls(amavis_t)
- kernel_read_system_state(amavis_t)
- kernel_dontaudit_list_proc(amavis_t)
- kernel_dontaudit_read_proc_symlinks(amavis_t)
- corecmd_exec_bin(amavis_t)
- corecmd_exec_shell(amavis_t)
- corenet_all_recvfrom_unlabeled(amavis_t)
- corenet_all_recvfrom_netlabel(amavis_t)
- corenet_tcp_sendrecv_generic_if(amavis_t)
- corenet_udp_sendrecv_generic_if(amavis_t)
- corenet_tcp_sendrecv_generic_node(amavis_t)
- corenet_udp_sendrecv_generic_node(amavis_t)
- corenet_tcp_sendrecv_all_ports(amavis_t)
- corenet_udp_sendrecv_all_ports(amavis_t)
- corenet_tcp_bind_generic_node(amavis_t)
- corenet_udp_bind_generic_node(amavis_t)
- corenet_sendrecv_amavisd_send_client_packets(amavis_t)
- corenet_tcp_connect_amavisd_send_port(amavis_t)
- corenet_sendrecv_amavisd_recv_server_packets(amavis_t)
- corenet_tcp_bind_amavisd_recv_port(amavis_t)
- corenet_sendrecv_generic_server_packets(amavis_t)
- corenet_udp_bind_generic_port(amavis_t)
- corenet_dontaudit_udp_bind_all_ports(amavis_t)
- corenet_sendrecv_razor_client_packets(amavis_t)
- corenet_tcp_connect_razor_port(amavis_t)
- dev_read_rand(amavis_t)
- dev_read_sysfs(amavis_t)
- dev_read_urand(amavis_t)
- domain_use_interactive_fds(amavis_t)
- domain_dontaudit_read_all_domains_state(amavis_t)
- files_read_etc_runtime_files(amavis_t)
- files_read_usr_files(amavis_t)
- files_search_spool(amavis_t)
- fs_getattr_xattr_fs(amavis_t)
- auth_use_nsswitch(amavis_t)
- auth_dontaudit_read_shadow(amavis_t)
- init_read_state(amavis_t)
- init_read_utmp(amavis_t)
- init_stream_connect_script(amavis_t)
- logging_send_syslog_msg(amavis_t)
- miscfiles_read_localization(amavis_t)
- userdom_dontaudit_search_user_home_dirs(amavis_t)
- hostname_domtrans(amavis_t)
- gen_require(`
- type lib_t;
- ')
- allow amavis_t lib_t:file execute_no_trans;
- gen_require(`
- type usr_t;
- ')
- allow amavis_t usr_t:file map;
- tunable_policy(`amavis_use_jit',`
- allow amavis_t self:process execmem;
- ',`
- dontaudit amavis_t self:process execmem;
- ')
- optional_policy(`
- clamav_stream_connect(amavis_t)
- clamav_domtrans_clamscan(amavis_t)
- clamav_read_state_clamd(amavis_t)
- ')
- optional_policy(`
- cron_use_fds(amavis_t)
- cron_use_system_job_fds(amavis_t)
- cron_rw_pipes(amavis_t)
- ')
- optional_policy(`
- dcc_domtrans_client(amavis_t)
- dcc_stream_connect_dccifd(amavis_t)
- ')
- optional_policy(`
- mta_read_config(amavis_t)
- ')
- optional_policy(`
- postfix_read_config(amavis_t)
- postfix_list_spool(amavis_t)
- ')
- optional_policy(`
- pyzor_domtrans(amavis_t)
- pyzor_signal(amavis_t)
- ')
- optional_policy(`
- razor_domtrans(amavis_t)
- ')
- optional_policy(`
- snmp_manage_var_lib_dirs(amavis_t)
- snmp_manage_var_lib_files(amavis_t)
- snmp_stream_connect(amavis_t)
- ')
- optional_policy(`
- spamassassin_exec(amavis_t)
- spamassassin_exec_client(amavis_t)
- spamassassin_read_lib_files(amavis_t)
- ')
|