diff options
Diffstat (limited to 'doc')
-rw-r--r-- | doc/Makefile.example | 8 | ||||
-rw-r--r-- | doc/example.fc | 6 | ||||
-rw-r--r-- | doc/example.if | 54 | ||||
-rw-r--r-- | doc/example.te | 28 | ||||
-rw-r--r-- | doc/global_booleans.xml | 9 | ||||
-rw-r--r-- | doc/global_tunables.xml | 108 | ||||
-rw-r--r-- | doc/policy.dtd | 44 | ||||
-rw-r--r-- | doc/policy.xml | 91784 | ||||
-rw-r--r-- | doc/templates/bool_list.html | 23 | ||||
-rw-r--r-- | doc/templates/boolean.html | 13 | ||||
-rw-r--r-- | doc/templates/global_bool_list.html | 14 | ||||
-rw-r--r-- | doc/templates/global_tun_list.html | 14 | ||||
-rw-r--r-- | doc/templates/header.html | 15 | ||||
-rw-r--r-- | doc/templates/int_list.html | 33 | ||||
-rw-r--r-- | doc/templates/interface.html | 50 | ||||
-rw-r--r-- | doc/templates/menu.html | 26 | ||||
-rw-r--r-- | doc/templates/module.html | 52 | ||||
-rw-r--r-- | doc/templates/module_list.html | 19 | ||||
-rw-r--r-- | doc/templates/style.css | 216 | ||||
-rw-r--r-- | doc/templates/temp_list.html | 33 | ||||
-rw-r--r-- | doc/templates/template.html | 50 | ||||
-rw-r--r-- | doc/templates/tun_list.html | 23 | ||||
-rw-r--r-- | doc/templates/tunable.html | 13 |
23 files changed, 92635 insertions, 0 deletions
diff --git a/doc/Makefile.example b/doc/Makefile.example new file mode 100644 index 00000000..9f2a8d52 --- /dev/null +++ b/doc/Makefile.example @@ -0,0 +1,8 @@ + +AWK ?= gawk + +NAME ?= $(shell $(AWK) -F= '/^SELINUXTYPE/{ print $$2 }' /etc/selinux/config) +SHAREDIR ?= /usr/share/selinux +HEADERDIR := $(SHAREDIR)/$(NAME)/include + +include $(HEADERDIR)/Makefile diff --git a/doc/example.fc b/doc/example.fc new file mode 100644 index 00000000..9cf7c4c1 --- /dev/null +++ b/doc/example.fc @@ -0,0 +1,6 @@ +# myapp executable will have: +# label: system_u:object_r:myapp_exec_t +# MLS sensitivity: s0 +# MCS categories: <none> + +/usr/sbin/myapp -- gen_context(system_u:object_r:myapp_exec_t,s0) diff --git a/doc/example.if b/doc/example.if new file mode 100644 index 00000000..54d42ae6 --- /dev/null +++ b/doc/example.if @@ -0,0 +1,54 @@ +## <summary>Myapp example policy</summary> +## <desc> +## <p> +## More descriptive text about myapp. The desc +## tag can also use p, ul, and ol +## html tags for formatting. +## </p> +## <p> +## This policy supports the following myapp features: +## <ul> +## <li>Feature A</li> +## <li>Feature B</li> +## <li>Feature C</li> +## </ul> +## </p> +## </desc> +# + +######################################## +## <summary> +## Execute a domain transition to run myapp. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed to transition. +## </summary> +## </param> +# +interface(`myapp_domtrans',` + gen_require(` + type myapp_t, myapp_exec_t; + ') + + domtrans_pattern($1,myapp_exec_t,myapp_t) +') + +######################################## +## <summary> +## Read myapp log files. +## </summary> +## <param name="domain"> +## <summary> +## Domain allowed to read the log files. +## </summary> +## </param> +# +interface(`myapp_read_log',` + gen_require(` + type myapp_log_t; + ') + + logging_search_logs($1) + allow $1 myapp_log_t:file read_file_perms; +') diff --git a/doc/example.te b/doc/example.te new file mode 100644 index 00000000..82383553 --- /dev/null +++ b/doc/example.te @@ -0,0 +1,28 @@ + +policy_module(myapp,1.0.0) + +######################################## +# +# Declarations +# + +type myapp_t; +type myapp_exec_t; +domain_type(myapp_t) +domain_entry_file(myapp_t, myapp_exec_t) + +type myapp_log_t; +logging_log_file(myapp_log_t) + +type myapp_tmp_t; +files_tmp_file(myapp_tmp_t) + +######################################## +# +# Myapp local policy +# + +allow myapp_t myapp_log_t:file { read_file_perms append_file_perms }; + +allow myapp_t myapp_tmp_t:file manage_file_perms; +files_tmp_filetrans(myapp_t,myapp_tmp_t,file) diff --git a/doc/global_booleans.xml b/doc/global_booleans.xml new file mode 100644 index 00000000..76c5a81a --- /dev/null +++ b/doc/global_booleans.xml @@ -0,0 +1,9 @@ +<bool name="secure_mode" dftval="false"> +<desc> +<p> +Enabling secure mode disallows programs, such as +newrole, from transitioning to administrative +user domains. +</p> +</desc> +</bool> diff --git a/doc/global_tunables.xml b/doc/global_tunables.xml new file mode 100644 index 00000000..c026deaf --- /dev/null +++ b/doc/global_tunables.xml @@ -0,0 +1,108 @@ +<tunable name="allow_execheap" dftval="false"> +<desc> +<p> +Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla +</p> +</desc> +</tunable> +<tunable name="allow_execmem" dftval="false"> +<desc> +<p> +Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla") +</p> +</desc> +</tunable> +<tunable name="allow_execmod" dftval="false"> +<desc> +<p> +Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t") +</p> +</desc> +</tunable> +<tunable name="allow_execstack" dftval="false"> +<desc> +<p> +Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla") +</p> +</desc> +</tunable> +<tunable name="allow_polyinstantiation" dftval="false"> +<desc> +<p> +Enable polyinstantiated directory support. +</p> +</desc> +</tunable> +<tunable name="allow_ypbind" dftval="false"> +<desc> +<p> +Allow system to run with NIS +</p> +</desc> +</tunable> +<tunable name="console_login" dftval="true"> +<desc> +<p> +Allow logging in and using the system from /dev/console. +</p> +</desc> +</tunable> +<tunable name="global_ssp" dftval="false"> +<desc> +<p> +Enable reading of urandom for all domains. +</p> +<p> +This should be enabled when all programs +are compiled with ProPolice/SSP +stack smashing protection. All domains will +be allowed to read from /dev/urandom. +</p> +</desc> +</tunable> +<tunable name="mail_read_content" dftval="false"> +<desc> +<p> +Allow email client to various content. +nfs, samba, removable devices, and user temp +files +</p> +</desc> +</tunable> +<tunable name="nfs_export_all_rw" dftval="false"> +<desc> +<p> +Allow any files/directories to be exported read/write via NFS. +</p> +</desc> +</tunable> +<tunable name="nfs_export_all_ro" dftval="false"> +<desc> +<p> +Allow any files/directories to be exported read/only via NFS. +</p> +</desc> +</tunable> +<tunable name="use_nfs_home_dirs" dftval="false"> +<desc> +<p> +Support NFS home directories +</p> +</desc> +</tunable> +<tunable name="use_samba_home_dirs" dftval="false"> +<desc> +<p> +Support SAMBA home directories +</p> +</desc> +</tunable> +<tunable name="user_tcp_server" dftval="false"> +<desc> +<p> +Allow users to run TCP servers (bind to ports and accept connection from +the same domain and outside users) disabling this forces FTP passive mode +and may change other protocols. +</p> +</desc> +</tunable> diff --git a/doc/policy.dtd b/doc/policy.dtd new file mode 100644 index 00000000..b797f712 --- /dev/null +++ b/doc/policy.dtd @@ -0,0 +1,44 @@ +<!ENTITY % inline.class "pre|p|ul|ol|li"> + +<!ELEMENT policy (layer+,(tunable|bool)*)> +<!ELEMENT layer (summary,module+)> +<!ATTLIST layer + name CDATA #REQUIRED> +<!ELEMENT module (summary,desc?,required?,(interface|template)*,(bool|tunable)*)> +<!ATTLIST module + name CDATA #REQUIRED + filename CDATA #REQUIRED> +<!ELEMENT required (#PCDATA)> +<!ATTLIST required + val (true|false) "false"> +<!ELEMENT tunable (desc)> +<!ATTLIST tunable + name CDATA #REQUIRED + dftval CDATA #REQUIRED> +<!ELEMENT bool (desc)> +<!ATTLIST bool + name CDATA #REQUIRED + dftval CDATA #REQUIRED> +<!ELEMENT summary (#PCDATA)> +<!ELEMENT interface (summary,desc?,param+,infoflow?,(rolebase|rolecap)?)> +<!ATTLIST interface name CDATA #REQUIRED lineno CDATA #REQUIRED> +<!ELEMENT template (summary,desc?,param+,(rolebase|rolecap)?)> +<!ATTLIST template name CDATA #REQUIRED lineno CDATA #REQUIRED> +<!ELEMENT desc (#PCDATA|%inline.class;)*> +<!ELEMENT param (summary)> +<!ATTLIST param + name CDATA #REQUIRED + optional (true|false) "false" + unused (true|false) "false"> +<!ELEMENT infoflow EMPTY> +<!ATTLIST infoflow + type CDATA #REQUIRED + weight CDATA #IMPLIED> +<!ELEMENT rolebase EMPTY> +<!ELEMENT rolecap EMPTY> + +<!ATTLIST pre caption CDATA #IMPLIED> +<!ELEMENT p (#PCDATA|%inline.class;)*> +<!ELEMENT ul (li+)> +<!ELEMENT ol (li+)> +<!ELEMENT li (#PCDATA|%inline.class;)*> diff --git a/doc/policy.xml b/doc/policy.xml new file mode 100644 index 00000000..92615add --- /dev/null +++ b/doc/policy.xml @@ -0,0 +1,91784 @@ +<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?> +<!DOCTYPE policy SYSTEM "policy.dtd"> +<policy> +<layer name="admin"> +<summary> + Policy modules for administrative functions, such as package management. +</summary> +<module name="bootloader" filename="policy/modules/admin/bootloader.if"> +<summary>Policy for the kernel modules, kernel image, and bootloader.</summary> +<interface name="bootloader_domtrans" lineno="13"> +<summary> +Execute bootloader in the bootloader domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bootloader_run" lineno="39"> +<summary> +Execute bootloader interactively and do +a domain transition to the bootloader domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="bootloader_read_config" lineno="58"> +<summary> +Read the bootloader configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bootloader_rw_config" lineno="78"> +<summary> +Read and write the bootloader +configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="bootloader_rw_tmp_files" lineno="97"> +<summary> +Read and write the bootloader +temporary data in /tmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bootloader_create_runtime_file" lineno="117"> +<summary> +Read and write the bootloader +temporary data in /tmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="consoletype" filename="policy/modules/admin/consoletype.if"> +<summary> +Determine of the console connected to the controlling terminal. +</summary> +<interface name="consoletype_domtrans" lineno="15"> +<summary> +Execute consoletype in the consoletype domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="consoletype_run" lineno="44"> +<summary> +Execute consoletype in the consoletype domain, and +allow the specified role the consoletype domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="consoletype_exec" lineno="64"> +<summary> +Execute consoletype in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dmesg" filename="policy/modules/admin/dmesg.if"> +<summary>Policy for dmesg.</summary> +<interface name="dmesg_domtrans" lineno="13"> +<summary> +Execute dmesg in the dmesg domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dmesg_exec" lineno="33"> +<summary> +Execute dmesg in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="netutils" filename="policy/modules/admin/netutils.if"> +<summary>Network analysis utilities</summary> +<interface name="netutils_domtrans" lineno="13"> +<summary> +Execute network utilities in the netutils domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="netutils_run" lineno="39"> +<summary> +Execute network utilities in the netutils domain, and +allow the specified role the netutils domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="netutils_exec" lineno="58"> +<summary> +Execute network utilities in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="netutils_signal" lineno="77"> +<summary> +Send generic signals to network utilities. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="netutils_domtrans_ping" lineno="95"> +<summary> +Execute ping in the ping domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="netutils_kill_ping" lineno="114"> +<summary> +Send a kill (SIGKILL) signal to ping. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="netutils_signal_ping" lineno="132"> +<summary> +Send generic signals to ping. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="netutils_run_ping" lineno="157"> +<summary> +Execute ping in the ping domain, and +allow the specified role the ping domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="netutils_run_ping_cond" lineno="183"> +<summary> +Conditionally execute ping in the ping domain, and +allow the specified role the ping domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="netutils_exec_ping" lineno="206"> +<summary> +Execute ping in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="netutils_domtrans_traceroute" lineno="225"> +<summary> +Execute traceroute in the traceroute domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="netutils_run_traceroute" lineno="251"> +<summary> +Execute traceroute in the traceroute domain, and +allow the specified role the traceroute domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="netutils_run_traceroute_cond" lineno="277"> +<summary> +Conditionally execute traceroute in the traceroute domain, and +allow the specified role the traceroute domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="netutils_exec_traceroute" lineno="300"> +<summary> +Execute traceroute in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="user_ping" dftval="false"> +<desc> +<p> +Control users use of ping and traceroute +</p> +</desc> +</tunable> +</module> +<module name="su" filename="policy/modules/admin/su.if"> +<summary>Run shells with substitute user and group</summary> +<template name="su_restricted_domain_template" lineno="31"> +<summary> +Restricted su domain template. +</summary> +<desc> +<p> +This template creates a derived domain which is allowed +to change the linux user id, to run shells as a different +user. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +</template> +<template name="su_role_template" lineno="162"> +<summary> +The role template for the su module. +</summary> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="su_exec" lineno="328"> +<summary> +Execute su in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="sudo" filename="policy/modules/admin/sudo.if"> +<summary>Execute a command with a substitute user</summary> +<template name="sudo_role_template" lineno="31"> +<summary> +The role template for the sudo module. +</summary> +<desc> +<p> +This template creates a derived domain which is allowed +to change the linux user id, to run commands as a different +user. +</p> +</desc> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_role"> +<summary> +The user role. +</summary> +</param> +<param name="user_domain"> +<summary> +The user domain associated with the role. +</summary> +</param> +</template> +<interface name="sudo_sigchld" lineno="172"> +<summary> +Send a SIGCHLD signal to the sudo domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="usermanage" filename="policy/modules/admin/usermanage.if"> +<summary>Policy for managing user accounts.</summary> +<interface name="usermanage_domtrans_chfn" lineno="13"> +<summary> +Execute chfn in the chfn domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usermanage_run_chfn" lineno="42"> +<summary> +Execute chfn in the chfn domain, and +allow the specified role the chfn domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="usermanage_domtrans_groupadd" lineno="61"> +<summary> +Execute groupadd in the groupadd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usermanage_run_groupadd" lineno="91"> +<summary> +Execute groupadd in the groupadd domain, and +allow the specified role the groupadd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="usermanage_domtrans_passwd" lineno="110"> +<summary> +Execute passwd in the passwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usermanage_kill_passwd" lineno="133"> +<summary> +Send sigkills to passwd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="usermanage_run_passwd" lineno="157"> +<summary> +Execute passwd in the passwd domain, and +allow the specified role the passwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="usermanage_domtrans_admin_passwd" lineno="177"> +<summary> +Execute password admin functions in +the admin passwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usermanage_run_admin_passwd" lineno="204"> +<summary> +Execute passwd admin functions in the admin +passwd domain, and allow the specified role +the admin passwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="usermanage_dontaudit_use_useradd_fds" lineno="223"> +<summary> +Do not audit attempts to use useradd fds. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="usermanage_domtrans_useradd" lineno="241"> +<summary> +Execute useradd in the useradd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usermanage_run_useradd" lineno="271"> +<summary> +Execute useradd in the useradd domain, and +allow the specified role the useradd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="usermanage_read_crack_db" lineno="290"> +<summary> +Read the crack database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +</layer> +<layer name="apps"> +<summary>Policy modules for applications</summary> +<module name="seunshare" filename="policy/modules/apps/seunshare.if"> +<summary>Filesystem namespacing/polyinstantiation application.</summary> +<interface name="seunshare_domtrans" lineno="13"> +<summary> +Execute a domain transition to run seunshare. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seunshare_run" lineno="37"> +<summary> +Execute seunshare in the seunshare domain, and +allow the specified role the seunshare domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="seunshare_role" lineno="69"> +<summary> +Role access for seunshare +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role. +</summary> +</param> +</interface> +</module> +</layer> +<layer name="contrib"> +<summary>Contributed Reference Policy modules.</summary> +<module name="abrt" filename="policy/modules/contrib/abrt.if"> +<summary>ABRT - automated bug-reporting tool</summary> +<interface name="abrt_domtrans" lineno="13"> +<summary> +Execute abrt in the abrt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="abrt_exec" lineno="32"> +<summary> +Execute abrt in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_signull" lineno="51"> +<summary> +Send a null signal to abrt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_read_state" lineno="69"> +<summary> +Allow the domain to read abrt state files in /proc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_stream_connect" lineno="87"> +<summary> +Connect to abrt over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_dbus_chat" lineno="107"> +<summary> +Send and receive messages from +abrt over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_domtrans_helper" lineno="127"> +<summary> +Execute abrt-helper in the abrt-helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="abrt_run_helper" lineno="152"> +<summary> +Execute abrt helper in the abrt_helper domain, and +allow the specified role the abrt_helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="abrt_cache_manage" lineno="172"> +<summary> +Send and receive messages from +abrt over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_read_config" lineno="190"> +<summary> +Read abrt configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_read_log" lineno="209"> +<summary> +Read abrt logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_read_pid_files" lineno="228"> +<summary> +Read abrt PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_manage_pid_files" lineno="247"> +<summary> +Create, read, write, and delete abrt PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="abrt_admin" lineno="273"> +<summary> +All of the rules required to administrate +an abrt environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the abrt domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="accountsd" filename="policy/modules/contrib/accountsd.if"> +<summary>AccountsService and daemon for manipulating user account information via D-Bus</summary> +<interface name="accountsd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run accountsd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_dontaudit_rw_fifo_file" lineno="32"> +<summary> +Do not audit attempts to read and write Accounts Daemon +fifo file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_dbus_chat" lineno="51"> +<summary> +Send and receive messages from +accountsd over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_search_lib" lineno="71"> +<summary> +Search accountsd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_read_lib_files" lineno="90"> +<summary> +Read accountsd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_manage_lib_files" lineno="110"> +<summary> +Create, read, write, and delete +accountsd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="accountsd_admin" lineno="136"> +<summary> +All of the rules required to administrate +an accountsd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="acct" filename="policy/modules/contrib/acct.if"> +<summary>Berkeley process accounting</summary> +<interface name="acct_domtrans" lineno="13"> +<summary> +Transition to the accounting management domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="acct_exec" lineno="32"> +<summary> +Execute accounting management tools in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="acct_exec_data" lineno="53"> +<summary> +Execute accounting management data in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="acct_manage_data" lineno="72"> +<summary> +Create, read, write, and delete process accounting data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="ada" filename="policy/modules/contrib/ada.if"> +<summary>GNAT Ada95 compiler</summary> +<interface name="ada_domtrans" lineno="13"> +<summary> +Execute the ada program in the ada domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ada_run" lineno="38"> +<summary> +Execute ada in the ada domain, and +allow the specified role the ada domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +<module name="afs" filename="policy/modules/contrib/afs.if"> +<summary>Andrew Filesystem server</summary> +<interface name="afs_domtrans" lineno="14"> +<summary> +Execute a domain transition to run the +afs client. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="afs_rw_udp_sockets" lineno="33"> +<summary> +Read and write afs client UDP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="afs_rw_cache" lineno="51"> +<summary> +read/write afs cache files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="afs_initrc_domtrans" lineno="70"> +<summary> +Execute afs server in the afs domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="afs_admin" lineno="95"> +<summary> +All of the rules required to administrate +an afs environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the afs domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="aiccu" filename="policy/modules/contrib/aiccu.if"> +<summary>Automatic IPv6 Connectivity Client Utility.</summary> +<interface name="aiccu_domtrans" lineno="13"> +<summary> +Execute a domain transition to run aiccu. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="aiccu_initrc_domtrans" lineno="32"> +<summary> +Execute aiccu server in the aiccu domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="aiccu_read_pid_files" lineno="50"> +<summary> +Read aiccu PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="aiccu_admin" lineno="76"> +<summary> +All of the rules required to administrate +an aiccu environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="aide" filename="policy/modules/contrib/aide.if"> +<summary>Aide filesystem integrity checker</summary> +<interface name="aide_domtrans" lineno="13"> +<summary> +Execute aide in the aide domain +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="aide_run" lineno="37"> +<summary> +Execute aide programs in the AIDE domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the AIDE domain. +</summary> +</param> +</interface> +<interface name="aide_admin" lineno="58"> +<summary> +All of the rules required to administrate +an aide environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="aisexec" filename="policy/modules/contrib/aisexec.if"> +<summary>Aisexec Cluster Engine</summary> +<interface name="aisexec_domtrans" lineno="13"> +<summary> +Execute a domain transition to run aisexec. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="aisexec_stream_connect" lineno="32"> +<summary> +Connect to aisexec over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="aisexec_read_log" lineno="51"> +<summary> +Allow the specified domain to read aisexec's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="aisexecd_admin" lineno="78"> +<summary> +All of the rules required to administrate +an aisexec environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the aisexecd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="alsa" filename="policy/modules/contrib/alsa.if"> +<summary>Ainit ALSA configuration tool.</summary> +<interface name="alsa_domtrans" lineno="13"> +<summary> +Execute a domain transition to run Alsa. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="alsa_run" lineno="39"> +<summary> +Execute a domain transition to run +Alsa, and allow the specified role +the Alsa domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="alsa_rw_semaphores" lineno="58"> +<summary> +Read and write Alsa semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_rw_shared_mem" lineno="76"> +<summary> +Read and write Alsa shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_read_rw_config" lineno="94"> +<summary> +Read writable Alsa config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_manage_rw_config" lineno="119"> +<summary> +Manage writable Alsa config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_manage_home_files" lineno="144"> +<summary> +Manage alsa home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_read_home_files" lineno="163"> +<summary> +Read Alsa home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_relabel_home_files" lineno="182"> +<summary> +Relabel alsa home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="alsa_read_lib" lineno="201"> +<summary> +Read Alsa lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="amanda" filename="policy/modules/contrib/amanda.if"> +<summary>Advanced Maryland Automatic Network Disk Archiver.</summary> +<interface name="amanda_domtrans_recover" lineno="14"> +<summary> +Execute a domain transition to run +Amanda recover. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="amanda_run_recover" lineno="41"> +<summary> +Execute a domain transition to run +Amanda recover, and allow the specified +role the Amanda recover domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="amanda_search_lib" lineno="60"> +<summary> +Search Amanda library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amanda_dontaudit_read_dumpdates" lineno="79"> +<summary> +Do not audit attempts to read /etc/dumpdates. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="amanda_rw_dumpdates_files" lineno="97"> +<summary> +Read and write /etc/dumpdates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amanda_manage_lib" lineno="116"> +<summary> +Search Amanda library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amanda_append_log_files" lineno="135"> +<summary> +Read and append amanda logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amanda_search_var_lib" lineno="154"> +<summary> +Search Amanda var library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="amavis" filename="policy/modules/contrib/amavis.if"> +<summary> +Daemon that interfaces mail transfer agents and content +checkers, such as virus scanners. +</summary> +<interface name="amavis_domtrans" lineno="16"> +<summary> +Execute a domain transition to run amavis. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="amavis_initrc_domtrans" lineno="35"> +<summary> +Execute amavis server in the amavis domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="amavis_read_spool_files" lineno="53"> +<summary> +Read amavis spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_manage_spool_files" lineno="72"> +<summary> +Manage amavis spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_spool_filetrans" lineno="103"> +<summary> +Create objects in the amavis spool directories +with a private type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +Private file type. +</summary> +</param> +<param name="object_class"> +<summary> +Class of the object being created. +</summary> +</param> +</interface> +<interface name="amavis_search_lib" lineno="122"> +<summary> +Search amavis lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_read_lib_files" lineno="141"> +<summary> +Read amavis lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_manage_lib_files" lineno="162"> +<summary> +Create, read, write, and delete +amavis lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_setattr_pid_files" lineno="181"> +<summary> +Set the attributes of amavis pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_create_pid_files" lineno="200"> +<summary> +Create of amavis pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="amavis_admin" lineno="226"> +<summary> +All of the rules required to administrate +an amavis environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="amtu" filename="policy/modules/contrib/amtu.if"> +<summary>Abstract Machine Test Utility.</summary> +<interface name="amtu_domtrans" lineno="13"> +<summary> +Execute a domain transition to run Amtu. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="amtu_run" lineno="39"> +<summary> +Execute a domain transition to run +Amtu, and allow the specified role +the Amtu domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +<module name="anaconda" filename="policy/modules/contrib/anaconda.if"> +<summary>Anaconda installer.</summary> +</module> +<module name="apache" filename="policy/modules/contrib/apache.if"> +<summary>Apache web server</summary> +<template name="apache_content_template" lineno="14"> +<summary> +Create a set of derived types for apache +web content. +</summary> +<param name="prefix"> +<summary> +The prefix to be used for deriving type names. +</summary> +</param> +</template> +<interface name="apache_role" lineno="211"> +<summary> +Role access for apache +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="apache_read_user_scripts" lineno="271"> +<summary> +Read httpd user scripts executables. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_read_user_content" lineno="291"> +<summary> +Read user web content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_domtrans" lineno="311"> +<summary> +Transition to apache. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apache_signal" lineno="330"> +<summary> +Send a generic signal to apache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_signull" lineno="348"> +<summary> +Send a null signal to apache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_sigchld" lineno="366"> +<summary> +Send a SIGCHLD signal to apache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_use_fds" lineno="384"> +<summary> +Inherit and use file descriptors from Apache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_rw_fifo_file" lineno="403"> +<summary> +Do not audit attempts to read and write Apache +unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_rw_stream_sockets" lineno="422"> +<summary> +Do not audit attempts to read and write Apache +unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_rw_tcp_sockets" lineno="441"> +<summary> +Do not audit attempts to read and write Apache +TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_manage_all_content" lineno="460"> +<summary> +Create, read, write, and delete all web content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_setattr_cache_dirs" lineno="485"> +<summary> +Allow domain to set the attributes +of the APACHE cache directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_list_cache" lineno="504"> +<summary> +Allow the specified domain to list +Apache cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_rw_cache_files" lineno="523"> +<summary> +Allow the specified domain to read +and write Apache cache files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_delete_cache_files" lineno="542"> +<summary> +Allow the specified domain to delete +Apache cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_read_config" lineno="562"> +<summary> +Allow the specified domain to read +apache configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_manage_config" lineno="584"> +<summary> +Allow the specified domain to manage +apache configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_domtrans_helper" lineno="606"> +<summary> +Execute the Apache helper program with +a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_run_helper" lineno="633"> +<summary> +Execute the Apache helper program with +a domain transition, and allow the +specified role the Apache helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_read_log" lineno="654"> +<summary> +Allow the specified domain to read +apache log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_append_log" lineno="676"> +<summary> +Allow the specified domain to append +to apache log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_append_log" lineno="697"> +<summary> +Do not audit attempts to append to the +Apache logs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_manage_log" lineno="716"> +<summary> +Allow the specified domain to manage +to apache log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_search_modules" lineno="738"> +<summary> +Do not audit attempts to search Apache +module directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_list_modules" lineno="758"> +<summary> +Allow the specified domain to list +the contents of the apache modules +directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_exec_modules" lineno="777"> +<summary> +Allow the specified domain to execute +apache modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_domtrans_rotatelogs" lineno="797"> +<summary> +Execute a domain transition to run httpd_rotatelogs. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apache_list_sys_content" lineno="816"> +<summary> +Allow the specified domain to list +apache system content files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_manage_sys_content" lineno="838"> +<summary> +Allow the specified domain to manage +apache system content files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_domtrans_sys_script" lineno="862"> +<summary> +Execute all web scripts in the system +script domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_rw_sys_script_stream_sockets" lineno="884"> +<summary> +Do not audit attempts to read and write Apache +system script unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_domtrans_all_scripts" lineno="903"> +<summary> +Execute all user scripts in the user +script domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apache_run_all_scripts" lineno="928"> +<summary> +Execute all user scripts in the user +script domain. Add user script domains +to the specified role. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access.. +</summary> +</param> +</interface> +<interface name="apache_read_squirrelmail_data" lineno="948"> +<summary> +Allow the specified domain to read +apache squirrelmail data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_append_squirrelmail_data" lineno="967"> +<summary> +Allow the specified domain to append +apache squirrelmail data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_search_sys_content" lineno="985"> +<summary> +Search apache system content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_read_sys_content" lineno="1003"> +<summary> +Read apache system content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_search_sys_scripts" lineno="1023"> +<summary> +Search apache system CGI directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_manage_all_user_content" lineno="1042"> +<summary> +Create, read, write, and delete all user web content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apache_search_sys_script_state" lineno="1066"> +<summary> +Search system script state directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_read_tmp_files" lineno="1085"> +<summary> +Allow the specified domain to read +apache tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apache_dontaudit_write_tmp_files" lineno="1105"> +<summary> +Dontaudit attempts to write +apache tmp files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apache_cgi_domain" lineno="1138"> +<summary> +Execute CGI in the specified domain. +</summary> +<desc> +<p> +Execute CGI in the specified domain. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain run the cgi script in. +</summary> +</param> +<param name="entrypoint"> +<summary> +Type of the executable to enter the cgi domain. +</summary> +</param> +</interface> +<interface name="apache_admin" lineno="1171"> +<summary> +All of the rules required to administrate an apache environment +</summary> +<param name="prefix"> +<summary> +Prefix of the domain. Example, user would be +the prefix for the uder_t domain. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_httpd_anon_write" dftval="false"> +<desc> +<p> +Allow Apache to modify public files +used for public file transfer services. Directories/Files must +be labeled public_content_rw_t. +</p> +</desc> +</tunable> +<tunable name="allow_httpd_mod_auth_pam" dftval="false"> +<desc> +<p> +Allow Apache to use mod_auth_pam +</p> +</desc> +</tunable> +<tunable name="httpd_builtin_scripting" dftval="false"> +<desc> +<p> +Allow httpd to use built in scripting (usually php) +</p> +</desc> +</tunable> +<tunable name="httpd_can_network_connect" dftval="false"> +<desc> +<p> +Allow HTTPD scripts and modules to connect to the network using TCP. +</p> +</desc> +</tunable> +<tunable name="httpd_can_network_connect_db" dftval="false"> +<desc> +<p> +Allow HTTPD scripts and modules to connect to databases over the network. +</p> +</desc> +</tunable> +<tunable name="httpd_can_network_relay" dftval="false"> +<desc> +<p> +Allow httpd to act as a relay +</p> +</desc> +</tunable> +<tunable name="httpd_can_sendmail" dftval="false"> +<desc> +<p> +Allow http daemon to send mail +</p> +</desc> +</tunable> +<tunable name="httpd_dbus_avahi" dftval="false"> +<desc> +<p> +Allow Apache to communicate with avahi service via dbus +</p> +</desc> +</tunable> +<tunable name="httpd_enable_cgi" dftval="false"> +<desc> +<p> +Allow httpd cgi support +</p> +</desc> +</tunable> +<tunable name="httpd_enable_ftp_server" dftval="false"> +<desc> +<p> +Allow httpd to act as a FTP server by +listening on the ftp port. +</p> +</desc> +</tunable> +<tunable name="httpd_enable_homedirs" dftval="false"> +<desc> +<p> +Allow httpd to read home directories +</p> +</desc> +</tunable> +<tunable name="httpd_ssi_exec" dftval="false"> +<desc> +<p> +Allow HTTPD to run SSI executables in the same domain as system CGI scripts. +</p> +</desc> +</tunable> +<tunable name="httpd_tty_comm" dftval="false"> +<desc> +<p> +Unify HTTPD to communicate with the terminal. +Needed for entering the passphrase for certificates at +the terminal. +</p> +</desc> +</tunable> +<tunable name="httpd_unified" dftval="false"> +<desc> +<p> +Unify HTTPD handling of all content files. +</p> +</desc> +</tunable> +<tunable name="httpd_use_cifs" dftval="false"> +<desc> +<p> +Allow httpd to access cifs file systems +</p> +</desc> +</tunable> +<tunable name="httpd_use_gpg" dftval="false"> +<desc> +<p> +Allow httpd to run gpg +</p> +</desc> +</tunable> +<tunable name="httpd_use_nfs" dftval="false"> +<desc> +<p> +Allow httpd to access nfs file systems +</p> +</desc> +</tunable> +</module> +<module name="apcupsd" filename="policy/modules/contrib/apcupsd.if"> +<summary>APC UPS monitoring daemon</summary> +<interface name="apcupsd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run apcupsd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apcupsd_initrc_domtrans" lineno="32"> +<summary> +Execute apcupsd server in the apcupsd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apcupsd_read_pid_files" lineno="50"> +<summary> +Read apcupsd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apcupsd_read_log" lineno="70"> +<summary> +Allow the specified domain to read apcupsd's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apcupsd_append_log" lineno="91"> +<summary> +Allow the specified domain to append +apcupsd log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apcupsd_cgi_script_domtrans" lineno="111"> +<summary> +Execute a domain transition to run httpd_apcupsd_cgi_script. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apcupsd_admin" lineno="141"> +<summary> +All of the rules required to administrate +an apcupsd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the apcupsd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="apm" filename="policy/modules/contrib/apm.if"> +<summary>Advanced power management daemon</summary> +<interface name="apm_domtrans_client" lineno="13"> +<summary> +Execute APM in the apm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apm_use_fds" lineno="32"> +<summary> +Use file descriptors for apmd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apm_write_pipes" lineno="50"> +<summary> +Write to apmd unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apm_rw_stream_sockets" lineno="68"> +<summary> +Read and write to an apm unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apm_append_log" lineno="86"> +<summary> +Append to apm's log file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apm_stream_connect" lineno="105"> +<summary> +Connect to apmd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="apt" filename="policy/modules/contrib/apt.if"> +<summary>APT advanced package tool.</summary> +<interface name="apt_domtrans" lineno="13"> +<summary> +Execute apt programs in the apt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="apt_run" lineno="39"> +<summary> +Execute apt programs in the apt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the apt domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="apt_use_fds" lineno="59"> +<summary> +Inherit and use file descriptors from apt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_dontaudit_use_fds" lineno="78"> +<summary> +Do not audit attempts to use file descriptors from apt. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="apt_read_pipes" lineno="96"> +<summary> +Read from an unnamed apt pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_rw_pipes" lineno="115"> +<summary> +Read and write an unnamed apt pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_use_ptys" lineno="134"> +<summary> +Read from and write to apt ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_read_cache" lineno="152"> +<summary> +Read the apt package cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_read_db" lineno="173"> +<summary> +Read the apt package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_manage_db" lineno="194"> +<summary> +Create, read, write, and delete the apt package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="apt_dontaudit_manage_db" lineno="217"> +<summary> +Do not audit attempts to create, read, +write, and delete the apt package database. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +</module> +<module name="arpwatch" filename="policy/modules/contrib/arpwatch.if"> +<summary>Ethernet activity monitor.</summary> +<interface name="arpwatch_initrc_domtrans" lineno="13"> +<summary> +Execute arpwatch server in the arpwatch domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="arpwatch_search_data" lineno="31"> +<summary> +Search arpwatch's data file directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="arpwatch_manage_data_files" lineno="50"> +<summary> +Create arpwatch data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="arpwatch_rw_tmp_files" lineno="69"> +<summary> +Read and write arpwatch temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="arpwatch_manage_tmp_files" lineno="88"> +<summary> +Read and write arpwatch temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="arpwatch_dontaudit_rw_packet_sockets" lineno="108"> +<summary> +Do not audit attempts to read and write +arpwatch packet sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="arpwatch_admin" lineno="133"> +<summary> +All of the rules required to administrate +an arpwatch environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the arpwatch domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="asterisk" filename="policy/modules/contrib/asterisk.if"> +<summary>Asterisk IP telephony server</summary> +<interface name="asterisk_domtrans" lineno="13"> +<summary> +Execute asterisk in the asterisk domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="asterisk_stream_connect" lineno="33"> +<summary> +Connect to asterisk over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="asterisk_admin" lineno="59"> +<summary> +All of the rules required to administrate +an asterisk environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the asterisk domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="authbind" filename="policy/modules/contrib/authbind.if"> +<summary>Tool for non-root processes to bind to reserved ports</summary> +<interface name="authbind_domtrans" lineno="13"> +<summary> +Use authbind to bind to a reserved port. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="automount" filename="policy/modules/contrib/automount.if"> +<summary>Filesystem automounter service.</summary> +<interface name="automount_domtrans" lineno="13"> +<summary> +Execute automount in the automount domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="automount_signal" lineno="33"> +<summary> +Send automount a signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="automount_exec_config" lineno="51"> +<summary> +Execute automount in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="automount_read_state" lineno="66"> +<summary> +Allow the domain to read state files in /proc. +</summary> +<param name="domain"> +<summary> +Domain to allow access. +</summary> +</param> +</interface> +<interface name="automount_dontaudit_use_fds" lineno="84"> +<summary> +Do not audit attempts to file descriptors for automount. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="automount_dontaudit_write_pipes" lineno="102"> +<summary> +Do not audit attempts to write automount daemon unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="automount_dontaudit_getattr_tmp_dirs" lineno="121"> +<summary> +Do not audit attempts to get the attributes +of automount temporary directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="automount_admin" lineno="146"> +<summary> +All of the rules required to administrate +an automount environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the automount domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="avahi" filename="policy/modules/contrib/avahi.if"> +<summary>mDNS/DNS-SD daemon implementing Apple ZeroConf architecture</summary> +<interface name="avahi_domtrans" lineno="13"> +<summary> +Execute avahi server in the avahi domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="avahi_signal" lineno="32"> +<summary> +Send avahi a signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="avahi_kill" lineno="50"> +<summary> +Send avahi a kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="avahi_signull" lineno="68"> +<summary> +Send avahi a signull +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="avahi_dbus_chat" lineno="87"> +<summary> +Send and receive messages from +avahi over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="avahi_stream_connect" lineno="107"> +<summary> +Connect to avahi using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="avahi_dontaudit_search_pid" lineno="126"> +<summary> +Do not audit attempts to search the avahi pid directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="avahi_admin" lineno="151"> +<summary> +All of the rules required to administrate +an avahi environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the avahi domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="awstats" filename="policy/modules/contrib/awstats.if"> +<summary> +AWStats is a free powerful and featureful tool that generates advanced +web, streaming, ftp or mail server statistics, graphically. +</summary> +<interface name="awstats_rw_pipes" lineno="16"> +<summary> +Read and write awstats unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="awstats_cgi_exec" lineno="34"> +<summary> +Execute awstats cgi scripts in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="backup" filename="policy/modules/contrib/backup.if"> +<summary>System backup scripts</summary> +<interface name="backup_domtrans" lineno="13"> +<summary> +Execute backup in the backup domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="backup_run" lineno="38"> +<summary> +Execute backup in the backup domain, and +allow the specified role the backup domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="bind" filename="policy/modules/contrib/bind.if"> +<summary>Berkeley internet name domain DNS server.</summary> +<interface name="bind_initrc_domtrans" lineno="13"> +<summary> +Execute bind server in the bind domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bind_domtrans_ndc" lineno="31"> +<summary> +Execute ndc in the ndc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bind_signal" lineno="49"> +<summary> +Send generic signals to BIND. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_signull" lineno="67"> +<summary> +Send null sigals to BIND. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_kill" lineno="85"> +<summary> +Send BIND the kill signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_run_ndc" lineno="110"> +<summary> +Execute ndc in the ndc domain, and +allow the specified role the ndc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="bind_domtrans" lineno="129"> +<summary> +Execute bind in the named domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bind_read_dnssec_keys" lineno="147"> +<summary> +Read DNSSEC keys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_read_config" lineno="165"> +<summary> +Read BIND named configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_write_config" lineno="183"> +<summary> +Write BIND named configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_manage_config_dirs" lineno="203"> +<summary> +Create, read, write, and delete +BIND configuration directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_search_cache" lineno="221"> +<summary> +Search the BIND cache directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_manage_cache" lineno="243"> +<summary> +Create, read, write, and delete +BIND cache files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_setattr_pid_dirs" lineno="264"> +<summary> +Set the attributes of the BIND pid directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_setattr_zone_dirs" lineno="282"> +<summary> +Set the attributes of the BIND zone directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_read_zone" lineno="300"> +<summary> +Read BIND zone files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_manage_zone" lineno="319"> +<summary> +Manage BIND zone files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_udp_chat_named" lineno="338"> +<summary> +Send and receive datagrams to and from named. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bind_admin" lineno="359"> +<summary> +All of the rules required to administrate +an bind environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the bind domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="named_write_master_zones" dftval="false"> +<desc> +<p> +Allow BIND to write the master zone files. +Generally this is used for dynamic DNS or zone transfers. +</p> +</desc> +</tunable> +</module> +<module name="bitlbee" filename="policy/modules/contrib/bitlbee.if"> +<summary>Bitlbee service</summary> +<interface name="bitlbee_read_config" lineno="13"> +<summary> +Read bitlbee configuration files +</summary> +<param name="domain"> +<summary> +Domain allowed accesss. +</summary> +</param> +</interface> +<interface name="bitlbee_admin" lineno="40"> +<summary> +All of the rules required to administrate +an bitlbee environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the bitlbee domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="bluetooth" filename="policy/modules/contrib/bluetooth.if"> +<summary>Bluetooth tools and system services.</summary> +<interface name="bluetooth_role" lineno="18"> +<summary> +Role access for bluetooth +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="bluetooth_stream_connect" lineno="51"> +<summary> +Connect to bluetooth over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bluetooth_domtrans" lineno="71"> +<summary> +Execute bluetooth in the bluetooth domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bluetooth_read_config" lineno="89"> +<summary> +Read bluetooth daemon configuration. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bluetooth_dbus_chat" lineno="108"> +<summary> +Send and receive messages from +bluetooth over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bluetooth_domtrans_helper" lineno="128"> +<summary> +Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="bluetooth_run_helper" lineno="154"> +<summary> +Execute bluetooth_helper in the bluetooth_helper domain, and +allow the specified role the bluetooth_helper domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="terminal"> +<summary> +The type of the terminal allow the bluetooth_helper domain to use. +</summary> +</param> +<rolecap/> +</interface> +<interface name="bluetooth_dontaudit_read_helper_state" lineno="168"> +<summary> +Read bluetooth helper state files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="bluetooth_admin" lineno="194"> +<summary> +All of the rules required to administrate +an bluetooth environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the bluetooth domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="brctl" filename="policy/modules/contrib/brctl.if"> +<summary>Utilities for configuring the linux ethernet bridge</summary> +<interface name="brctl_domtrans" lineno="13"> +<summary> +Execute a domain transition to run brctl. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="bugzilla" filename="policy/modules/contrib/bugzilla.if"> +<summary>Bugzilla server</summary> +<interface name="bugzilla_search_content" lineno="14"> +<summary> +Allow the specified domain to search +bugzilla directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="bugzilla_dontaudit_rw_stream_sockets" lineno="33"> +<summary> +Do not audit attempts to read and write +bugzilla script unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="bugzilla_admin" lineno="58"> +<summary> +All of the rules required to administrate +an bugzilla environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the bugzilla domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="calamaris" filename="policy/modules/contrib/calamaris.if"> +<summary>Squid log analysis</summary> +<interface name="calamaris_read_www_files" lineno="13"> +<summary> +Allow domain to read calamaris www files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="canna" filename="policy/modules/contrib/canna.if"> +<summary>Canna - kana-kanji conversion server</summary> +<interface name="canna_stream_connect" lineno="13"> +<summary> +Connect to Canna using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="canna_admin" lineno="39"> +<summary> +All of the rules required to administrate +an canna environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the canna domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ccs" filename="policy/modules/contrib/ccs.if"> +<summary>Cluster Configuration System</summary> +<interface name="ccs_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ccs. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ccs_stream_connect" lineno="31"> +<summary> +Connect to ccs over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ccs_read_config" lineno="50"> +<summary> +Read cluster configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ccs_manage_config" lineno="68"> +<summary> +Manage cluster configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="cdrecord" filename="policy/modules/contrib/cdrecord.if"> +<summary>Policy for cdrecord</summary> +<interface name="cdrecord_role" lineno="18"> +<summary> +Role access for cdrecord +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<tunable name="cdrecord_read_content" dftval="false"> +<desc> +<p> +Allow cdrecord to read various content. +nfs, samba, removable devices, user temp +and untrusted content files +</p> +</desc> +</tunable> +</module> +<module name="certmaster" filename="policy/modules/contrib/certmaster.if"> +<summary>Certmaster SSL certificate distribution service</summary> +<interface name="certmaster_domtrans" lineno="13"> +<summary> +Execute a domain transition to run certmaster. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="certmaster_exec" lineno="31"> +<summary> +Execute certmaster in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmaster_read_log" lineno="50"> +<summary> +read certmaster logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmaster_append_log" lineno="69"> +<summary> +Append to certmaster logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmaster_manage_log" lineno="89"> +<summary> +Create, read, write, and delete +certmaster logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmaster_admin" lineno="116"> +<summary> +All of the rules required to administrate +an snort environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the syslog domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="certmonger" filename="policy/modules/contrib/certmonger.if"> +<summary>Certificate status monitor and PKI enrollment client</summary> +<interface name="certmonger_domtrans" lineno="13"> +<summary> +Execute a domain transition to run certmonger. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="certmonger_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +certmonger over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmonger_initrc_domtrans" lineno="52"> +<summary> +Execute certmonger server in the certmonger domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="certmonger_read_pid_files" lineno="70"> +<summary> +Read certmonger PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmonger_search_lib" lineno="89"> +<summary> +Search certmonger lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmonger_read_lib_files" lineno="108"> +<summary> +Read certmonger lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmonger_manage_lib_files" lineno="128"> +<summary> +Create, read, write, and delete +certmonger lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="certmonger_admin" lineno="154"> +<summary> +All of the rules required to administrate +an certmonger environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="certwatch" filename="policy/modules/contrib/certwatch.if"> +<summary>Digital Certificate Tracking</summary> +<interface name="certwatch_domtrans" lineno="13"> +<summary> +Domain transition to certwatch. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="certwatch_run" lineno="42"> +<summary> +Execute certwatch in the certwatch domain, and +allow the specified role the certwatch domain, +and use the caller's terminal. Has a sigchld +backchannel. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="certwatach_run" lineno="75"> +<summary> +Execute certwatch in the certwatch domain, and +allow the specified role the certwatch domain, +and use the caller's terminal. Has a sigchld +backchannel. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="terminal"> +<summary> +The type of the terminal allow the certwatch domain to use. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="cgroup" filename="policy/modules/contrib/cgroup.if"> +<summary>libcg is a library that abstracts the control group file system in Linux.</summary> +<interface name="cgroup_domtrans_cgclear" lineno="14"> +<summary> +Execute a domain transition to run +CG Clear. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cgroup_domtrans_cgconfig" lineno="34"> +<summary> +Execute a domain transition to run +CG config parser. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cgroup_initrc_domtrans_cgconfig" lineno="54"> +<summary> +Execute a domain transition to run +CG config parser. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cgroup_domtrans_cgred" lineno="73"> +<summary> +Execute a domain transition to run +CG rules engine daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cgroup_initrc_domtrans_cgred" lineno="94"> +<summary> +Execute a domain transition to run +CG rules engine daemon. +domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cgroup_run_cgclear" lineno="121"> +<summary> +Execute a domain transition to +run CG Clear and allow the +specified role the CG Clear +domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="cgroup_stream_connect_cgred" lineno="141"> +<summary> +Connect to CG rules engine daemon +over unix stream sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cgroup_admin" lineno="167"> +<summary> +All of the rules required to administrate +an cgroup environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="chronyd" filename="policy/modules/contrib/chronyd.if"> +<summary>Chrony NTP background daemon</summary> +<interface name="chronyd_domtrans" lineno="13"> +<summary> +Execute chronyd in the chronyd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="chronyd_exec" lineno="32"> +<summary> +Execute chronyd +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="chronyd_read_log" lineno="50"> +<summary> +Read chronyd logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="chronyd_admin" lineno="76"> +<summary> +All of the rules required to administrate +an chronyd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the chronyd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="cipe" filename="policy/modules/contrib/cipe.if"> +<summary>Encrypted tunnel daemon</summary> +</module> +<module name="clamav" filename="policy/modules/contrib/clamav.if"> +<summary>ClamAV Virus Scanner</summary> +<interface name="clamav_domtrans" lineno="13"> +<summary> +Execute a domain transition to run clamd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="clamav_stream_connect" lineno="31"> +<summary> +Connect to run clamd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clamav_append_log" lineno="50"> +<summary> +Allow the specified domain to append +to clamav log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clamav_read_config" lineno="70"> +<summary> +Read clamav configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clamav_search_lib" lineno="89"> +<summary> +Search clamav libraries directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clamav_domtrans_clamscan" lineno="108"> +<summary> +Execute a domain transition to run clamscan. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="clamav_exec_clamscan" lineno="126"> +<summary> +Execute clamscan without a transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clamav_admin" lineno="151"> +<summary> +All of the rules required to administrate +an clamav environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the clamav domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="clamd_use_jit" dftval="false"> +<desc> +<p> +Allow clamd to use JIT compiler +</p> +</desc> +</tunable> +</module> +<module name="clockspeed" filename="policy/modules/contrib/clockspeed.if"> +<summary>Clockspeed simple network time protocol client</summary> +<interface name="clockspeed_domtrans_cli" lineno="13"> +<summary> +Execute clockspeed utilities in the clockspeed_cli domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="clockspeed_run_cli" lineno="37"> +<summary> +Allow the specified role the clockspeed_cli domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="clogd" filename="policy/modules/contrib/clogd.if"> +<summary>clogd - Clustered Mirror Log Server</summary> +<interface name="clogd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run clogd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="clogd_stream_connect" lineno="33"> +<summary> +Connect to clogd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clogd_rw_semaphores" lineno="52"> +<summary> +Allow read and write access to clogd semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clogd_rw_shm" lineno="70"> +<summary> +Read and write to group shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="cmirrord" filename="policy/modules/contrib/cmirrord.if"> +<summary>Cluster mirror log daemon</summary> +<interface name="cmirrord_domtrans" lineno="13"> +<summary> +Execute a domain transition to run cmirrord. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cmirrord_initrc_domtrans" lineno="31"> +<summary> +Execute cmirrord server in the cmirrord domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cmirrord_read_pid_files" lineno="49"> +<summary> +Read cmirrord PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cmirrord_rw_shm" lineno="68"> +<summary> +Read and write to cmirrord shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cmirrord_admin" lineno="98"> +<summary> +All of the rules required to administrate +an cmirrord environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="cobbler" filename="policy/modules/contrib/cobbler.if"> +<summary>Cobbler installation server.</summary> +<desc> +<p> +Cobbler is a Linux installation server that allows for +rapid setup of network installation environments. It +glues together and automates many associated Linux +tasks so you do not have to hop between lots of various +commands and applications when rolling out new systems, +and, in some cases, changing existing ones. +</p> +</desc> +<interface name="cobblerd_domtrans" lineno="23"> +<summary> +Execute a domain transition to run cobblerd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cobblerd_initrc_domtrans" lineno="41"> +<summary> +Execute cobblerd server in the cobblerd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cobbler_read_config" lineno="59"> +<summary> +Read Cobbler content in /etc +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cobbler_dontaudit_rw_log" lineno="79"> +<summary> +Do not audit attempts to read and write +Cobbler log files (leaked fd). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="cobbler_search_lib" lineno="97"> +<summary> +Search cobbler dirs in /var/lib +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cobbler_read_lib_files" lineno="116"> +<summary> +Read cobbler files in /var/lib +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cobbler_manage_lib_files" lineno="135"> +<summary> +Manage cobbler files in /var/lib +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cobblerd_admin" lineno="161"> +<summary> +All of the rules required to administrate +an cobblerd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="cobbler_anon_write" dftval="false"> +<desc> +<p> +Allow Cobbler to modify public files +used for public file transfer services. +</p> +</desc> +</tunable> +</module> +<module name="colord" filename="policy/modules/contrib/colord.if"> +<summary>GNOME color manager</summary> +<interface name="colord_domtrans" lineno="13"> +<summary> +Execute a domain transition to run colord. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="colord_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +colord over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="colord_read_lib_files" lineno="52"> +<summary> +Read colord lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="comsat" filename="policy/modules/contrib/comsat.if"> +<summary>Comsat, a biff server.</summary> +</module> +<module name="consolekit" filename="policy/modules/contrib/consolekit.if"> +<summary>Framework for facilitating multiple user sessions on desktops.</summary> +<interface name="consolekit_domtrans" lineno="13"> +<summary> +Execute a domain transition to run consolekit. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="consolekit_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +consolekit over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="consolekit_read_log" lineno="52"> +<summary> +Read consolekit log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="consolekit_manage_log" lineno="71"> +<summary> +Manage consolekit log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="consolekit_read_pid_files" lineno="90"> +<summary> +Read consolekit PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="corosync" filename="policy/modules/contrib/corosync.if"> +<summary>Corosync Cluster Engine</summary> +<interface name="corosync_domtrans" lineno="13"> +<summary> +Execute a domain transition to run corosync. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="corosync_read_log" lineno="31"> +<summary> +Allow the specified domain to read corosync's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corosync_stream_connect" lineno="52"> +<summary> +Connect to corosync over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corosyncd_admin" lineno="78"> +<summary> +All of the rules required to administrate +an corosync environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the corosyncd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="courier" filename="policy/modules/contrib/courier.if"> +<summary>Courier IMAP and POP3 email servers</summary> +<template name="courier_domain_template" lineno="13"> +<summary> +Template for creating courier server processes. +</summary> +<param name="prefix"> +<summary> +Prefix name of the server process. +</summary> +</param> +</template> +<interface name="courier_domtrans_authdaemon" lineno="99"> +<summary> +Execute the courier authentication daemon with +a domain transition. +</summary> +<param name="prefix"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="courier_domtrans_pop" lineno="118"> +<summary> +Execute the courier POP3 and IMAP server with +a domain transition. +</summary> +<param name="prefix"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="courier_read_config" lineno="136"> +<summary> +Read courier config files +</summary> +<param name="prefix"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="courier_manage_spool_dirs" lineno="155"> +<summary> +Create, read, write, and delete courier +spool directories. +</summary> +<param name="prefix"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="courier_manage_spool_files" lineno="174"> +<summary> +Create, read, write, and delete courier +spool files. +</summary> +<param name="prefix"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="courier_read_spool" lineno="192"> +<summary> +Read courier spool files. +</summary> +<param name="prefix"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="courier_rw_spool_pipes" lineno="210"> +<summary> +Read and write to courier spool pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="cpucontrol" filename="policy/modules/contrib/cpucontrol.if"> +<summary>Services for loading CPU microcode and CPU frequency scaling.</summary> +<interface name="cpucontrol_stub" lineno="13"> +<summary> +CPUcontrol stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="cpufreqselector" filename="policy/modules/contrib/cpufreqselector.if"> +<summary>Command-line CPU frequency settings.</summary> +<interface name="cpufreqselector_dbus_chat" lineno="14"> +<summary> +Send and receive messages from +cpufreq-selector over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="cron" filename="policy/modules/contrib/cron.if"> +<summary>Periodic execution of scheduled commands.</summary> +<template name="cron_common_crontab_template" lineno="14"> +<summary> +The common rules for a crontab domain. +</summary> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<interface name="cron_role" lineno="105"> +<summary> +Role access for cron +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="cron_unconfined_role" lineno="154"> +<summary> +Role access for unconfined cronjobs +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="cron_admin_role" lineno="203"> +<summary> +Role access for cron +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="cron_system_entry" lineno="257"> +<summary> +Make the specified program domain accessable +from the system cron jobs. +</summary> +<param name="domain"> +<summary> +The type of the process to transition to. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type of the file used as an entrypoint to this domain. +</summary> +</param> +</interface> +<interface name="cron_domtrans" lineno="278"> +<summary> +Execute cron in the cron system domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cron_exec" lineno="296"> +<summary> +Execute crond_exec_t +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_initrc_domtrans" lineno="314"> +<summary> +Execute crond server in the nscd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cron_use_fds" lineno="333"> +<summary> +Inherit and use a file descriptor +from the cron daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_sigchld" lineno="351"> +<summary> +Send a SIGCHLD signal to the cron daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_read_pipes" lineno="369"> +<summary> +Read a cron daemon unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_dontaudit_write_pipes" lineno="387"> +<summary> +Do not audit attempts to write cron daemon unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="cron_rw_pipes" lineno="405"> +<summary> +Read and write a cron daemon unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_rw_tcp_sockets" lineno="423"> +<summary> +Read, and write cron daemon TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_dontaudit_rw_tcp_sockets" lineno="441"> +<summary> +Dontaudit Read, and write cron daemon TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="cron_search_spool" lineno="459"> +<summary> +Search the directory containing user cron tables. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_manage_pid_files" lineno="478"> +<summary> +Manage pid files used by cron +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_anacron_domtrans_system_job" lineno="496"> +<summary> +Execute anacron in the cron system domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cron_use_system_job_fds" lineno="515"> +<summary> +Inherit and use a file descriptor +from system cron jobs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_write_system_job_pipes" lineno="533"> +<summary> +Write a system cron job unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_rw_system_job_pipes" lineno="551"> +<summary> +Read and write a system cron job unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_rw_system_job_stream_sockets" lineno="569"> +<summary> +Allow read/write unix stream sockets from the system cron jobs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_read_system_job_tmp_files" lineno="587"> +<summary> +Read temporary files from the system cron jobs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cron_dontaudit_append_system_job_tmp_files" lineno="607"> +<summary> +Do not audit attempts to append temporary +files from the system cron jobs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="cron_dontaudit_write_system_job_tmp_files" lineno="626"> +<summary> +Do not audit attempts to write temporary +files from the system cron jobs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<tunable name="cron_can_relabel" dftval="false"> +<desc> +<p> +Allow system cron jobs to relabel filesystem +for restoring file contexts. +</p> +</desc> +</tunable> +<tunable name="fcron_crond" dftval="false"> +<desc> +<p> +Enable extra rules in the cron domain +to support fcron. +</p> +</desc> +</tunable> +</module> +<module name="cups" filename="policy/modules/contrib/cups.if"> +<summary>Common UNIX printing system</summary> +<interface name="cups_backend" lineno="13"> +<summary> +Setup cups to transtion to the cups backend domain +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_domtrans" lineno="40"> +<summary> +Execute cups in the cups domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cups_stream_connect" lineno="58"> +<summary> +Connect to cupsd over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_tcp_connect" lineno="77"> +<summary> +Connect to cups over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_dbus_chat" lineno="92"> +<summary> +Send and receive messages from +cups over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_read_pid_files" lineno="112"> +<summary> +Read cups PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_domtrans_config" lineno="131"> +<summary> +Execute cups_config in the cups_config domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="cups_signal_config" lineno="150"> +<summary> +Send generic signals to the cups +configuration daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_dbus_chat_config" lineno="169"> +<summary> +Send and receive messages from +cupsd_config over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_read_config" lineno="190"> +<summary> +Read cups configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="cups_read_rw_config" lineno="211"> +<summary> +Read cups-writable configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="cups_read_log" lineno="231"> +<summary> +Read cups log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="cups_append_log" lineno="250"> +<summary> +Append cups log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_write_log" lineno="269"> +<summary> +Write cups log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_stream_connect_ptal" lineno="288"> +<summary> +Connect to ptal over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cups_admin" lineno="314"> +<summary> +All of the rules required to administrate +an cups environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the cups domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="cvs" filename="policy/modules/contrib/cvs.if"> +<summary>Concurrent versions system</summary> +<interface name="cvs_read_data" lineno="13"> +<summary> +Read the CVS data and metadata. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cvs_exec" lineno="34"> +<summary> +Allow the specified domain to execute cvs +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cvs_admin" lineno="59"> +<summary> +All of the rules required to administrate +an cvs environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the cvs domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_cvs_read_shadow" dftval="false"> +<desc> +<p> +Allow cvs daemon to read shadow +</p> +</desc> +</tunable> +</module> +<module name="cyphesis" filename="policy/modules/contrib/cyphesis.if"> +<summary>Cyphesis WorldForge game server</summary> +<interface name="cyphesis_domtrans" lineno="13"> +<summary> +Execute a domain transition to run cyphesis. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="cyrus" filename="policy/modules/contrib/cyrus.if"> +<summary>Cyrus is an IMAP service intended to be run on sealed servers</summary> +<interface name="cyrus_manage_data" lineno="14"> +<summary> +Allow caller to create, read, write, +and delete cyrus data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cyrus_stream_connect" lineno="33"> +<summary> +Connect to Cyrus using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="cyrus_admin" lineno="59"> +<summary> +All of the rules required to administrate +an cyrus environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the cyrus domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="daemontools" filename="policy/modules/contrib/daemontools.if"> +<summary>Collection of tools for managing UNIX services</summary> +<desc> +<p> +Policy for DJB's daemontools +</p> +</desc> +<interface name="daemontools_ipc_domain" lineno="18"> +<summary> +An ipc channel between the supervised domain and svc_start_t +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="daemontools_service_domain" lineno="44"> +<summary> +Define a specified domain as a supervised service. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +<interface name="daemontools_domtrans_start" lineno="66"> +<summary> +Execute in the svc_start_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="daemonstools_run_start" lineno="91"> +<summary> +Execute svc_start in the svc_start domain, and +allow the specified role the svc_start domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the svc_start domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="daemontools_domtrans_run" lineno="110"> +<summary> +Execute in the svc_run_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="daemontools_sigchld_run" lineno="128"> +<summary> +Send a SIGCHLD signal to svc_run domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="daemontools_domtrans_multilog" lineno="146"> +<summary> +Execute in the svc_multilog_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="daemontools_search_svc_dir" lineno="164"> +<summary> +Search svc_svc_t directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="daemontools_read_svc" lineno="183"> +<summary> +Allow a domain to read svc_svc_t files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="daemontools_manage_svc" lineno="203"> +<summary> +Allow a domain to create svc_svc_t files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dante" filename="policy/modules/contrib/dante.if"> +<summary>Dante msproxy and socks4/5 proxy server</summary> +</module> +<module name="dbadm" filename="policy/modules/contrib/dbadm.if"> +<summary>Database administrator role</summary> +<interface name="dbadm_role_change" lineno="14"> +<summary> +Change to the database administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dbadm_role_change_to" lineno="44"> +<summary> +Change from the database administrator role. +</summary> +<desc> +<p> +Change from the database administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="dbadm_manage_user_files" dftval="false"> +<desc> +<p> +Allow dbadm to manage files in users home directories +</p> +</desc> +</tunable> +<tunable name="dbadm_read_user_files" dftval="false"> +<desc> +<p> +Allow dbadm to read files in users home directories +</p> +</desc> +</tunable> +</module> +<module name="dbskk" filename="policy/modules/contrib/dbskk.if"> +<summary>Dictionary server for the SKK Japanese input method system.</summary> +</module> +<module name="dbus" filename="policy/modules/contrib/dbus.if"> +<summary>Desktop messaging bus</summary> +<interface name="dbus_stub" lineno="13"> +<summary> +DBUS stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<template name="dbus_role_template" lineno="41"> +<summary> +Role access for dbus +</summary> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</template> +<interface name="dbus_system_bus_client" lineno="179"> +<summary> +Template for creating connections to +the system DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_session_bus_client" lineno="210"> +<summary> +Template for creating connections to +a user DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_send_session_bus" lineno="233"> +<summary> +Send a message the session DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_read_config" lineno="252"> +<summary> +Read dbus configuration. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_read_lib_files" lineno="271"> +<summary> +Read system dbus lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_manage_lib_files" lineno="291"> +<summary> +Create, read, write, and delete +system dbus lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_connect_session_bus" lineno="311"> +<summary> +Connect to the system DBUS +for service (acquire_svc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_session_domain" lineno="337"> +<summary> +Allow a application domain to be started +by the session dbus. +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an +entry point to this domain. +</summary> +</param> +</interface> +<interface name="dbus_connect_system_bus" lineno="359"> +<summary> +Connect to the system DBUS +for service (acquire_svc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_send_system_bus" lineno="378"> +<summary> +Send a message on the system DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_system_bus_unconfined" lineno="397"> +<summary> +Allow unconfined access to the system DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_system_domain" lineno="422"> +<summary> +Create a domain for processes +which can be started by the system dbus +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +</interface> +<interface name="dbus_use_system_bus_fds" lineno="457"> +<summary> +Use and inherit system DBUS file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dbus_dontaudit_system_bus_rw_tcp_sockets" lineno="475"> +<summary> +Dontaudit Read, and write system dbus TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dbus_unconfined" lineno="494"> +<summary> +Allow unconfined access to the system DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="dcc" filename="policy/modules/contrib/dcc.if"> +<summary>Distributed checksum clearinghouse spam filtering</summary> +<interface name="dcc_domtrans_cdcc" lineno="13"> +<summary> +Execute cdcc in the cdcc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dcc_run_cdcc" lineno="39"> +<summary> +Execute cdcc in the cdcc domain, and +allow the specified role the cdcc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dcc_domtrans_client" lineno="58"> +<summary> +Execute dcc_client in the dcc_client domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dcc_signal_client" lineno="77"> +<summary> +Send a signal to the dcc_client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dcc_run_client" lineno="102"> +<summary> +Execute dcc_client in the dcc_client domain, and +allow the specified role the dcc_client domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dcc_domtrans_dbclean" lineno="121"> +<summary> +Execute dbclean in the dcc_dbclean domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dcc_run_dbclean" lineno="147"> +<summary> +Execute dbclean in the dcc_dbclean domain, and +allow the specified role the dcc_dbclean domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dcc_stream_connect_dccifd" lineno="166"> +<summary> +Connect to dccifd over a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="ddclient" filename="policy/modules/contrib/ddclient.if"> +<summary>Update dynamic IP address at DynDNS.org</summary> +<interface name="ddclient_domtrans" lineno="13"> +<summary> +Execute ddclient in the ddclient domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ddclient_run" lineno="38"> +<summary> +Execute ddclient daemon on behalf of a user or staff type. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ddclient_admin" lineno="64"> +<summary> +All of the rules required to administrate +an ddclient environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the ddclient domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ddcprobe" filename="policy/modules/contrib/ddcprobe.if"> +<summary>ddcprobe retrieves monitor and graphics card information</summary> +<interface name="ddcprobe_domtrans" lineno="13"> +<summary> +Execute ddcprobe in the ddcprobe domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ddcprobe_run" lineno="38"> +<summary> +Execute ddcprobe in the ddcprobe domain, and +allow the specified role the ddcprobe domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role to be authenticated for ddcprobe domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="denyhosts" filename="policy/modules/contrib/denyhosts.if"> +<summary>DenyHosts SSH dictionary attack mitigation</summary> +<desc> +<p> +DenyHosts is a script intended to be run by Linux +system administrators to help thwart SSH server attacks +(also known as dictionary based attacks and brute force +attacks). +</p> +</desc> +<interface name="denyhosts_domtrans" lineno="21"> +<summary> +Execute a domain transition to run denyhosts. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="denyhosts_initrc_domtrans" lineno="39"> +<summary> +Execute denyhost server in the denyhost domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="denyhosts_admin" lineno="63"> +<summary> +All of the rules required to administrate +an denyhosts environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +<module name="devicekit" filename="policy/modules/contrib/devicekit.if"> +<summary>Devicekit modular hardware abstraction layer</summary> +<interface name="devicekit_domtrans" lineno="13"> +<summary> +Execute a domain transition to run devicekit. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="devicekit_dgram_send" lineno="32"> +<summary> +Send to devicekit over a unix domain +datagram socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_dbus_chat" lineno="51"> +<summary> +Send and receive messages from +devicekit over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_dbus_chat_disk" lineno="72"> +<summary> +Send and receive messages from +devicekit disk over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_signal_power" lineno="92"> +<summary> +Send signal devicekit power +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_dbus_chat_power" lineno="111"> +<summary> +Send and receive messages from +devicekit power over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_read_pid_files" lineno="131"> +<summary> +Read devicekit PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="devicekit_admin" lineno="162"> +<summary> +All of the rules required to administrate +an devicekit environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the devicekit domain. +</summary> +</param> +<param name="terminal"> +<summary> +The type of the user terminal. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dhcp" filename="policy/modules/contrib/dhcp.if"> +<summary>Dynamic host configuration protocol (DHCP) server</summary> +<interface name="dhcpd_domtrans" lineno="13"> +<summary> +Transition to dhcpd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dhcpd_setattr_state_files" lineno="33"> +<summary> +Set the attributes of the DCHP +server state files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dhcpd_initrc_domtrans" lineno="53"> +<summary> +Execute dhcp server in the dhcp domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dhcpd_admin" lineno="78"> +<summary> +All of the rules required to administrate +an dhcp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the dhcp domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dictd" filename="policy/modules/contrib/dictd.if"> +<summary>Dictionary daemon</summary> +<interface name="dictd_tcp_connect" lineno="14"> +<summary> +Use dictionary services by connecting +over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dictd_admin" lineno="35"> +<summary> +All of the rules required to administrate +an dictd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the dictd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="distcc" filename="policy/modules/contrib/distcc.if"> +<summary>Distributed compiler daemon</summary> +</module> +<module name="djbdns" filename="policy/modules/contrib/djbdns.if"> +<summary>small and secure DNS daemon</summary> +<template name="djbdns_daemontools_domain_template" lineno="14"> +<summary> +Create a set of derived types for djbdns +components that are directly supervised by daemontools. +</summary> +<param name="prefix"> +<summary> +The prefix to be used for deriving type names. +</summary> +</param> +</template> +<interface name="djbdns_search_tinydns_keys" lineno="66"> +<summary> +Allow search the djbdns-tinydns key ring. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="djbdns_link_tinydns_keys" lineno="84"> +<summary> +Allow link to the djbdns-tinydns key ring. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="dkim" filename="policy/modules/contrib/dkim.if"> +<summary>DomainKeys Identified Mail milter.</summary> +</module> +<module name="dmidecode" filename="policy/modules/contrib/dmidecode.if"> +<summary>Decode DMI data for x86/ia64 bioses.</summary> +<interface name="dmidecode_domtrans" lineno="13"> +<summary> +Execute dmidecode in the dmidecode domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dmidecode_run" lineno="43"> +<summary> +Execute dmidecode in the dmidecode domain, and +allow the specified role the dmidecode domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dnsmasq" filename="policy/modules/contrib/dnsmasq.if"> +<summary>dnsmasq DNS forwarder and DHCP server</summary> +<interface name="dnsmasq_domtrans" lineno="14"> +<summary> +Execute dnsmasq server in the dnsmasq domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dnsmasq_initrc_domtrans" lineno="34"> +<summary> +Execute the dnsmasq init script in the init script domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dnsmasq_signal" lineno="53"> +<summary> +Send dnsmasq a signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_signull" lineno="72"> +<summary> +Send dnsmasq a signull +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_kill" lineno="91"> +<summary> +Send dnsmasq a kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_read_config" lineno="109"> +<summary> +Read dnsmasq config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_write_config" lineno="128"> +<summary> +Write to dnsmasq config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_delete_pid_files" lineno="148"> +<summary> +Delete dnsmasq pid files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_read_pid_files" lineno="167"> +<summary> +Read dnsmasq pid files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dnsmasq_admin" lineno="192"> +<summary> +All of the rules required to administrate +an dnsmasq environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the dnsmasq domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dovecot" filename="policy/modules/contrib/dovecot.if"> +<summary>Dovecot POP and IMAP mail server</summary> +<interface name="dovecot_stream_connect_auth" lineno="14"> +<summary> +Connect to dovecot auth unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dovecot_domtrans_deliver" lineno="32"> +<summary> +Execute dovecot_deliver in the dovecot_deliver domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dovecot_manage_spool" lineno="50"> +<summary> +Create, read, write, and delete the dovecot spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dovecot_dontaudit_unlink_lib_files" lineno="69"> +<summary> +Do not audit attempts to delete dovecot lib files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dovecot_admin" lineno="94"> +<summary> +All of the rules required to administrate +an dovecot environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the dovecot domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="dpkg" filename="policy/modules/contrib/dpkg.if"> +<summary>Policy for the Debian package manager.</summary> +<interface name="dpkg_domtrans" lineno="15"> +<summary> +Execute dpkg programs in the dpkg domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dpkg_domtrans_script" lineno="35"> +<summary> +Execute dpkg_script programs in the dpkg_script domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="dpkg_run" lineno="63"> +<summary> +Execute dpkg programs in the dpkg domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the dpkg domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dpkg_use_fds" lineno="82"> +<summary> +Inherit and use file descriptors from dpkg. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_read_pipes" lineno="100"> +<summary> +Read from an unnamed dpkg pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_rw_pipes" lineno="118"> +<summary> +Read and write an unnamed dpkg pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_use_script_fds" lineno="136"> +<summary> +Inherit and use file descriptors from dpkg scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_read_db" lineno="154"> +<summary> +Read the dpkg package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_manage_db" lineno="175"> +<summary> +Create, read, write, and delete the dpkg package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dpkg_dontaudit_manage_db" lineno="196"> +<summary> +Do not audit attempts to create, read, +write, and delete the dpkg package database. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dpkg_lock_db" lineno="216"> +<summary> +Lock the dpkg package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="entropyd" filename="policy/modules/contrib/entropyd.if"> +<summary>Generate entropy from audio input</summary> +<tunable name="entropyd_use_audio" dftval="false"> +<desc> +<p> +Allow the use of the audio devices as the source for the entropy feeds +</p> +</desc> +</tunable> +</module> +<module name="evolution" filename="policy/modules/contrib/evolution.if"> +<summary>Evolution email client</summary> +<interface name="evolution_role" lineno="18"> +<summary> +Role access for evolution +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="evolution_home_filetrans" lineno="85"> +<summary> +Create objects in users evolution home folders. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +Private file type. +</summary> +</param> +<param name="class"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="evolution_stream_connect" lineno="104"> +<summary> +Connect to evolution unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="evolution_dbus_chat" lineno="124"> +<summary> +Send and receive messages from +evolution over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="evolution_alarm_dbus_chat" lineno="145"> +<summary> +Send and receive messages from +evolution_alarm over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="exim" filename="policy/modules/contrib/exim.if"> +<summary>Exim mail transfer agent</summary> +<interface name="exim_domtrans" lineno="13"> +<summary> +Execute a domain transition to run exim. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="exim_dontaudit_read_tmp_files" lineno="32"> +<summary> +Do not audit attempts to read, +exim tmp files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="exim_read_tmp_files" lineno="50"> +<summary> +Allow domain to read, exim tmp files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="exim_read_pid_files" lineno="69"> +<summary> +Read exim PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="exim_read_log" lineno="89"> +<summary> +Allow the specified domain to read exim's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="exim_append_log" lineno="109"> +<summary> +Allow the specified domain to append +exim log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="exim_manage_log" lineno="129"> +<summary> +Allow the specified domain to manage exim's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="exim_manage_spool_dirs" lineno="149"> +<summary> +Create, read, write, and delete +exim spool dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="exim_read_spool_files" lineno="168"> +<summary> +Read exim spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="exim_manage_spool_files" lineno="189"> +<summary> +Create, read, write, and delete +exim spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="exim_can_connect_db" dftval="false"> +<desc> +<p> +Allow exim to connect to databases (postgres, mysql) +</p> +</desc> +</tunable> +<tunable name="exim_read_user_files" dftval="false"> +<desc> +<p> +Allow exim to read unprivileged user files. +</p> +</desc> +</tunable> +<tunable name="exim_manage_user_files" dftval="false"> +<desc> +<p> +Allow exim to create, read, write, and delete +unprivileged user files. +</p> +</desc> +</tunable> +</module> +<module name="fail2ban" filename="policy/modules/contrib/fail2ban.if"> +<summary>Update firewall filtering to ban IP addresses with too many password failures.</summary> +<interface name="fail2ban_domtrans" lineno="13"> +<summary> +Execute a domain transition to run fail2ban. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="fail2ban_stream_connect" lineno="32"> +<summary> +Connect to fail2ban over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fail2ban_rw_stream_sockets" lineno="51"> +<summary> +Read and write to an fail2ban unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fail2ban_read_lib_files" lineno="69"> +<summary> +Read fail2ban lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fail2ban_read_log" lineno="89"> +<summary> +Allow the specified domain to read fail2ban's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fail2ban_append_log" lineno="110"> +<summary> +Allow the specified domain to append +fail2ban log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fail2ban_read_pid_files" lineno="130"> +<summary> +Read fail2ban PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fail2ban_admin" lineno="156"> +<summary> +All of the rules required to administrate +an fail2ban environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the fail2ban domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="fetchmail" filename="policy/modules/contrib/fetchmail.if"> +<summary>Remote-mail retrieval and forwarding utility</summary> +<interface name="fetchmail_admin" lineno="15"> +<summary> +All of the rules required to administrate +an fetchmail environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="finger" filename="policy/modules/contrib/finger.if"> +<summary>Finger user information service.</summary> +<interface name="finger_domtrans" lineno="13"> +<summary> +Execute fingerd in the fingerd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="finger_tcp_connect" lineno="31"> +<summary> +Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="firstboot" filename="policy/modules/contrib/firstboot.if"> +<summary> +Final system configuration run during the first boot +after installation of Red Hat/Fedora systems. +</summary> +<interface name="firstboot_domtrans" lineno="16"> +<summary> +Execute firstboot in the firstboot domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="firstboot_run" lineno="40"> +<summary> +Execute firstboot in the firstboot domain, and +allow the specified role the firstboot domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="firstboot_use_fds" lineno="59"> +<summary> +Inherit and use a file descriptor from firstboot. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="firstboot_dontaudit_use_fds" lineno="78"> +<summary> +Do not audit attempts to inherit a +file descriptor from firstboot. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="firstboot_write_pipes" lineno="96"> +<summary> +Write to a firstboot unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="firstboot_rw_pipes" lineno="114"> +<summary> +Read and Write to a firstboot unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="firstboot_dontaudit_rw_pipes" lineno="132"> +<summary> +Do not audit attemps to read and write to a firstboot unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="firstboot_dontaudit_rw_stream_sockets" lineno="151"> +<summary> +Do not audit attemps to read and write to a firstboot +unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +</module> +<module name="fprintd" filename="policy/modules/contrib/fprintd.if"> +<summary>DBus fingerprint reader service</summary> +<interface name="fprintd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run fprintd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="fprintd_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +fprintd over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="ftp" filename="policy/modules/contrib/ftp.if"> +<summary>File transfer protocol service</summary> +<interface name="ftp_dyntrans_anon_sftpd" lineno="13"> +<summary> +Allow domain dyntransition to sftpd_anon domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ftp_tcp_connect" lineno="31"> +<summary> +Use ftp by connecting over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ftp_read_config" lineno="45"> +<summary> +Read ftpd etc files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ftp_check_exec" lineno="64"> +<summary> +Execute FTP daemon entry point programs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ftp_read_log" lineno="83"> +<summary> +Read FTP transfer logs +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ftp_domtrans_ftpdctl" lineno="102"> +<summary> +Execute the ftpdctl program in the ftpdctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ftp_run_ftpdctl" lineno="127"> +<summary> +Execute the ftpdctl program in the ftpdctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the ftpdctl domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ftp_dyntrans_sftpd" lineno="146"> +<summary> +Allow domain dyntransition to sftpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ftp_admin" lineno="171"> +<summary> +All of the rules required to administrate +an ftp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the ftp domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_ftpd_anon_write" dftval="false"> +<desc> +<p> +Allow ftp servers to upload files, used for public file +transfer services. Directories must be labeled +public_content_rw_t. +</p> +</desc> +</tunable> +<tunable name="allow_ftpd_full_access" dftval="false"> +<desc> +<p> +Allow ftp servers to login to local users and +read/write all files on the system, governed by DAC. +</p> +</desc> +</tunable> +<tunable name="allow_ftpd_use_cifs" dftval="false"> +<desc> +<p> +Allow ftp servers to use cifs +used for public file transfer services. +</p> +</desc> +</tunable> +<tunable name="allow_ftpd_use_nfs" dftval="false"> +<desc> +<p> +Allow ftp servers to use nfs +used for public file transfer services. +</p> +</desc> +</tunable> +<tunable name="ftp_home_dir" dftval="false"> +<desc> +<p> +Allow ftp to read and write files in the user home directories +</p> +</desc> +</tunable> +<tunable name="sftpd_anon_write" dftval="false"> +<desc> +<p> +Allow anon internal-sftp to upload files, used for +public file transfer services. Directories must be labeled +public_content_rw_t. +</p> +</desc> +</tunable> +<tunable name="sftpd_enable_homedirs" dftval="false"> +<desc> +<p> +Allow sftp-internal to read and write files +in the user home directories +</p> +</desc> +</tunable> +<tunable name="sftpd_full_access" dftval="false"> +<desc> +<p> +Allow sftp-internal to login to local users and +read/write all files on the system, governed by DAC. +</p> +</desc> +</tunable> +</module> +<module name="games" filename="policy/modules/contrib/games.if"> +<summary>Games</summary> +<interface name="games_role" lineno="18"> +<summary> +Role access for games +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="games_rw_data" lineno="45"> +<summary> +Allow the specified domain to read/write +games data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="gatekeeper" filename="policy/modules/contrib/gatekeeper.if"> +<summary>OpenH.323 Voice-Over-IP Gatekeeper</summary> +</module> +<module name="gift" filename="policy/modules/contrib/gift.if"> +<summary>giFT peer to peer file sharing tool</summary> +<interface name="gift_role" lineno="18"> +<summary> +Role access for gift +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +</module> +<module name="git" filename="policy/modules/contrib/git.if"> +<summary>GIT revision control system.</summary> +<template name="git_role" lineno="18"> +<summary> +Role access for Git session. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role. +</summary> +</param> +</template> +<tunable name="git_cgi_enable_homedirs" dftval="false"> +<desc> +<p> +Determine whether Git CGI +can search home directories. +</p> +</desc> +</tunable> +<tunable name="git_cgi_use_cifs" dftval="false"> +<desc> +<p> +Determine whether Git CGI +can access cifs file systems. +</p> +</desc> +</tunable> +<tunable name="git_cgi_use_nfs" dftval="false"> +<desc> +<p> +Determine whether Git CGI +can access nfs file systems. +</p> +</desc> +</tunable> +<tunable name="git_session_users" dftval="false"> +<desc> +<p> +Determine whether calling user domains +can execute Git daemon in the +git_session_t domain. +</p> +</desc> +</tunable> +<tunable name="git_session_send_syslog_msg" dftval="false"> +<desc> +<p> +Determine whether Git session daemons +can send syslog messages. +</p> +</desc> +</tunable> +<tunable name="git_system_enable_homedirs" dftval="false"> +<desc> +<p> +Determine whether Git system daemon +can search home directories. +</p> +</desc> +</tunable> +<tunable name="git_system_use_cifs" dftval="false"> +<desc> +<p> +Determine whether Git system daemon +can access cifs file systems. +</p> +</desc> +</tunable> +<tunable name="git_system_use_nfs" dftval="false"> +<desc> +<p> +Determine whether Git system daemon +can access nfs file systems. +</p> +</desc> +</tunable> +</module> +<module name="gitosis" filename="policy/modules/contrib/gitosis.if"> +<summary>Tools for managing and hosting git repositories.</summary> +<interface name="gitosis_domtrans" lineno="13"> +<summary> +Execute a domain transition to run gitosis. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="gitosis_run" lineno="37"> +<summary> +Execute gitosis-serve in the gitosis domain, and +allow the specified role the gitosis domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="gitosis_read_lib_files" lineno="57"> +<summary> +Allow the specified domain to read +gitosis lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gitosis_manage_lib_files" lineno="79"> +<summary> +Allow the specified domain to manage +gitosis lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="glance" filename="policy/modules/contrib/glance.if"> +<summary>policy for glance</summary> +<interface name="glance_domtrans_registry" lineno="13"> +<summary> +Transition to glance registry. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="glance_domtrans_api" lineno="32"> +<summary> +Transition to glance api. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="glance_read_log" lineno="52"> +<summary> +Read glance's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="glance_append_log" lineno="71"> +<summary> +Append to glance log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_manage_log" lineno="90"> +<summary> +Manage glance log files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_search_lib" lineno="111"> +<summary> +Search glance lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_read_lib_files" lineno="130"> +<summary> +Read glance lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_manage_lib_files" lineno="149"> +<summary> +Manage glance lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_manage_lib_dirs" lineno="168"> +<summary> +Manage glance lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_read_pid_files" lineno="187"> +<summary> +Read glance PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_manage_pid_files" lineno="206"> +<summary> +Manage glance PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="glance_admin" lineno="232"> +<summary> +All of the rules required to administrate +an glance environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="gnome" filename="policy/modules/contrib/gnome.if"> +<summary>GNU network object model environment (GNOME)</summary> +<interface name="gnome_role" lineno="18"> +<summary> +Role access for gnome +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="gnome_exec_gconf" lineno="49"> +<summary> +Execute gconf programs in +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="gnome_read_gconf_config" lineno="67"> +<summary> +Read gconf config files. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</template> +<interface name="gnome_manage_gconf_config" lineno="87"> +<summary> +Create, read, write, and delete gconf config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gnome_stream_connect_gconf" lineno="106"> +<summary> +gconf connection template. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gnome_domtrans_gconfd" lineno="125"> +<summary> +Run gconfd in gconfd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gnome_setattr_config_dirs" lineno="143"> +<summary> +Set attributes of Gnome config dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="gnome_read_config" lineno="162"> +<summary> +Read gnome homedir content (.config) +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</template> +<interface name="gnome_manage_config" lineno="182"> +<summary> +manage gnome homedir content (.config) +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="gnomeclock" filename="policy/modules/contrib/gnomeclock.if"> +<summary>Gnome clock handler for setting the time.</summary> +<interface name="gnomeclock_domtrans" lineno="13"> +<summary> +Execute a domain transition to run gnomeclock. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="gnomeclock_run" lineno="37"> +<summary> +Execute gnomeclock in the gnomeclock domain, and +allow the specified role the gnomeclock domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="gnomeclock_dbus_chat" lineno="57"> +<summary> +Send and receive messages from +gnomeclock over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="gpg" filename="policy/modules/contrib/gpg.if"> +<summary>Policy for GNU Privacy Guard and related programs.</summary> +<interface name="gpg_role" lineno="18"> +<summary> +Role access for gpg +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="gpg_domtrans" lineno="80"> +<summary> +Transition to a user gpg domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="gpg_exec" lineno="98"> +<summary> +Execute the gpg application without transitioning +</summary> +<param name="domain"> +<summary> +Domain allowed to execute gpg +</summary> +</param> +</interface> +<interface name="gpg_signal" lineno="116"> +<summary> +Send generic signals to user gpg processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gpg_rw_agent_pipes" lineno="134"> +<summary> +Read and write GPG agent pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gpg_pinentry_dbus_chat" lineno="154"> +<summary> +Send messages to and from GPG +Pinentry over DBUS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gpg_list_user_secrets" lineno="174"> +<summary> +List Gnu Privacy Guard user secrets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="gpg_agent_env_file" dftval="false"> +<desc> +<p> +Allow usage of the gpg-agent --write-env-file option. +This also allows gpg-agent to manage user files. +</p> +</desc> +</tunable> +</module> +<module name="gpm" filename="policy/modules/contrib/gpm.if"> +<summary>General Purpose Mouse driver</summary> +<interface name="gpm_stream_connect" lineno="14"> +<summary> +Connect to GPM over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gpm_getattr_gpmctl" lineno="34"> +<summary> +Get the attributes of the GPM +control channel named socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="gpm_dontaudit_getattr_gpmctl" lineno="55"> +<summary> +Do not audit attempts to get the +attributes of the GPM control channel +named socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="gpm_setattr_gpmctl" lineno="74"> +<summary> +Set the attributes of the GPM +control channel named socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="gpsd" filename="policy/modules/contrib/gpsd.if"> +<summary>gpsd monitor daemon</summary> +<interface name="gpsd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run gpsd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="gpsd_run" lineno="37"> +<summary> +Execute gpsd in the gpsd domain, and +allow the specified role the gpsd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="gpsd_rw_shm" lineno="56"> +<summary> +Read and write gpsd shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="guest" filename="policy/modules/contrib/guest.if"> +<summary>Least privledge terminal user role</summary> +<interface name="guest_role_change" lineno="14"> +<summary> +Change to the guest role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="guest_role_change_to" lineno="44"> +<summary> +Change from the guest role. +</summary> +<desc> +<p> +Change from the guest role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="hadoop" filename="policy/modules/contrib/hadoop.if"> +<summary>Software for reliable, scalable, distributed computing.</summary> +<template name="hadoop_domain_template" lineno="13"> +<summary> +The template to define a hadoop domain. +</summary> +<param name="domain_prefix"> +<summary> +Domain prefix to be used. +</summary> +</param> +</template> +<interface name="hadoop_role" lineno="219"> +<summary> +Role access for hadoop. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="hadoop_domtrans" lineno="248"> +<summary> +Execute hadoop in the +hadoop domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom" lineno="268"> +<summary> +Give permission to a domain to +recvfrom hadoop_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_domtrans_zookeeper_client" lineno="287"> +<summary> +Execute zookeeper client in the +zookeeper client domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_zookeeper_client" lineno="308"> +<summary> +Give permission to a domain to +recvfrom zookeeper_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_domtrans_zookeeper_server" lineno="327"> +<summary> +Execute zookeeper server in the +zookeeper server domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_zookeeper_server" lineno="348"> +<summary> +Give permission to a domain to +recvfrom zookeeper_server_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_initrc_domtrans_zookeeper_server" lineno="367"> +<summary> +Execute zookeeper server in the +zookeeper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_datanode" lineno="387"> +<summary> +Give permission to a domain to +recvfrom hadoop_datanode_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_read_config" lineno="406"> +<summary> +Give permission to a domain to read +hadoop_etc_t +</summary> +<param name="domain"> +<summary> +Domain needing read permission +</summary> +</param> +</interface> +<interface name="hadoop_exec_config" lineno="427"> +<summary> +Give permission to a domain to +execute hadoop_etc_t +</summary> +<param name="domain"> +<summary> +Domain needing read and execute +permission +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_jobtracker" lineno="448"> +<summary> +Give permission to a domain to +recvfrom hadoop_jobtracker_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_match_lan_spd" lineno="468"> +<summary> +Give permission to a domain to +polmatch on hadoop_lan_t +</summary> +<param name="domain"> +<summary> +Domain needing polmatch +permission +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_namenode" lineno="488"> +<summary> +Give permission to a domain to +recvfrom hadoop_namenode_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_secondarynamenode" lineno="508"> +<summary> +Give permission to a domain to +recvfrom hadoop_secondarynamenode_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +<interface name="hadoop_recvfrom_tasktracker" lineno="528"> +<summary> +Give permission to a domain to +recvfrom hadoop_tasktracker_t +</summary> +<param name="domain"> +<summary> +Domain needing recvfrom +permission +</summary> +</param> +</interface> +</module> +<module name="hal" filename="policy/modules/contrib/hal.if"> +<summary>Hardware abstraction layer</summary> +<interface name="hal_domtrans" lineno="13"> +<summary> +Execute hal in the hal domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hal_getattr" lineno="31"> +<summary> +Get the attributes of a hal process. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_read_state" lineno="49"> +<summary> +Read hal system state +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_ptrace" lineno="67"> +<summary> +Allow ptrace of hal domain +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_use_fds" lineno="85"> +<summary> +Allow domain to use file descriptors from hal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dontaudit_use_fds" lineno="103"> +<summary> +Do not audit attempts to use file descriptors from hal. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hal_rw_pipes" lineno="122"> +<summary> +Allow attempts to read and write to +hald unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dontaudit_rw_pipes" lineno="141"> +<summary> +Do not audit attempts to read and write to +hald unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hal_dgram_send" lineno="160"> +<summary> +Send to hal over a unix domain +datagram socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_stream_connect" lineno="179"> +<summary> +Send to hal over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dontaudit_rw_dgram_sockets" lineno="197"> +<summary> +Dontaudit read/write to a hal unix datagram socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hal_dbus_send" lineno="215"> +<summary> +Send a dbus message to hal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dbus_chat" lineno="235"> +<summary> +Send and receive messages from +hal over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_domtrans_mac" lineno="255"> +<summary> +Execute hal mac in the hal mac domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hal_write_log" lineno="274"> +<summary> +Allow attempts to write the hal +log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dontaudit_write_log" lineno="294"> +<summary> +Do not audit attempts to write the hal +log files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hal_manage_log" lineno="312"> +<summary> +Manage hald log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_read_tmp_files" lineno="332"> +<summary> +Read hald tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_dontaudit_append_lib_files" lineno="351"> +<summary> +Do not audit attempts to read or write +HAL libraries files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hal_read_pid_files" lineno="369"> +<summary> +Read hald PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_rw_pid_files" lineno="388"> +<summary> +Read/Write hald PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_manage_pid_dirs" lineno="407"> +<summary> +Manage hald PID dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hal_manage_pid_files" lineno="426"> +<summary> +Manage hald PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="hddtemp" filename="policy/modules/contrib/hddtemp.if"> +<summary>hddtemp hard disk temperature tool running as a daemon.</summary> +<interface name="hddtemp_domtrans" lineno="13"> +<summary> +Execute a domain transition to run hddtemp. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hddtemp_exec" lineno="32"> +<summary> +Execute hddtemp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hddtemp_admin" lineno="58"> +<summary> +All of the rules required to +administrate an hddtemp environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="howl" filename="policy/modules/contrib/howl.if"> +<summary>Port of Apple Rendezvous multicast DNS</summary> +<interface name="howl_signal" lineno="13"> +<summary> +Send generic signals to howl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="i18n_input" filename="policy/modules/contrib/i18n_input.if"> +<summary>IIIMF htt server</summary> +<interface name="i18n_use" lineno="13"> +<summary> +Use i18n_input over a TCP connection. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="icecast" filename="policy/modules/contrib/icecast.if"> +<summary> ShoutCast compatible streaming media server</summary> +<interface name="icecast_domtrans" lineno="13"> +<summary> +Execute a domain transition to run icecast. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="icecast_signal" lineno="31"> +<summary> +Allow domain signal icecast +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="icecast_initrc_domtrans" lineno="49"> +<summary> +Execute icecast server in the icecast domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="icecast_read_pid_files" lineno="67"> +<summary> +Read icecast PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="icecast_manage_pid_files" lineno="86"> +<summary> +Manage icecast pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="icecast_read_log" lineno="106"> +<summary> +Allow the specified domain to read icecast's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="icecast_append_log" lineno="126"> +<summary> +Allow the specified domain to append +icecast log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="icecast_manage_log" lineno="145"> +<summary> +Allow domain to manage icecast log files +</summary> +<param name="domain"> +<summary> +Domain allow access. +</summary> +</param> +</interface> +<interface name="icecast_admin" lineno="171"> +<summary> +All of the rules required to administrate +an icecast environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ifplugd" filename="policy/modules/contrib/ifplugd.if"> +<summary>Bring up/down ethernet interfaces based on cable detection.</summary> +<interface name="ifplugd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ifplugd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ifplugd_signal" lineno="31"> +<summary> +Send a generic signal to ifplugd +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ifplugd_read_config" lineno="49"> +<summary> +Read ifplugd etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ifplugd_manage_config" lineno="68"> +<summary> +Manage ifplugd etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ifplugd_read_pid_files" lineno="88"> +<summary> +Read ifplugd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ifplugd_admin" lineno="114"> +<summary> +All of the rules required to administrate +an ifplugd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the ifplugd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="imaze" filename="policy/modules/contrib/imaze.if"> +<summary>iMaze game server</summary> +</module> +<module name="inetd" filename="policy/modules/contrib/inetd.if"> +<summary>Internet services daemon.</summary> +<interface name="inetd_core_service_domain" lineno="27"> +<summary> +Define the specified domain as a inetd service. +</summary> +<desc> +<p> +Define the specified domain as a inetd service. The +inetd_service_domain(), inetd_tcp_service_domain(), +or inetd_udp_service_domain() interfaces should be used +instead of this interface, as this interface only provides +the common rules to these three interfaces. +</p> +</desc> +<param name="domain"> +<summary> +The type associated with the inetd service process. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +<interface name="inetd_tcp_service_domain" lineno="57"> +<summary> +Define the specified domain as a TCP inetd service. +</summary> +<param name="domain"> +<summary> +The type associated with the inetd service process. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +<interface name="inetd_udp_service_domain" lineno="83"> +<summary> +Define the specified domain as a UDP inetd service. +</summary> +<param name="domain"> +<summary> +The type associated with the inetd service process. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +<interface name="inetd_service_domain" lineno="108"> +<summary> +Define the specified domain as a TCP and UDP inetd service. +</summary> +<param name="domain"> +<summary> +The type associated with the inetd service process. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +<interface name="inetd_use_fds" lineno="134"> +<summary> +Inherit and use file descriptors from inetd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inetd_tcp_connect" lineno="152"> +<summary> +Connect to the inetd service using a TCP connection. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inetd_domtrans_child" lineno="166"> +<summary> +Run inetd child process in the inet child domain +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="inetd_udp_send" lineno="185"> +<summary> +Send UDP network traffic to inetd. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inetd_rw_tcp_sockets" lineno="199"> +<summary> +Read and write inetd TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="inn" filename="policy/modules/contrib/inn.if"> +<summary>Internet News NNTP server</summary> +<interface name="inn_exec" lineno="14"> +<summary> +Allow the specified domain to execute innd +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_exec_config" lineno="33"> +<summary> +Allow the specified domain to execute +inn configuration files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_manage_log" lineno="51"> +<summary> +Create, read, write, and delete the innd log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_manage_pid" lineno="70"> +<summary> +Create, read, write, and delete the innd pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_read_config" lineno="91"> +<summary> +Read innd configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_read_news_lib" lineno="111"> +<summary> +Read innd news library files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_read_news_spool" lineno="131"> +<summary> +Read innd news library files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_dgram_send" lineno="151"> +<summary> +Send to a innd unix dgram socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="inn_domtrans" lineno="169"> +<summary> +Execute inn in the inn domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="inn_admin" lineno="195"> +<summary> +All of the rules required to administrate +an inn environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the inn domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="irc" filename="policy/modules/contrib/irc.if"> +<summary>IRC client policy</summary> +<interface name="irc_role" lineno="18"> +<summary> +Role access for IRC +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +</module> +<module name="ircd" filename="policy/modules/contrib/ircd.if"> +<summary>IRC server</summary> +</module> +<module name="irqbalance" filename="policy/modules/contrib/irqbalance.if"> +<summary>IRQ balancing daemon</summary> +</module> +<module name="iscsi" filename="policy/modules/contrib/iscsi.if"> +<summary>Establish connections to iSCSI devices</summary> +<interface name="iscsid_domtrans" lineno="13"> +<summary> +Execute a domain transition to run iscsid. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="iscsi_manage_semaphores" lineno="31"> +<summary> +Manage iscsid sempaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iscsi_stream_connect" lineno="49"> +<summary> +Connect to ISCSI using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iscsi_read_lib_files" lineno="68"> +<summary> +Read iscsi lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="jabber" filename="policy/modules/contrib/jabber.if"> +<summary>Jabber instant messaging server</summary> +<interface name="jabber_tcp_connect" lineno="13"> +<summary> +Connect to jabber over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="jabber_admin" lineno="34"> +<summary> +All of the rules required to administrate +an jabber environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the jabber domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="java" filename="policy/modules/contrib/java.if"> +<summary>Java virtual machine</summary> +<interface name="java_role" lineno="18"> +<summary> +Role access for java +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<template name="java_role_template" lineno="63"> +<summary> +The role template for the java module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for java applications. +</p> +</desc> +<param name="role_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<template name="java_domtrans" lineno="108"> +<summary> +Run java in javaplugin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</template> +<interface name="java_run" lineno="132"> +<summary> +Execute java in the java domain, and +allow the specified role the java domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="java_domtrans_unconfined" lineno="151"> +<summary> +Execute the java program in the unconfined java domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="java_run_unconfined" lineno="175"> +<summary> +Execute the java program in the unconfined java domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="java_exec" lineno="194"> +<summary> +Execute the java program in the java domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_java_execstack" dftval="false"> +<desc> +<p> +Allow java executable stack +</p> +</desc> +</tunable> +</module> +<module name="kdump" filename="policy/modules/contrib/kdump.if"> +<summary>Kernel crash dumping mechanism</summary> +<interface name="kdump_domtrans" lineno="13"> +<summary> +Execute kdump in the kdump domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kdump_initrc_domtrans" lineno="32"> +<summary> +Execute kdump in the kdump domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kdump_read_config" lineno="50"> +<summary> +Read kdump configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kdump_manage_config" lineno="69"> +<summary> +Manage kdump configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kdump_admin" lineno="95"> +<summary> +All of the rules required to administrate +an kdump environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the kdump domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="kdumpgui" filename="policy/modules/contrib/kdumpgui.if"> +<summary>system-config-kdump GUI</summary> +</module> +<module name="kerberos" filename="policy/modules/contrib/kerberos.if"> +<summary>MIT Kerberos admin and KDC</summary> +<desc> +<p> +This policy supports: +</p> +<p> +Servers: +<ul> +<li>kadmind</li> +<li>krb5kdc</li> +</ul> +</p> +<p> +Clients: +<ul> +<li>kinit</li> +<li>kdestroy</li> +<li>klist</li> +<li>ksu (incomplete)</li> +</ul> +</p> +</desc> +<interface name="kerberos_exec_kadmind" lineno="34"> +<summary> +Execute kadmind in the current domain +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kerberos_domtrans_kpropd" lineno="52"> +<summary> +Execute a domain transition to run kpropd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kerberos_use" lineno="70"> +<summary> +Use kerberos services +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kerberos_read_config" lineno="131"> +<summary> +Read the kerberos configuration file (/etc/krb5.conf). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kerberos_dontaudit_write_config" lineno="152"> +<summary> +Do not audit attempts to write the kerberos +configuration file (/etc/krb5.conf). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kerberos_rw_config" lineno="171"> +<summary> +Read and write the kerberos configuration file (/etc/krb5.conf). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kerberos_read_keytab" lineno="191"> +<summary> +Read the kerberos key table. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kerberos_rw_keytab" lineno="210"> +<summary> +Read/Write the kerberos key table. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="kerberos_keytab_template" lineno="234"> +<summary> +Create a derived type for kerberos keytab +</summary> +<param name="prefix"> +<summary> +The prefix to be used for deriving type names. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</template> +<interface name="kerberos_read_kdc_config" lineno="255"> +<summary> +Read the kerberos kdc configuration file (/etc/krb5kdc.conf). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kerberos_manage_host_rcache" lineno="275"> +<summary> +Read the kerberos kdc configuration file (/etc/krb5kdc.conf). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kerberos_connect_524" lineno="307"> +<summary> +Connect to krb524 service +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kerberos_admin" lineno="336"> +<summary> +All of the rules required to administrate +an kerberos environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the kerberos domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_kerberos" dftval="false"> +<desc> +<p> +Allow confined applications to run with kerberos. +</p> +</desc> +</tunable> +</module> +<module name="kerneloops" filename="policy/modules/contrib/kerneloops.if"> +<summary>Service for reporting kernel oopses to kerneloops.org</summary> +<interface name="kerneloops_domtrans" lineno="13"> +<summary> +Execute a domain transition to run kerneloops. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kerneloops_dbus_chat" lineno="33"> +<summary> +Send and receive messages from +kerneloops over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kerneloops_dontaudit_dbus_chat" lineno="54"> +<summary> +dontaudit attempts to Send and receive messages from +kerneloops over dbus. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kerneloops_manage_tmp_files" lineno="74"> +<summary> +Allow domain to manage kerneloops tmp files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kerneloops_admin" lineno="100"> +<summary> +All of the rules required to administrate +an kerneloops environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the kerneloops domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="kismet" filename="policy/modules/contrib/kismet.if"> +<summary>Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.</summary> +<interface name="kismet_domtrans" lineno="13"> +<summary> +Execute a domain transition to run kismet. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kismet_run" lineno="38"> +<summary> +Execute kismet in the kismet domain, and +allow the specified role the kismet domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="kismet_read_pid_files" lineno="57"> +<summary> +Read kismet PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_manage_pid_files" lineno="76"> +<summary> +Manage kismet var_run files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_search_lib" lineno="95"> +<summary> +Search kismet lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_read_lib_files" lineno="114"> +<summary> +Read kismet lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_manage_lib_files" lineno="135"> +<summary> +Create, read, write, and delete +kismet lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_manage_lib" lineno="154"> +<summary> +Manage kismet var_lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_read_log" lineno="175"> +<summary> +Allow the specified domain to read kismet's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kismet_append_log" lineno="195"> +<summary> +Allow the specified domain to append +kismet log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_manage_log" lineno="214"> +<summary> +Allow domain to manage kismet log files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kismet_admin" lineno="236"> +<summary> +All of the rules required to administrate an kismet environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ksmtuned" filename="policy/modules/contrib/ksmtuned.if"> +<summary>Kernel Samepage Merging (KSM) Tuning Daemon</summary> +<interface name="ksmtuned_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ksmtuned. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ksmtuned_initrc_domtrans" lineno="31"> +<summary> +Execute ksmtuned server in the ksmtuned domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ksmtuned_admin" lineno="56"> +<summary> +All of the rules required to administrate +an ksmtuned environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ktalk" filename="policy/modules/contrib/ktalk.if"> +<summary>KDE Talk daemon</summary> +</module> +<module name="kudzu" filename="policy/modules/contrib/kudzu.if"> +<summary>Hardware detection and configuration tools</summary> +<interface name="kudzu_domtrans" lineno="13"> +<summary> +Execute kudzu in the kudzu domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="kudzu_run" lineno="38"> +<summary> +Execute kudzu in the kudzu domain, and +allow the specified role the kudzu domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kudzu_getattr_exec_files" lineno="58"> +<summary> +Get attributes of kudzu executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="ldap" filename="policy/modules/contrib/ldap.if"> +<summary>OpenLDAP directory server</summary> +<interface name="ldap_list_db" lineno="14"> +<summary> +Read the contents of the OpenLDAP +database directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ldap_read_config" lineno="33"> +<summary> +Read the OpenLDAP configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ldap_use" lineno="52"> +<summary> +Use LDAP over TCP connection. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ldap_stream_connect" lineno="66"> +<summary> +Connect to slapd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ldap_admin" lineno="93"> +<summary> +All of the rules required to administrate +an ldap environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the ldap domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="likewise" filename="policy/modules/contrib/likewise.if"> +<summary>Likewise Active Directory support for UNIX.</summary> +<desc> +<p> +Likewise Open is a free, open source application that joins Linux, Unix, +and Mac machines to Microsoft Active Directory to securely authenticate +users with their domain credentials. +</p> +</desc> +<template name="likewise_domain_template" lineno="26"> +<summary> +The template to define a likewise domain. +</summary> +<desc> +<p> +This template creates a domain to be used for +a new likewise daemon. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The type of daemon to be used. +</summary> +</param> +</template> +<interface name="likewise_stream_connect_lsassd" lineno="98"> +<summary> +Connect to lsassd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="lircd" filename="policy/modules/contrib/lircd.if"> +<summary>Linux infared remote control daemon</summary> +<interface name="lircd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run lircd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="lircd_stream_connect" lineno="33"> +<summary> +Connect to lircd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lircd_read_config" lineno="52"> +<summary> +Read lircd etc file +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lircd_admin" lineno="77"> +<summary> +All of the rules required to administrate +a lircd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the syslog domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="livecd" filename="policy/modules/contrib/livecd.if"> +<summary>Livecd tool for building alternate livecd for different os and policy versions.</summary> +<interface name="livecd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run livecd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="livecd_run" lineno="37"> +<summary> +Execute livecd in the livecd domain, and +allow the specified role the livecd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="livecd_read_tmp_files" lineno="56"> +<summary> +Read livecd temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="livecd_rw_tmp_files" lineno="75"> +<summary> +Read and write livecd temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="livecd_rw_semaphores" lineno="94"> +<summary> +Allow read and write access to livecd semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="loadkeys" filename="policy/modules/contrib/loadkeys.if"> +<summary>Load keyboard mappings.</summary> +<interface name="loadkeys_domtrans" lineno="13"> +<summary> +Execute the loadkeys program in the loadkeys domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="loadkeys_run" lineno="42"> +<summary> +Execute the loadkeys program in the loadkeys domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the loadkeys domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="loadkeys_exec" lineno="61"> +<summary> +Execute the loadkeys program in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="lockdev" filename="policy/modules/contrib/lockdev.if"> +<summary>device locking policy for lockdev</summary> +<interface name="lockdev_role" lineno="18"> +<summary> +Role access for lockdev +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +</module> +<module name="logrotate" filename="policy/modules/contrib/logrotate.if"> +<summary>Rotate and archive system logs</summary> +<interface name="logrotate_domtrans" lineno="13"> +<summary> +Execute logrotate in the logrotate domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logrotate_run" lineno="39"> +<summary> +Execute logrotate in the logrotate domain, and +allow the specified role the logrotate domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logrotate_exec" lineno="58"> +<summary> +Execute logrotate in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logrotate_use_fds" lineno="77"> +<summary> +Inherit and use logrotate file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logrotate_dontaudit_use_fds" lineno="95"> +<summary> +Do not audit attempts to inherit logrotate file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="logrotate_read_tmp_files" lineno="113"> +<summary> +Read a logrotate temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="logwatch" filename="policy/modules/contrib/logwatch.if"> +<summary>System log analyzer and reporter</summary> +<interface name="logwatch_read_tmp_files" lineno="13"> +<summary> +Read logwatch temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logwatch_search_cache_dir" lineno="32"> +<summary> +Search logwatch cache directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="lpd" filename="policy/modules/contrib/lpd.if"> +<summary>Line printer daemon</summary> +<interface name="lpd_role" lineno="18"> +<summary> +Role access for lpd +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="lpd_domtrans_checkpc" lineno="47"> +<summary> +Execute lpd in the lpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="lpd_run_checkpc" lineno="72"> +<summary> +Execute amrecover in the lpd domain, and +allow the specified role the lpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="lpd_list_spool" lineno="91"> +<summary> +List the contents of the printer spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lpd_read_spool" lineno="110"> +<summary> +Read the printer spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lpd_manage_spool" lineno="129"> +<summary> +Create, read, write, and delete printer spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lpd_relabel_spool" lineno="150"> +<summary> +Relabel from and to the spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lpd_read_config" lineno="170"> +<summary> +List the contents of the printer spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<template name="lpd_domtrans_lpr" lineno="189"> +<summary> +Transition to a user lpr domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</template> +<interface name="lpd_exec_lpr" lineno="208"> +<summary> +Allow the specified domain to execute lpr +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="use_lpd_server" dftval="false"> +<desc> +<p> +Use lpd server instead of cups +</p> +</desc> +</tunable> +</module> +<module name="mailman" filename="policy/modules/contrib/mailman.if"> +<summary>Mailman is for managing electronic mail discussion and e-newsletter lists</summary> +<template name="mailman_domain_template" lineno="19"> +<summary> +The template to define a mailmain domain. +</summary> +<desc> +<p> +This template creates a domain to be used for +a new mailman daemon. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The type of daemon to be used eg, cgi would give mailman_cgi_ +</summary> +</param> +</template> +<interface name="mailman_domtrans" lineno="103"> +<summary> +Execute mailman in the mailman domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mailman_domtrans_cgi" lineno="122"> +<summary> +Execute mailman CGI scripts in the +mailman CGI domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mailman_exec" lineno="140"> +<summary> +Execute mailman in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowd access. +</summary> +</param> +</interface> +<interface name="mailman_signal_cgi" lineno="158"> +<summary> +Send generic signals to the mailman cgi domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_search_data" lineno="176"> +<summary> +Allow domain to search data directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_read_data_files" lineno="194"> +<summary> +Allow domain to to read mailman data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_manage_data_files" lineno="215"> +<summary> +Allow domain to to create mailman data files +and write the directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_list_data" lineno="234"> +<summary> +List the contents of mailman data directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_read_data_symlinks" lineno="252"> +<summary> +Allow read acces to mailman data symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_read_log" lineno="270"> +<summary> +Read mailman logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_append_log" lineno="288"> +<summary> +Append to mailman logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_manage_log" lineno="307"> +<summary> +Create, read, write, and delete +mailman logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_read_archive" lineno="326"> +<summary> +Allow domain to read mailman archive files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mailman_domtrans_queue" lineno="346"> +<summary> +Execute mailman_queue in the mailman_queue domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="mcelog" filename="policy/modules/contrib/mcelog.if"> +<summary>policy for mcelog</summary> +<interface name="mcelog_domtrans" lineno="13"> +<summary> +Execute a domain transition to run mcelog. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="mediawiki" filename="policy/modules/contrib/mediawiki.if"> +<summary>Mediawiki policy</summary> +</module> +<module name="memcached" filename="policy/modules/contrib/memcached.if"> +<summary>high-performance memory object caching system</summary> +<interface name="memcached_domtrans" lineno="13"> +<summary> +Execute a domain transition to run memcached. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="memcached_read_pid_files" lineno="32"> +<summary> +Read memcached PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="memcached_admin" lineno="58"> +<summary> +All of the rules required to administrate +an memcached environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the memcached domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="milter" filename="policy/modules/contrib/milter.if"> +<summary>Milter mail filters</summary> +<template name="milter_template" lineno="14"> +<summary> +Create a set of derived types for various +mail filter applications using the milter interface. +</summary> +<param name="milter_name"> +<summary> +The name to be used for deriving type names. +</summary> +</param> +</template> +<interface name="milter_stream_connect_all" lineno="59"> +<summary> +MTA communication with milter sockets +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="milter_getattr_all_sockets" lineno="78"> +<summary> +Allow getattr of milter sockets +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="milter_manage_spamass_state" lineno="97"> +<summary> +Manage spamassassin milter state +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="modemmanager" filename="policy/modules/contrib/modemmanager.if"> +<summary>Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards.</summary> +<interface name="modemmanager_domtrans" lineno="13"> +<summary> +Execute a domain transition to run modemmanager. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="modemmanager_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +modemmanager over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="mojomojo" filename="policy/modules/contrib/mojomojo.if"> +<summary>MojoMojo Wiki</summary> +<interface name="mojomojo_admin" lineno="20"> +<summary> +All of the rules required to administrate +an mojomojo environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="mono" filename="policy/modules/contrib/mono.if"> +<summary>Run .NET server and client applications on Linux.</summary> +<template name="mono_role_template" lineno="30"> +<summary> +The role template for the mono module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for mono applications. +</p> +</desc> +<param name="role_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="mono_domtrans" lineno="69"> +<summary> +Execute the mono program in the mono domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mono_run" lineno="94"> +<summary> +Execute mono in the mono domain, and +allow the specified role the mono domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="mono_exec" lineno="113"> +<summary> +Execute the mono program in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mono_rw_shm" lineno="132"> +<summary> +Read and write to mono shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="monop" filename="policy/modules/contrib/monop.if"> +<summary>Monopoly daemon</summary> +</module> +<module name="mozilla" filename="policy/modules/contrib/mozilla.if"> +<summary>Policy for Mozilla and related web browsers</summary> +<interface name="mozilla_role" lineno="18"> +<summary> +Role access for mozilla +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="mozilla_read_user_home_files" lineno="62"> +<summary> +Read mozilla home directory content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_write_user_home_files" lineno="83"> +<summary> +Write mozilla home directory content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_dontaudit_rw_user_home_files" lineno="102"> +<summary> +Dontaudit attempts to read/write mozilla home directory content +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mozilla_dontaudit_manage_user_home_files" lineno="120"> +<summary> +Dontaudit attempts to write mozilla home directory content +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mozilla_exec_user_home_files" lineno="139"> +<summary> +Execute mozilla home directory content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_execmod_user_home_files" lineno="157"> +<summary> +Execmod mozilla home directory content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_domtrans" lineno="175"> +<summary> +Run mozilla in the mozilla domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mozilla_domtrans_plugin" lineno="193"> +<summary> +Execute a domain transition to run mozilla_plugin. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_run_plugin" lineno="219"> +<summary> +Execute mozilla_plugin in the mozilla_plugin domain, and +allow the specified role the mozilla_plugin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the mozilla_plugin domain. +</summary> +</param> +</interface> +<interface name="mozilla_dbus_chat" lineno="239"> +<summary> +Send and receive messages from +mozilla over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_rw_tcp_sockets" lineno="259"> +<summary> +read/write mozilla per user tcp_socket +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mozilla_plugin_read_tmpfs_files" lineno="277"> +<summary> +Read mozilla_plugin tmpfs files +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<interface name="mozilla_plugin_delete_tmpfs_files" lineno="295"> +<summary> +Delete mozilla_plugin tmpfs files +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +</interface> +<tunable name="mozilla_read_content" dftval="false"> +<desc> +<p> +Allow confined web browsers to read home directory content +</p> +</desc> +</tunable> +</module> +<module name="mpd" filename="policy/modules/contrib/mpd.if"> +<summary>Music Player Daemon</summary> +<interface name="mpd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run mpd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mpd_initrc_domtrans" lineno="31"> +<summary> +Execute mpd server in the mpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mpd_read_data_files" lineno="49"> +<summary> +Read mpd data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_manage_data_files" lineno="68"> +<summary> +Manage mpd data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_read_tmpfs_files" lineno="87"> +<summary> +Read mpd tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_manage_tmpfs_files" lineno="106"> +<summary> +Manage mpd tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_search_lib" lineno="126"> +<summary> +Search mpd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_read_lib_files" lineno="145"> +<summary> +Read mpd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_manage_lib_files" lineno="165"> +<summary> +Create, read, write, and delete +mpd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_var_lib_filetrans" lineno="195"> +<summary> +Create an object in the root directory, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="mpd_manage_lib_dirs" lineno="214"> +<summary> +Manage mpd lib dirs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mpd_admin" lineno="240"> +<summary> +All of the rules required to administrate +an mpd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="mplayer" filename="policy/modules/contrib/mplayer.if"> +<summary>Mplayer media player and encoder</summary> +<interface name="mplayer_role" lineno="18"> +<summary> +Role access for mplayer +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="mplayer_domtrans" lineno="60"> +<summary> +Run mplayer in mplayer domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mplayer_exec" lineno="79"> +<summary> +Execute mplayer in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mplayer_read_user_home_files" lineno="97"> +<summary> +Read mplayer per user homedir +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_mplayer_execstack" dftval="false"> +<desc> +<p> +Allow mplayer executable stack +</p> +</desc> +</tunable> +</module> +<module name="mrtg" filename="policy/modules/contrib/mrtg.if"> +<summary>Network traffic graphing</summary> +<interface name="mrtg_append_create_logs" lineno="13"> +<summary> +Create and append mrtg logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="mta" filename="policy/modules/contrib/mta.if"> +<summary>Policy common to all email tranfer agents.</summary> +<interface name="mta_stub" lineno="13"> +<summary> +MTA stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="mta_base_mail_template" lineno="41"> +<summary> +Basic mail transfer agent domain template. +</summary> +<desc> +<p> +This template creates a derived domain which is +a email transfer agent, which sends mail on +behalf of the user. +</p> +<p> +This is the basic types and rules, common +to the system agent and user agents. +</p> +</desc> +<param name="domain_prefix"> +<summary> +The prefix of the domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<interface name="mta_role" lineno="162"> +<summary> +Role access for mta +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="mta_mailserver" lineno="194"> +<summary> +Make the specified domain usable for a mail server. +</summary> +<param name="type"> +<summary> +Type to be used as a mail server domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +</interface> +<interface name="mta_agent_executable" lineno="213"> +<summary> +Make the specified type a MTA executable file. +</summary> +<param name="type"> +<summary> +Type to be used as a mail client. +</summary> +</param> +</interface> +<interface name="mta_system_content" lineno="233"> +<summary> +Make the specified type by a system MTA. +</summary> +<param name="type"> +<summary> +Type to be used as a mail client. +</summary> +</param> +</interface> +<interface name="mta_sendmail_mailserver" lineno="266"> +<summary> +Modified mailserver interface for +sendmail daemon use. +</summary> +<desc> +<p> +A modified MTA mail server interface for +the sendmail program. It's design does +not fit well with policy, and using the +regular interface causes a type_transition +conflict if direct running of init scripts +is enabled. +</p> +<p> +This interface should most likely only be used +by the sendmail policy. +</p> +</desc> +<param name="domain"> +<summary> +The type to be used for the mail server. +</summary> +</param> +</interface> +<interface name="mta_mailserver_sender" lineno="287"> +<summary> +Make a type a mailserver type used +for sending mail. +</summary> +<param name="domain"> +<summary> +Mail server domain type used for sending mail. +</summary> +</param> +</interface> +<interface name="mta_mailserver_delivery" lineno="306"> +<summary> +Make a type a mailserver type used +for delivering mail to local users. +</summary> +<param name="domain"> +<summary> +Mail server domain type used for delivering mail. +</summary> +</param> +</interface> +<interface name="mta_mailserver_user_agent" lineno="327"> +<summary> +Make a type a mailserver type used +for sending mail on behalf of local +users to the local mail spool. +</summary> +<param name="domain"> +<summary> +Mail server domain type used for sending local mail. +</summary> +</param> +</interface> +<interface name="mta_send_mail" lineno="351"> +<summary> +Send mail from the system. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mta_sendmail_domtrans" lineno="392"> +<summary> +Execute send mail in a specified domain. +</summary> +<desc> +<p> +Execute send mail in a specified domain. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +Domain to transition to. +</summary> +</param> +</interface> +<interface name="mta_signal_system_mail" lineno="413"> +<summary> +Send system mail client a signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_sendmail_exec" lineno="431"> +<summary> +Execute sendmail in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_read_config" lineno="450"> +<summary> +Read mail server configuration. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mta_write_config" lineno="472"> +<summary> +write mail server configuration. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mta_read_aliases" lineno="490"> +<summary> +Read mail address aliases. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_manage_aliases" lineno="509"> +<summary> +Create, read, write, and delete mail address aliases. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_etc_filetrans_aliases" lineno="530"> +<summary> +Type transition files created in /etc +to the mail address aliases type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_rw_aliases" lineno="549"> +<summary> +Read and write mail aliases. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mta_dontaudit_rw_delivery_tcp_sockets" lineno="569"> +<summary> +Do not audit attempts to read and write TCP +sockets of mail delivery domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mta_tcp_connect_all_mailservers" lineno="587"> +<summary> +Connect to all mail servers over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_dontaudit_read_spool_symlinks" lineno="602"> +<summary> +Do not audit attempts to read a symlink +in the mail spool. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mta_getattr_spool" lineno="620"> +<summary> +Get the attributes of mail spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_dontaudit_getattr_spool_files" lineno="642"> +<summary> +Do not audit attempts to get the attributes +of mail spool files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mta_spool_filetrans" lineno="674"> +<summary> +Create private objects in the +mail spool directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="mta_rw_spool" lineno="693"> +<summary> +Read and write the mail spool. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_append_spool" lineno="715"> +<summary> +Create, read, and write the mail spool. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_delete_spool" lineno="737"> +<summary> +Delete from the mail spool. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_manage_spool" lineno="756"> +<summary> +Create, read, write, and delete mail spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_search_queue" lineno="777"> +<summary> +Search mail queue dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_list_queue" lineno="796"> +<summary> +List the mail queue. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_read_queue" lineno="815"> +<summary> +Read the mail queue. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_dontaudit_rw_queue" lineno="835"> +<summary> +Do not audit attempts to read and +write the mail queue. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="mta_manage_queue" lineno="855"> +<summary> +Create, read, write, and delete +mail queue files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_read_sendmail_bin" lineno="876"> +<summary> +Read sendmail binary. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mta_rw_user_mail_stream_sockets" lineno="895"> +<summary> +Read and write unix domain stream sockets +of user mail domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="munin" filename="policy/modules/contrib/munin.if"> +<summary>Munin network-wide load graphing (formerly LRRD)</summary> +<template name="munin_plugin_template" lineno="14"> +<summary> +Create a set of derived types for various +munin plugins, +</summary> +<param name="prefix"> +<summary> +The name to be used for deriving type names. +</summary> +</param> +</template> +<interface name="munin_stream_connect" lineno="63"> +<summary> +Connect to munin over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="munin_read_config" lineno="84"> +<summary> +Read munin configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="munin_append_log" lineno="106"> +<summary> +Append to the munin log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="munin_search_lib" lineno="126"> +<summary> +Search munin library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="munin_dontaudit_search_lib" lineno="146"> +<summary> +Do not audit attempts to search +munin library directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="munin_admin" lineno="171"> +<summary> +All of the rules required to administrate +an munin environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the munin domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="mysql" filename="policy/modules/contrib/mysql.if"> +<summary>Policy for MySQL</summary> +<interface name="mysql_domtrans" lineno="13"> +<summary> +Execute MySQL in the mysql domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mysql_signal" lineno="31"> +<summary> +Send a generic signal to MySQL. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_tcp_connect" lineno="49"> +<summary> +Allow the specified domain to connect to postgresql with a tcp socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_stream_connect" lineno="71"> +<summary> +Connect to MySQL using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mysql_read_config" lineno="91"> +<summary> +Read MySQL configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mysql_search_db" lineno="114"> +<summary> +Search the directories that contain MySQL +database storage. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_rw_db_dirs" lineno="133"> +<summary> +Read and write to the MySQL database directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_manage_db_dirs" lineno="152"> +<summary> +Create, read, write, and delete MySQL database directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_append_db_files" lineno="171"> +<summary> +Append to the MySQL database directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_rw_db_files" lineno="190"> +<summary> +Read and write to the MySQL database directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_manage_db_files" lineno="209"> +<summary> +Create, read, write, and delete MySQL database files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_rw_db_sockets" lineno="229"> +<summary> +Read and write to the MySQL database +named socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_write_log" lineno="249"> +<summary> +Write to the MySQL log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_domtrans_mysql_safe" lineno="268"> +<summary> +Execute MySQL server in the mysql domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mysql_read_pid_files" lineno="286"> +<summary> +Read MySQL PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mysql_search_pid_files" lineno="306"> +<summary> +Search MySQL PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="mysql_admin" lineno="330"> +<summary> +All of the rules required to administrate an mysql environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the mysql domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="mysql_connect_any" dftval="false"> +<desc> +<p> +Allow mysqld to connect to all ports +</p> +</desc> +</tunable> +</module> +<module name="nagios" filename="policy/modules/contrib/nagios.if"> +<summary>Net Saint / NAGIOS - network monitoring server</summary> +<template name="nagios_plugin_template" lineno="14"> +<summary> +Create a set of derived types for various +nagios plugins, +</summary> +<param name="plugins_group_name"> +<summary> +The name to be used for deriving type names. +</summary> +</param> +</template> +<interface name="nagios_dontaudit_rw_pipes" lineno="54"> +<summary> +Do not audit attempts to read or write nagios +unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="nagios_read_config" lineno="74"> +<summary> +Allow the specified domain to read +nagios configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="nagios_read_log" lineno="94"> +<summary> +Read nagios logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nagios_dontaudit_rw_log" lineno="113"> +<summary> +Do not audit attempts to read or write nagios logs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="nagios_search_spool" lineno="131"> +<summary> +Search nagios spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nagios_read_tmp_files" lineno="151"> +<summary> +Allow the specified domain to read +nagios temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nagios_domtrans_nrpe" lineno="171"> +<summary> +Execute the nagios NRPE with +a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nagios_admin" lineno="196"> +<summary> +All of the rules required to administrate +an nagios environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the nagios domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ncftool" filename="policy/modules/contrib/ncftool.if"> +<summary>Netcf network configuration tool (ncftool).</summary> +<interface name="ncftool_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ncftool. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ncftool_run" lineno="37"> +<summary> +Execute ncftool in the ncftool domain, and +allow the specified role the ncftool domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed the ncftool domain. +</summary> +</param> +</interface> +</module> +<module name="nessus" filename="policy/modules/contrib/nessus.if"> +<summary>Nessus network scanning daemon</summary> +<interface name="nessus_tcp_connect" lineno="13"> +<summary> +Connect to nessus over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="networkmanager" filename="policy/modules/contrib/networkmanager.if"> +<summary>Manager for dynamically switching between networks.</summary> +<interface name="networkmanager_rw_udp_sockets" lineno="14"> +<summary> +Read and write NetworkManager UDP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_rw_packet_sockets" lineno="33"> +<summary> +Read and write NetworkManager packet sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_attach_tun_iface" lineno="51"> +<summary> +Allow caller to relabel tun_socket +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_rw_routing_sockets" lineno="72"> +<summary> +Read and write NetworkManager netlink +routing sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_domtrans" lineno="90"> +<summary> +Execute NetworkManager with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="networkmanager_initrc_domtrans" lineno="109"> +<summary> +Execute NetworkManager scripts with an automatic domain transition to initrc. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="networkmanager_dbus_chat" lineno="128"> +<summary> +Send and receive messages from +NetworkManager over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_signal" lineno="148"> +<summary> +Send a generic signal to NetworkManager +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_read_lib_files" lineno="166"> +<summary> +Read NetworkManager lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="networkmanager_read_pid_files" lineno="186"> +<summary> +Read NetworkManager PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="nis" filename="policy/modules/contrib/nis.if"> +<summary>Policy for NIS (YP) servers and clients</summary> +<interface name="nis_use_ypbind_uncond" lineno="26"> +<summary> +Use the ypbind service to access NIS services +unconditionally. +</summary> +<desc> +<p> +Use the ypbind service to access NIS services +unconditionally. +</p> +<p> +This interface was added because of apache and +spamassassin, to fix a nested conditionals problem. +When that support is added, this should be removed, +and the regular interface should be used. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_use_ypbind" lineno="90"> +<summary> +Use the ypbind service to access NIS services. +</summary> +<desc> +<p> +Allow the specified domain to use the ypbind service +to access Network Information Service (NIS) services. +Information that can be retreived from NIS includes +usernames, passwords, home directories, and groups. +If the network is configured to have a single sign-on +using NIS, it is likely that any program that does +authentication will need this access. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +<rolecap/> +</interface> +<interface name="nis_authenticate" lineno="107"> +<summary> +Use the nis to authenticate passwords +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="nis_domtrans_ypbind" lineno="125"> +<summary> +Execute ypbind in the ypbind domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nis_run_ypbind" lineno="151"> +<summary> +Execute ypbind in the ypbind domain, and +allow the specified role the ypbind domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="nis_signal_ypbind" lineno="170"> +<summary> +Send generic signals to ypbind. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_list_var_yp" lineno="188"> +<summary> +List the contents of the NIS data directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_udp_send_ypbind" lineno="207"> +<summary> +Send UDP network traffic to NIS clients. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_tcp_connect_ypbind" lineno="221"> +<summary> +Connect to ypbind over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_read_ypbind_pid" lineno="235"> +<summary> +Read ypbind pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_delete_ypbind_pid" lineno="254"> +<summary> +Delete ypbind pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_read_ypserv_config" lineno="273"> +<summary> +Read ypserv configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nis_domtrans_ypxfr" lineno="292"> +<summary> +Execute ypxfr in the ypxfr domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nis_initrc_domtrans" lineno="312"> +<summary> +Execute nis server in the nis domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nis_initrc_domtrans_ypbind" lineno="330"> +<summary> +Execute nis server in the nis domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nis_admin" lineno="355"> +<summary> +All of the rules required to administrate +an nis environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="nscd" filename="policy/modules/contrib/nscd.if"> +<summary>Name service cache daemon</summary> +<interface name="nscd_signal" lineno="13"> +<summary> +Send generic signals to NSCD. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_kill" lineno="31"> +<summary> +Send NSCD the kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_signull" lineno="49"> +<summary> +Send signulls to NSCD. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_domtrans" lineno="67"> +<summary> +Execute NSCD in the nscd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nscd_exec" lineno="87"> +<summary> +Allow the specified domain to execute nscd +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_socket_use" lineno="106"> +<summary> +Use NSCD services by connecting using +a unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_shm_use" lineno="133"> +<summary> +Use NSCD services by mapping the database from +an inherited NSCD file descriptor. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_dontaudit_search_pid" lineno="166"> +<summary> +Do not audit attempts to search the NSCD pid directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="nscd_read_pid" lineno="184"> +<summary> +Read NSCD pid file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_unconfined" lineno="203"> +<summary> +Unconfined access to NSCD services. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nscd_run" lineno="228"> +<summary> +Execute nscd in the nscd domain, and +allow the specified role the nscd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="nscd_initrc_domtrans" lineno="247"> +<summary> +Execute the nscd server init script. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nscd_admin" lineno="272"> +<summary> +All of the rules required to administrate +an nscd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the nscd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="nsd" filename="policy/modules/contrib/nsd.if"> +<summary>Authoritative only name server</summary> +<interface name="nsd_udp_chat" lineno="13"> +<summary> +Send and receive datagrams from NSD. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nsd_tcp_connect" lineno="27"> +<summary> +Connect to NSD over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="nslcd" filename="policy/modules/contrib/nslcd.if"> +<summary>nslcd - local LDAP name service daemon.</summary> +<interface name="nslcd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run nslcd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nslcd_initrc_domtrans" lineno="31"> +<summary> +Execute nslcd server in the nslcd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nslcd_read_pid_files" lineno="49"> +<summary> +Read nslcd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nslcd_stream_connect" lineno="68"> +<summary> +Connect to nslcd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nslcd_admin" lineno="94"> +<summary> +All of the rules required to administrate +an nslcd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ntop" filename="policy/modules/contrib/ntop.if"> +<summary>Network Top</summary> +</module> +<module name="ntp" filename="policy/modules/contrib/ntp.if"> +<summary>Network time protocol daemon</summary> +<interface name="ntp_stub" lineno="13"> +<summary> +NTP stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ntp_domtrans" lineno="29"> +<summary> +Execute ntp server in the ntpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ntp_run" lineno="55"> +<summary> +Execute ntp in the ntp domain, and +allow the specified role the ntp domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ntp_domtrans_ntpdate" lineno="74"> +<summary> +Execute ntp server in the ntpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ntp_initrc_domtrans" lineno="93"> +<summary> +Execute ntp server in the ntpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ntp_rw_shm" lineno="111"> +<summary> +Read and write ntpd shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ntp_admin" lineno="140"> +<summary> +All of the rules required to administrate +an ntp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the ntp domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="nut" filename="policy/modules/contrib/nut.if"> +<summary>nut - Network UPS Tools </summary> +</module> +<module name="nx" filename="policy/modules/contrib/nx.if"> +<summary>NX remote desktop</summary> +<interface name="nx_spec_domtrans_server" lineno="13"> +<summary> +Transition to NX server. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="nx_read_home_files" lineno="31"> +<summary> +Read nx home directory content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nx_search_var_lib" lineno="50"> +<summary> +Read nx /var/lib content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="nx_var_lib_filetrans" lineno="79"> +<summary> +Create an object in the root directory, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +</module> +<module name="oav" filename="policy/modules/contrib/oav.if"> +<summary>Open AntiVirus scannerdaemon and signature update</summary> +<interface name="oav_domtrans_update" lineno="13"> +<summary> +Execute oav_update in the oav_update domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="oav_run_update" lineno="39"> +<summary> +Execute oav_update in the oav_update domain, and +allow the specified role the oav_update domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="oddjob" filename="policy/modules/contrib/oddjob.if"> +<summary> +Oddjob provides a mechanism by which unprivileged applications can +request that specified privileged operations be performed on their +behalf. +</summary> +<interface name="oddjob_domtrans" lineno="17"> +<summary> +Execute a domain transition to run oddjob. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="oddjob_system_entry" lineno="41"> +<summary> +Make the specified program domain accessable +from the oddjob. +</summary> +<param name="domain"> +<summary> +The type of the process to transition to. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type of the file used as an entrypoint to this domain. +</summary> +</param> +</interface> +<interface name="oddjob_dbus_chat" lineno="60"> +<summary> +Send and receive messages from +oddjob over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="oddjob_domtrans_mkhomedir" lineno="80"> +<summary> +Execute a domain transition to run oddjob_mkhomedir. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="oddjob_run_mkhomedir" lineno="104"> +<summary> +Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="oident" filename="policy/modules/contrib/oident.if"> +<summary>SELinux policy for Oident daemon.</summary> +<desc> +<p> +Oident daemon is a server that implements the TCP/IP +standard IDENT user identification protocol as +specified in the RFC 1413 document. +</p> +</desc> +<interface name="oident_read_user_content" lineno="21"> +<summary> +Allow the specified domain to read +Oidentd personal configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="oident_manage_user_content" lineno="41"> +<summary> +Allow the specified domain to create, read, write, and delete +Oidentd personal configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="oident_relabel_user_content" lineno="61"> +<summary> +Allow the specified domain to relabel +Oidentd personal configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="openca" filename="policy/modules/contrib/openca.if"> +<summary>OpenCA - Open Certificate Authority</summary> +<interface name="openca_domtrans" lineno="14"> +<summary> +Execute the OpenCA program with +a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="openca_signal" lineno="34"> +<summary> +Send OpenCA generic signals. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openca_sigstop" lineno="52"> +<summary> +Send OpenCA stop signals. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openca_kill" lineno="70"> +<summary> +Kill OpenCA. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="openct" filename="policy/modules/contrib/openct.if"> +<summary>Service for handling smart card readers.</summary> +<interface name="openct_signull" lineno="13"> +<summary> +Send openct a null signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openct_exec" lineno="31"> +<summary> +Execute openct in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openct_domtrans" lineno="50"> +<summary> +Execute a domain transition to run openct. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="openct_read_pid_files" lineno="69"> +<summary> +Read openct PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openct_stream_connect" lineno="88"> +<summary> +Connect to openct over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="openvpn" filename="policy/modules/contrib/openvpn.if"> +<summary>full-featured SSL VPN solution</summary> +<interface name="openvpn_domtrans" lineno="13"> +<summary> +Execute OPENVPN clients in the openvpn domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="openvpn_run" lineno="38"> +<summary> +Execute OPENVPN clients in the openvpn domain, and +allow the specified role the openvpn domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="openvpn_kill" lineno="57"> +<summary> +Send OPENVPN clients the kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openvpn_signal" lineno="75"> +<summary> +Send generic signals to OPENVPN clients. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openvpn_signull" lineno="93"> +<summary> +Send signulls to OPENVPN clients. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="openvpn_read_config" lineno="113"> +<summary> +Allow the specified domain to read +OpenVPN configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="openvpn_admin" lineno="141"> +<summary> +All of the rules required to administrate +an openvpn environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the openvpn domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="openvpn_enable_homedirs" dftval="false"> +<desc> +<p> +Allow openvpn to read home directories +</p> +</desc> +</tunable> +</module> +<module name="pads" filename="policy/modules/contrib/pads.if"> +<summary>Passive Asset Detection System</summary> +<desc> +<p> +PADS is a libpcap based detection engine used to +passively detect network assets. It is designed to +complement IDS technology by providing context to IDS +alerts. +</p> +</desc> +<interface name="pads_admin" lineno="28"> +<summary> +All of the rules required to administrate +an pads environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="passenger" filename="policy/modules/contrib/passenger.if"> +<summary>Ruby on rails deployment for Apache and Nginx servers.</summary> +<interface name="passenger_domtrans" lineno="13"> +<summary> +Execute passenger in the passenger domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="passenger_read_lib_files" lineno="31"> +<summary> +Read passenger lib files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="pcmcia" filename="policy/modules/contrib/pcmcia.if"> +<summary>PCMCIA card management services</summary> +<interface name="pcmcia_stub" lineno="13"> +<summary> +PCMCIA stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcmcia_domtrans_cardmgr" lineno="29"> +<summary> +Execute cardmgr in the cardmgr domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pcmcia_use_cardmgr_fds" lineno="47"> +<summary> +Inherit and use file descriptors from cardmgr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcmcia_domtrans_cardctl" lineno="65"> +<summary> +Execute cardctl in the cardmgr domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pcmcia_run_cardctl" lineno="90"> +<summary> +Execute cardmgr in the cardctl domain, and +allow the specified role the cardmgr domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="pcmcia_read_pid" lineno="109"> +<summary> +Read cardmgr pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcmcia_manage_pid" lineno="129"> +<summary> +Create, read, write, and delete +cardmgr pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcmcia_manage_pid_chr_files" lineno="149"> +<summary> +Create, read, write, and delete +cardmgr runtime character nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="pcscd" filename="policy/modules/contrib/pcscd.if"> +<summary>PCSC smart card service</summary> +<interface name="pcscd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run pcscd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pcscd_read_pub_files" lineno="31"> +<summary> +Read pcscd pub files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcscd_manage_pub_files" lineno="50"> +<summary> +Manage pcscd pub files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcscd_manage_pub_pipes" lineno="69"> +<summary> +Manage pcscd pub fifo files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pcscd_stream_connect" lineno="88"> +<summary> +Connect to pcscd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="pegasus" filename="policy/modules/contrib/pegasus.if"> +<summary>The Open Group Pegasus CIM/WBEM Server.</summary> +</module> +<module name="perdition" filename="policy/modules/contrib/perdition.if"> +<summary>Perdition POP and IMAP proxy</summary> +<interface name="perdition_tcp_connect" lineno="13"> +<summary> +Connect to perdition over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="pingd" filename="policy/modules/contrib/pingd.if"> +<summary>Pingd of the Whatsup cluster node up/down detection utility</summary> +<interface name="pingd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run pingd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pingd_read_config" lineno="31"> +<summary> +Read pingd etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pingd_manage_config" lineno="50"> +<summary> +Manage pingd etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pingd_admin" lineno="78"> +<summary> +All of the rules required to administrate +an pingd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the pingd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="plymouthd" filename="policy/modules/contrib/plymouthd.if"> +<summary>Plymouth graphical boot</summary> +<interface name="plymouthd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run plymouthd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="plymouthd_exec" lineno="31"> +<summary> +Execute the plymoth daemon in the current domain +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_stream_connect" lineno="50"> +<summary> +Allow domain to Stream socket connect +to Plymouth daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_exec_plymouth" lineno="68"> +<summary> +Execute the plymoth command in the current domain +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_domtrans_plymouth" lineno="86"> +<summary> +Execute a domain transition to run plymouthd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="plymouthd_search_spool" lineno="104"> +<summary> +Search plymouthd spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_read_spool_files" lineno="123"> +<summary> +Read plymouthd spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_manage_spool_files" lineno="143"> +<summary> +Create, read, write, and delete +plymouthd spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_search_lib" lineno="162"> +<summary> +Search plymouthd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_read_lib_files" lineno="181"> +<summary> +Read plymouthd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_manage_lib_files" lineno="201"> +<summary> +Create, read, write, and delete +plymouthd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_read_pid_files" lineno="220"> +<summary> +Read plymouthd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="plymouthd_admin" lineno="246"> +<summary> +All of the rules required to administrate +an plymouthd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="podsleuth" filename="policy/modules/contrib/podsleuth.if"> +<summary>Podsleuth is a tool to get information about an Apple (TM) iPod (TM)</summary> +<interface name="podsleuth_domtrans" lineno="13"> +<summary> +Execute a domain transition to run podsleuth. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="podsleuth_run" lineno="38"> +<summary> +Execute podsleuth in the podsleuth domain, and +allow the specified role the podsleuth domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +<module name="policykit" filename="policy/modules/contrib/policykit.if"> +<summary>Policy framework for controlling privileges for system-wide services.</summary> +<interface name="policykit_dbus_chat" lineno="14"> +<summary> +Send and receive messages from +policykit over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_domtrans_auth" lineno="34"> +<summary> +Execute a domain transition to run polkit_auth. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="policykit_run_auth" lineno="58"> +<summary> +Execute a policy_auth in the policy_auth domain, and +allow the specified role the policy_auth domain, +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="policykit_domtrans_grant" lineno="77"> +<summary> +Execute a domain transition to run polkit_grant. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="policykit_run_grant" lineno="102"> +<summary> +Execute a policy_grant in the policy_grant domain, and +allow the specified role the policy_grant domain, +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="policykit_read_reload" lineno="125"> +<summary> +read policykit reload files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_rw_reload" lineno="144"> +<summary> +rw policykit reload files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_domtrans_resolve" lineno="163"> +<summary> +Execute a domain transition to run polkit_resolve. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="policykit_search_lib" lineno="183"> +<summary> +Search policykit lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="policykit_read_lib" lineno="202"> +<summary> +read policykit lib files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="portage" filename="policy/modules/contrib/portage.if"> +<summary> +Portage Package Management System. The primary package management and +distribution system for Gentoo. +</summary> +<interface name="portage_domtrans" lineno="16"> +<summary> +Execute emerge in the portage domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portage_run" lineno="44"> +<summary> +Execute emerge in the portage domain, and +allow the specified role the portage domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the portage domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="portage_compile_domain" lineno="69"> +<summary> +Template for portage sandbox. +</summary> +<desc> +<p> +Template for portage sandbox. Portage +does all compiling in the sandbox. +</p> +</desc> +<param name="domain"> +<summary> +Domain Allowed Access +</summary> +</param> +</interface> +<interface name="portage_domtrans_fetch" lineno="222"> +<summary> +Execute tree management functions (fetching, layman, ...) +in the portage_fetch_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portage_run_fetch" lineno="251"> +<summary> +Execute tree management functions (fetching, layman, ...) +in the portage_fetch_t domain, and allow the specified role +the portage_fetch_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the portage_fetch domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="portage_domtrans_gcc_config" lineno="271"> +<summary> +Execute gcc-config in the gcc_config domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portage_run_gcc_config" lineno="299"> +<summary> +Execute gcc-config in the gcc_config domain, and +allow the specified role the gcc_config domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the gcc_config domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="portage_dontaudit_use_fds" lineno="319"> +<summary> +Do not audit attempts to use +portage file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="portage_dontaudit_search_tmp" lineno="338"> +<summary> +Do not audit attempts to search the +portage temporary directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="portage_dontaudit_rw_tmp_files" lineno="357"> +<summary> +Do not audit attempts to read and write +the portage temporary files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<tunable name="portage_use_nfs" dftval="false"> +<desc> +<p> +Allow the portage domains to use NFS mounts (regular nfs_t) +</p> +</desc> +</tunable> +</module> +<module name="portmap" filename="policy/modules/contrib/portmap.if"> +<summary>RPC port mapping service.</summary> +<interface name="portmap_domtrans_helper" lineno="13"> +<summary> +Execute portmap_helper in the helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portmap_run_helper" lineno="40"> +<summary> +Execute portmap helper in the helper domain, and +allow the specified role the helper domain. +Communicate with portmap. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="portmap_udp_send" lineno="59"> +<summary> +Send UDP network traffic to portmap. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="portmap_udp_chat" lineno="73"> +<summary> +Send and receive UDP network traffic from portmap. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="portmap_tcp_connect" lineno="87"> +<summary> +Connect to portmap over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="portreserve" filename="policy/modules/contrib/portreserve.if"> +<summary>Reserve well-known ports in the RPC port range.</summary> +<interface name="portreserve_domtrans" lineno="13"> +<summary> +Execute a domain transition to run portreserve. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portreserve_read_config" lineno="33"> +<summary> +Allow the specified domain to read +portreserve etcuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="portreserve_manage_config" lineno="55"> +<summary> +Allow the specified domain to manage +portreserve etcuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="portreserve_initrc_domtrans" lineno="76"> +<summary> +Execute portreserve in the portreserve domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="portreserve_admin" lineno="101"> +<summary> +All of the rules required to administrate +an portreserve environment. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="portslave" filename="policy/modules/contrib/portslave.if"> +<summary>Portslave terminal server software</summary> +<interface name="portslave_domtrans" lineno="13"> +<summary> +Execute portslave with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="postfix" filename="policy/modules/contrib/postfix.if"> +<summary>Postfix email server</summary> +<interface name="postfix_stub" lineno="13"> +<summary> +Postfix stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="postfix_domain_template" lineno="30"> +<summary> +Creates types and rules for a basic +postfix process domain. +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<template name="postfix_server_domain_template" lineno="112"> +<summary> +Creates a postfix server process domain. +</summary> +<param name="prefix"> +<summary> +Prefix of the domain. +</summary> +</param> +</template> +<template name="postfix_user_domain_template" lineno="154"> +<summary> +Creates a process domain for programs +that are ran by users. +</summary> +<param name="prefix"> +<summary> +Prefix of the domain. +</summary> +</param> +</template> +<interface name="postfix_read_config" lineno="181"> +<summary> +Read postfix configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="postfix_config_filetrans" lineno="212"> +<summary> +Create files with the specified type in +the postfix configuration directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="postfix_dontaudit_rw_local_tcp_sockets" lineno="233"> +<summary> +Do not audit attempts to read and +write postfix local delivery +TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="postfix_rw_local_pipes" lineno="252"> +<summary> +Allow read/write postfix local pipes +TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_read_local_state" lineno="270"> +<summary> +Allow domain to read postfix local process state +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_read_master_state" lineno="288"> +<summary> +Allow domain to read postfix master process state +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_dontaudit_use_fds" lineno="308"> +<summary> +Do not audit attempts to use +postfix master process file +file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="postfix_domtrans_map" lineno="326"> +<summary> +Execute postfix_map in the postfix_map domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="postfix_run_map" lineno="351"> +<summary> +Execute postfix_map in the postfix_map domain, and +allow the specified role the postfix_map domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="postfix_domtrans_master" lineno="371"> +<summary> +Execute the master postfix program in the +postfix_master domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="postfix_exec_master" lineno="390"> +<summary> +Execute the master postfix program in the +caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_stream_connect_master" lineno="409"> +<summary> +Connect to postfix master process using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="postfix_domtrans_postdrop" lineno="428"> +<summary> +Execute the master postdrop in the +postfix_postdrop domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="postfix_domtrans_postqueue" lineno="447"> +<summary> +Execute the master postqueue in the +postfix_postqueue domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="posftix_exec_postqueue" lineno="465"> +<summary> +Execute the master postqueue in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_create_private_sockets" lineno="483"> +<summary> +Create a named socket in a postfix private directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_manage_private_sockets" lineno="502"> +<summary> +manage named socket in a postfix private directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_domtrans_smtp" lineno="522"> +<summary> +Execute the master postfix program in the +postfix_master domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="postfix_search_spool" lineno="540"> +<summary> +Search postfix mail spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_list_spool" lineno="559"> +<summary> +List postfix mail spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_read_spool_files" lineno="578"> +<summary> +Read postfix mail spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_manage_spool_files" lineno="597"> +<summary> +Create, read, write, and delete postfix mail spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postfix_domtrans_user_mail_handler" lineno="617"> +<summary> +Execute postfix user mail programs +in their respective domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="postfixpolicyd" filename="policy/modules/contrib/postfixpolicyd.if"> +<summary>Postfix policy server</summary> +<interface name="postfixpolicyd_admin" lineno="20"> +<summary> +All of the rules required to administrate +an postfixpolicyd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the postfixpolicyd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="postgrey" filename="policy/modules/contrib/postgrey.if"> +<summary>Postfix grey-listing server</summary> +<interface name="postgrey_stream_connect" lineno="13"> +<summary> +Write to postgrey socket +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgrey_search_spool" lineno="33"> +<summary> +Search the spool directory +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgrey_admin" lineno="58"> +<summary> +All of the rules required to administrate +an postgrey environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the postgrey domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ppp" filename="policy/modules/contrib/ppp.if"> +<summary>Point to Point Protocol daemon creates links in ppp networks</summary> +<interface name="ppp_use_fds" lineno="13"> +<summary> +Use PPP file discriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_dontaudit_use_fds" lineno="32"> +<summary> +Do not audit attempts to inherit +and use PPP file discriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="ppp_sigchld" lineno="50"> +<summary> +Send a SIGCHLD signal to PPP. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_kill" lineno="70"> +<summary> +Send ppp a kill signal +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_signal" lineno="88"> +<summary> +Send a generic signal to PPP. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_signull" lineno="106"> +<summary> +Send a generic signull to PPP. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_domtrans" lineno="124"> +<summary> +Execute domain in the ppp domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ppp_run_cond" lineno="149"> +<summary> +Conditionally execute ppp daemon on behalf of a user or staff type. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the ppp domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ppp_run" lineno="177"> +<summary> +Unconditionally execute ppp daemon on behalf of a user or staff type. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the ppp domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ppp_exec" lineno="196"> +<summary> +Execute domain in the ppp caller. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_read_config" lineno="215"> +<summary> +Read ppp configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_read_rw_config" lineno="234"> +<summary> +Read PPP-writable configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_read_secrets" lineno="254"> +<summary> +Read PPP secrets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_read_pid_files" lineno="274"> +<summary> +Read PPP pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_manage_pid_files" lineno="292"> +<summary> +Create, read, write, and delete PPP pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_pid_filetrans" lineno="310"> +<summary> +Create, read, write, and delete PPP pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ppp_initrc_domtrans" lineno="328"> +<summary> +Execute ppp server in the ntpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ppp_admin" lineno="348"> +<summary> +All of the rules required to administrate +an ppp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="pppd_can_insmod" dftval="false"> +<desc> +<p> +Allow pppd to load kernel modules for certain modems +</p> +</desc> +</tunable> +<tunable name="pppd_for_user" dftval="false"> +<desc> +<p> +Allow pppd to be run for a regular user +</p> +</desc> +</tunable> +</module> +<module name="prelink" filename="policy/modules/contrib/prelink.if"> +<summary>Prelink ELF shared library mappings.</summary> +<interface name="prelink_domtrans" lineno="13"> +<summary> +Execute the prelink program in the prelink domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="prelink_exec" lineno="37"> +<summary> +Execute the prelink program in the current domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_run" lineno="62"> +<summary> +Execute the prelink program in the prelink domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the prelink domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="prelink_object_file" lineno="82"> +<summary> +Make the specified file type prelinkable. +</summary> +<param name="file_type"> +<summary> +File type to be prelinked. +</summary> +</param> +</interface> +<interface name="prelink_read_cache" lineno="100"> +<summary> +Read the prelink cache. +</summary> +<param name="file_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_delete_cache" lineno="119"> +<summary> +Delete the prelink cache. +</summary> +<param name="file_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_manage_log" lineno="139"> +<summary> +Create, read, write, and delete +prelink log files. +</summary> +<param name="file_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_manage_lib" lineno="159"> +<summary> +Create, read, write, and delete +prelink var_lib files. +</summary> +<param name="file_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_relabelfrom_lib" lineno="178"> +<summary> +Relabel from files in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelink_relabel_lib" lineno="197"> +<summary> +Relabel from files in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="prelude" filename="policy/modules/contrib/prelude.if"> +<summary>Prelude hybrid intrusion detection system</summary> +<interface name="prelude_domtrans" lineno="13"> +<summary> +Execute a domain transition to run prelude. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="prelude_domtrans_audisp" lineno="31"> +<summary> +Execute a domain transition to run prelude_audisp. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="prelude_signal_audisp" lineno="49"> +<summary> +Signal the prelude_audisp domain. +</summary> +<param name="domain"> +<summary> +Domain allowed acccess. +</summary> +</param> +</interface> +<interface name="prelude_read_spool" lineno="67"> +<summary> +Read the prelude spool files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelude_manage_spool" lineno="86"> +<summary> +Manage to prelude-manager spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="prelude_admin" lineno="113"> +<summary> +All of the rules required to administrate +an prelude environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="privoxy" filename="policy/modules/contrib/privoxy.if"> +<summary>Privacy enhancing web proxy.</summary> +<interface name="privoxy_admin" lineno="20"> +<summary> +All of the rules required to administrate +an privoxy environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="privoxy_connect_any" dftval="false"> +<desc> +<p> +Allow privoxy to connect to all ports, not just +HTTP, FTP, and Gopher ports. +</p> +</desc> +</tunable> +</module> +<module name="procmail" filename="policy/modules/contrib/procmail.if"> +<summary>Procmail mail delivery agent</summary> +<interface name="procmail_domtrans" lineno="13"> +<summary> +Execute procmail with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="procmail_exec" lineno="33"> +<summary> +Execute procmail in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="procmail_read_tmp_files" lineno="53"> +<summary> +Read procmail tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="procmail_rw_tmp_files" lineno="72"> +<summary> +Read/write procmail tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="psad" filename="policy/modules/contrib/psad.if"> +<summary>Intrusion Detection and Log Analysis with iptables</summary> +<interface name="psad_domtrans" lineno="13"> +<summary> +Execute a domain transition to run psad. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="psad_signal" lineno="31"> +<summary> +Send a generic signal to psad +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_signull" lineno="49"> +<summary> +Send a null signal to psad. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_read_config" lineno="67"> +<summary> +Read psad etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_manage_config" lineno="86"> +<summary> +Manage psad etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_read_pid_files" lineno="107"> +<summary> +Read psad PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_rw_pid_files" lineno="126"> +<summary> +Read psad PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_read_log" lineno="146"> +<summary> +Allow the specified domain to read psad's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="psad_append_log" lineno="167"> +<summary> +Allow the specified domain to append to psad's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="psad_rw_fifo_file" lineno="187"> +<summary> +Read and write psad fifo files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_rw_tmp_files" lineno="207"> +<summary> +Read and write psad tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="psad_admin" lineno="233"> +<summary> +All of the rules required to administrate +an psad environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the syslog domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ptchown" filename="policy/modules/contrib/ptchown.if"> +<summary>helper function for grantpt(3), changes ownship and permissions of pseudotty</summary> +<interface name="ptchown_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ptchown. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ptchown_run" lineno="37"> +<summary> +Execute ptchown in the ptchown domain, and +allow the specified role the ptchown domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +<module name="publicfile" filename="policy/modules/contrib/publicfile.if"> +<summary>publicfile supplies files to the public through HTTP and FTP</summary> +</module> +<module name="pulseaudio" filename="policy/modules/contrib/pulseaudio.if"> +<summary>Pulseaudio network sound server.</summary> +<interface name="pulseaudio_role" lineno="18"> +<summary> +Role access for pulseaudio +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="pulseaudio_domtrans" lineno="52"> +<summary> +Execute a domain transition to run pulseaudio. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pulseaudio_run" lineno="76"> +<summary> +Execute pulseaudio in the pulseaudio domain, and +allow the specified role the pulseaudio domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_exec" lineno="95"> +<summary> +Execute a pulseaudio in the current domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_dontaudit_exec" lineno="113"> +<summary> +Do not audit to execute a pulseaudio. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="pulseaudio_signull" lineno="132"> +<summary> +Send signull signal to pulseaudio +processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_stream_connect" lineno="151"> +<summary> +Connect to pulseaudio over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_dbus_chat" lineno="173"> +<summary> +Send and receive messages from +pulseaudio over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_setattr_home_dir" lineno="193"> +<summary> +Set the attributes of the pulseaudio homedir. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_read_home_files" lineno="211"> +<summary> +Read pulseaudio homedir files. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_rw_home_files" lineno="231"> +<summary> +Read and write Pulse Audio files. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pulseaudio_manage_home_files" lineno="252"> +<summary> +Create, read, write, and delete pulseaudio +home directory files. +</summary> +<param name="user_domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="puppet" filename="policy/modules/contrib/puppet.if"> +<summary>Puppet client daemon</summary> +<desc> +<p> +Puppet is a configuration management system written in Ruby. +The client daemon is responsible for periodically requesting the +desired system state from the server and ensuring the state of +the client system matches. +</p> +</desc> +<interface name="puppet_rw_tmp" lineno="24"> +<summary> +Read / Write to Puppet temp files. Puppet uses +some system binaries (groupadd, etc) that run in +a non-puppet domain and redirects output into temp +files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="puppet_manage_all_files" dftval="false"> +<desc> +<p> +Allow Puppet client to manage all file +types. +</p> +</desc> +</tunable> +</module> +<module name="pxe" filename="policy/modules/contrib/pxe.if"> +<summary>Server for the PXE network boot protocol</summary> +</module> +<module name="pyicqt" filename="policy/modules/contrib/pyicqt.if"> +<summary>PyICQt is an ICQ transport for XMPP server.</summary> +</module> +<module name="pyzor" filename="policy/modules/contrib/pyzor.if"> +<summary>Pyzor is a distributed, collaborative spam detection and filtering network.</summary> +<interface name="pyzor_role" lineno="18"> +<summary> +Role access for pyzor +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="pyzor_signal" lineno="44"> +<summary> +Send generic signals to pyzor +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="pyzor_domtrans" lineno="62"> +<summary> +Execute pyzor with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="pyzor_exec" lineno="82"> +<summary> +Execute pyzor in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="qemu" filename="policy/modules/contrib/qemu.if"> +<summary>QEMU machine emulator and virtualizer</summary> +<template name="qemu_domain_template" lineno="14"> +<summary> +Creates types and rules for a basic +qemu process domain. +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<template name="qemu_role" lineno="127"> +<summary> +The per role template for the qemu module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for qemu web browser. +</p> +<p> +This template is invoked automatically for each user, and +generally does not need to be invoked directly +by policy writers. +</p> +</desc> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="qemu_domtrans" lineno="150"> +<summary> +Execute a domain transition to run qemu. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="qemu_run" lineno="174"> +<summary> +Execute qemu in the qemu domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the qemu domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="qemu_read_state" lineno="195"> +<summary> +Allow the domain to read state files in /proc. +</summary> +<param name="domain"> +<summary> +Domain to allow access. +</summary> +</param> +</interface> +<interface name="qemu_setsched" lineno="213"> +<summary> +Set the schedule on qemu. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qemu_signal" lineno="231"> +<summary> +Send a signal to qemu. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qemu_kill" lineno="249"> +<summary> +Send a sigill to qemu +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qemu_domtrans_unconfined" lineno="267"> +<summary> +Execute a domain transition to run qemu unconfined. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="qemu_manage_tmp_dirs" lineno="285"> +<summary> +Manage qemu temporary dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qemu_manage_tmp_files" lineno="303"> +<summary> +Manage qemu temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="qemu_full_network" dftval="false"> +<desc> +<p> +Allow qemu to connect fully to the network +</p> +</desc> +</tunable> +<tunable name="qemu_use_cifs" dftval="true"> +<desc> +<p> +Allow qemu to use cifs/Samba file systems +</p> +</desc> +</tunable> +<tunable name="qemu_use_comm" dftval="false"> +<desc> +<p> +Allow qemu to use serial/parallel communication ports +</p> +</desc> +</tunable> +<tunable name="qemu_use_nfs" dftval="true"> +<desc> +<p> +Allow qemu to use nfs file systems +</p> +</desc> +</tunable> +<tunable name="qemu_use_usb" dftval="true"> +<desc> +<p> +Allow qemu to use usb devices +</p> +</desc> +</tunable> +</module> +<module name="qmail" filename="policy/modules/contrib/qmail.if"> +<summary>Qmail Mail Server</summary> +<template name="qmail_child_domain_template" lineno="18"> +<summary> +Template for qmail parent/sub-domain pairs +</summary> +<param name="child_prefix"> +<summary> +The prefix of the child domain +</summary> +</param> +<param name="parent_domain"> +<summary> +The name of the parent domain. +</summary> +</param> +</template> +<interface name="qmail_domtrans_inject" lineno="60"> +<summary> +Transition to qmail_inject_t +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="qmail_domtrans_queue" lineno="86"> +<summary> +Transition to qmail_queue_t +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="qmail_read_config" lineno="113"> +<summary> +Read qmail configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="qmail_smtpd_service_domain" lineno="145"> +<summary> +Define the specified domain as a qmail-smtp service. +Needed by antivirus/antispam filters. +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +</module> +<module name="qpid" filename="policy/modules/contrib/qpid.if"> +<summary>Apache QPID AMQP messaging server.</summary> +<interface name="qpidd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run qpidd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="qpidd_rw_semaphores" lineno="31"> +<summary> +Allow read and write access to qpidd semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_rw_shm" lineno="49"> +<summary> +Read and write to qpidd shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_initrc_domtrans" lineno="67"> +<summary> +Execute qpidd server in the qpidd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_read_pid_files" lineno="85"> +<summary> +Read qpidd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_search_lib" lineno="104"> +<summary> +Search qpidd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_read_lib_files" lineno="123"> +<summary> +Read qpidd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_manage_lib_files" lineno="143"> +<summary> +Create, read, write, and delete +qpidd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="qpidd_admin" lineno="169"> +<summary> +All of the rules required to administrate +an qpidd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="quota" filename="policy/modules/contrib/quota.if"> +<summary>File system quota management</summary> +<interface name="quota_domtrans" lineno="13"> +<summary> +Execute quota management tools in the quota domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="quota_run" lineno="39"> +<summary> +Execute quota management tools in the quota domain, and +allow the specified role the quota domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="quota_dontaudit_getattr_db" lineno="59"> +<summary> +Do not audit attempts to get the attributes +of filesystem quota data files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="quota_manage_flags" lineno="78"> +<summary> +Create, read, write, and delete quota +flag files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="radius" filename="policy/modules/contrib/radius.if"> +<summary>RADIUS authentication and accounting server.</summary> +<interface name="radius_use" lineno="13"> +<summary> +Use radius over a UDP connection. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="radius_admin" lineno="34"> +<summary> +All of the rules required to administrate +an radius environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="radvd" filename="policy/modules/contrib/radvd.if"> +<summary>IPv6 router advertisement daemon</summary> +<interface name="radvd_admin" lineno="20"> +<summary> +All of the rules required to administrate +an radvd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="raid" filename="policy/modules/contrib/raid.if"> +<summary>RAID array management tools</summary> +<interface name="raid_domtrans_mdadm" lineno="13"> +<summary> +Execute software raid tools in the mdadm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="raid_run_mdadm" lineno="39"> +<summary> +Execute a domain transition to mdadm_t for the +specified role, allowing it to use the mdadm_t +domain +</summary> +<param name="role"> +<summary> +Role allowed to access mdadm_t domain +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed to transition to mdadm_t +</summary> +</param> +</interface> +<interface name="raid_manage_mdadm_pid" lineno="66"> +<summary> +Create, read, write, and delete the mdadm pid files. +</summary> +<desc> +<p> +Create, read, write, and delete the mdadm pid files. +</p> +<p> +Added for use in the init module. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="razor" filename="policy/modules/contrib/razor.if"> +<summary>A distributed, collaborative, spam detection and filtering network.</summary> +<desc> +<p> +A distributed, collaborative, spam detection and filtering network. +</p> +<p> +This policy will work with either the ATrpms provided config +file in /etc/razor, or with the default of dumping everything into +$HOME/.razor. +</p> +</desc> +<template name="razor_common_domain_template" lineno="25"> +<summary> +Template to create types and rules common to +all razor domains. +</summary> +<param name="prefix"> +<summary> +The prefix of the domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<interface name="razor_role" lineno="121"> +<summary> +Role access for razor +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="razor_domtrans" lineno="153"> +<summary> +Execute razor in the system razor domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="rdisc" filename="policy/modules/contrib/rdisc.if"> +<summary>Network router discovery daemon</summary> +<interface name="rdisc_exec" lineno="13"> +<summary> +Execute rdisc in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="readahead" filename="policy/modules/contrib/readahead.if"> +<summary>Readahead, read files into page cache for improved performance</summary> +</module> +<module name="remotelogin" filename="policy/modules/contrib/remotelogin.if"> +<summary>Policy for rshd, rlogind, and telnetd.</summary> +<interface name="remotelogin_domtrans" lineno="13"> +<summary> +Domain transition to the remote login domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="remotelogin_signal" lineno="31"> +<summary> +allow Domain to signal remote login domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="resmgr" filename="policy/modules/contrib/resmgr.if"> +<summary>Resource management daemon</summary> +<interface name="resmgr_stream_connect" lineno="14"> +<summary> +Connect to resmgrd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="rgmanager" filename="policy/modules/contrib/rgmanager.if"> +<summary>rgmanager - Resource Group Manager</summary> +<interface name="rgmanager_domtrans" lineno="13"> +<summary> +Execute a domain transition to run rgmanager. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rgmanager_stream_connect" lineno="32"> +<summary> +Connect to rgmanager over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rgmanager_manage_tmp_files" lineno="51"> +<summary> +Allow manage rgmanager tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rgmanager_manage_tmpfs_files" lineno="70"> +<summary> +Allow manage rgmanager tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="rgmanager_can_network_connect" dftval="false"> +<desc> +<p> +Allow rgmanager domain to connect to the network using TCP. +</p> +</desc> +</tunable> +</module> +<module name="rhcs" filename="policy/modules/contrib/rhcs.if"> +<summary>RHCS - Red Hat Cluster Suite</summary> +<template name="rhcs_domain_template" lineno="14"> +<summary> +Creates types and rules for a basic +rhcs init daemon domain. +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<interface name="rhcs_domtrans_dlm_controld" lineno="67"> +<summary> +Execute a domain transition to run dlm_controld. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rhcs_stream_connect_dlm_controld" lineno="87"> +<summary> +Connect to dlm_controld over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_rw_dlm_controld_semaphores" lineno="106"> +<summary> +Allow read and write access to dlm_controld semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_domtrans_fenced" lineno="127"> +<summary> +Execute a domain transition to run fenced. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rhcs_rw_fenced_semaphores" lineno="146"> +<summary> +Allow read and write access to fenced semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_stream_connect_fenced" lineno="167"> +<summary> +Connect to fenced over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_domtrans_gfs_controld" lineno="187"> +<summary> +Execute a domain transition to run gfs_controld. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rhcs_rw_gfs_controld_semaphores" lineno="206"> +<summary> +Allow read and write access to gfs_controld semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_rw_gfs_controld_shm" lineno="227"> +<summary> +Read and write to gfs_controld_t shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_stream_connect_gfs_controld" lineno="248"> +<summary> +Connect to gfs_controld_t over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_domtrans_groupd" lineno="267"> +<summary> +Execute a domain transition to run groupd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rhcs_stream_connect_groupd" lineno="287"> +<summary> +Connect to groupd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_rw_groupd_semaphores" lineno="306"> +<summary> +Allow read and write access to groupd semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_rw_groupd_shm" lineno="327"> +<summary> +Read and write to group shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhcs_domtrans_qdiskd" lineno="348"> +<summary> +Execute a domain transition to run qdiskd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<tunable name="fenced_can_network_connect" dftval="false"> +<desc> +<p> +Allow fenced domain to connect to the network using TCP. +</p> +</desc> +</tunable> +</module> +<module name="rhgb" filename="policy/modules/contrib/rhgb.if"> +<summary> Red Hat Graphical Boot </summary> +<interface name="rhgb_stub" lineno="13"> +<summary> +RHGB stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +N/A +</summary> +</param> +</interface> +<interface name="rhgb_use_fds" lineno="29"> +<summary> +Use a rhgb file descriptor. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_getpgid" lineno="47"> +<summary> +Get the process group of rhgb. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_signal" lineno="65"> +<summary> +Send a signal to rhgb. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_rw_stream_sockets" lineno="83"> +<summary> +Read and write to unix stream sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_dontaudit_rw_stream_sockets" lineno="102"> +<summary> +Do not audit attempts to read and write +rhgb unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="rhgb_stream_connect" lineno="120"> +<summary> +Connected to rhgb unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_rw_shm" lineno="138"> +<summary> +Read and write to rhgb shared memory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_use_ptys" lineno="156"> +<summary> +Read from and write to the rhgb devpts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhgb_dontaudit_use_ptys" lineno="174"> +<summary> +dontaudit Read from and write to the rhgb devpts. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="rhgb_rw_tmpfs_files" lineno="192"> +<summary> +Read and write to rhgb temporary file system. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="rhsmcertd" filename="policy/modules/contrib/rhsmcertd.if"> +<summary>Subscription Management Certificate Daemon policy</summary> +<interface name="rhsmcertd_domtrans" lineno="13"> +<summary> +Transition to rhsmcertd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rhsmcertd_initrc_domtrans" lineno="32"> +<summary> +Execute rhsmcertd server in the rhsmcertd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_read_log" lineno="51"> +<summary> +Read rhsmcertd's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rhsmcertd_append_log" lineno="70"> +<summary> +Append to rhsmcertd log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_manage_log" lineno="89"> +<summary> +Manage rhsmcertd log files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_search_lib" lineno="110"> +<summary> +Search rhsmcertd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_read_lib_files" lineno="129"> +<summary> +Read rhsmcertd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_manage_lib_files" lineno="148"> +<summary> +Manage rhsmcertd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_manage_lib_dirs" lineno="167"> +<summary> +Manage rhsmcertd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_read_pid_files" lineno="186"> +<summary> +Read rhsmcertd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_stream_connect" lineno="206"> +<summary> +Connect to rhsmcertd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_dbus_chat" lineno="226"> +<summary> +Send and receive messages from +rhsmcertd over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_dontaudit_dbus_chat" lineno="247"> +<summary> +Dontaudit Send and receive messages from +rhsmcertd over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rhsmcertd_admin" lineno="274"> +<summary> +All of the rules required to administrate +an rhsmcertd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ricci" filename="policy/modules/contrib/ricci.if"> +<summary>Ricci cluster management agent</summary> +<interface name="ricci_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ricci. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ricci_domtrans_modcluster" lineno="31"> +<summary> +Execute a domain transition to run ricci_modcluster. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ricci_dontaudit_use_modcluster_fds" lineno="50"> +<summary> +Do not audit attempts to use +ricci_modcluster file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="ricci_dontaudit_rw_modcluster_pipes" lineno="69"> +<summary> +Do not audit attempts to read write +ricci_modcluster unamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="ricci_stream_connect_modclusterd" lineno="87"> +<summary> +Connect to ricci_modclusterd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ricci_domtrans_modlog" lineno="107"> +<summary> +Execute a domain transition to run ricci_modlog. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ricci_domtrans_modrpm" lineno="125"> +<summary> +Execute a domain transition to run ricci_modrpm. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ricci_domtrans_modservice" lineno="143"> +<summary> +Execute a domain transition to run ricci_modservice. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ricci_domtrans_modstorage" lineno="161"> +<summary> +Execute a domain transition to run ricci_modstorage. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="rlogin" filename="policy/modules/contrib/rlogin.if"> +<summary>Remote login daemon</summary> +<interface name="rlogin_domtrans" lineno="13"> +<summary> +Execute rlogind in the rlogin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<template name="rlogin_read_home_content" lineno="38"> +<summary> +read rlogin homedir content (.config) +</summary> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +</module> +<module name="roundup" filename="policy/modules/contrib/roundup.if"> +<summary>Roundup Issue Tracking System policy</summary> +<interface name="roundup_admin" lineno="20"> +<summary> +All of the rules required to administrate +an roundup environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the roundup domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="rpc" filename="policy/modules/contrib/rpc.if"> +<summary>Remote Procedure Call Daemon for managment of network based process communication</summary> +<interface name="rpc_stub" lineno="13"> +<summary> +RPC stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<template name="rpc_domain_template" lineno="35"> +<summary> +The template to define a rpc domain. +</summary> +<desc> +<p> +This template creates a domain to be used for +a new rpc daemon. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The type of daemon to be used. +</summary> +</param> +</template> +<interface name="rpc_udp_send" lineno="135"> +<summary> +Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_dontaudit_getattr_exports" lineno="150"> +<summary> +Do not audit attempts to get the attributes +of the NFS export file. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="rpc_read_exports" lineno="168"> +<summary> +Allow read access to exports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_write_exports" lineno="186"> +<summary> +Allow write access to exports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_domtrans_nfsd" lineno="204"> +<summary> +Execute domain in nfsd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpc_initrc_domtrans_nfsd" lineno="222"> +<summary> +Execute domain in nfsd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpc_domtrans_rpcd" lineno="240"> +<summary> +Execute domain in rpcd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpc_initrc_domtrans_rpcd" lineno="259"> +<summary> +Execute domain in rpcd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpc_read_nfs_content" lineno="278"> +<summary> +Read NFS exported content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rpc_manage_nfs_rw_content" lineno="299"> +<summary> +Allow domain to create read and write NFS directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rpc_manage_nfs_ro_content" lineno="320"> +<summary> +Allow domain to create read and write NFS directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rpc_tcp_rw_nfs_sockets" lineno="340"> +<summary> +Allow domain to read and write to an NFS TCP socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_udp_rw_nfs_sockets" lineno="358"> +<summary> +Allow domain to read and write to an NFS UDP socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_udp_send_nfs" lineno="376"> +<summary> +Send UDP traffic to NFSd. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_search_nfs_state_data" lineno="390"> +<summary> +Search NFS state data in /var/lib/nfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_read_nfs_state_data" lineno="409"> +<summary> +Read NFS state data in /var/lib/nfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpc_manage_nfs_state_data" lineno="428"> +<summary> +Manage NFS state data in /var/lib/nfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_gssd_read_tmp" dftval="true"> +<desc> +<p> +Allow gssd to read temp directory. For access to kerberos tgt. +</p> +</desc> +</tunable> +<tunable name="allow_nfsd_anon_write" dftval="false"> +<desc> +<p> +Allow nfs servers to modify public files +used for public file transfer services. Files/Directories must be +labeled public_content_rw_t. +</p> +</desc> +</tunable> +</module> +<module name="rpcbind" filename="policy/modules/contrib/rpcbind.if"> +<summary>Universal Addresses to RPC Program Number Mapper</summary> +<interface name="rpcbind_domtrans" lineno="13"> +<summary> +Execute a domain transition to run rpcbind. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpcbind_stream_connect" lineno="31"> +<summary> +Connect to rpcbindd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpcbind_read_pid_files" lineno="51"> +<summary> +Read rpcbind PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpcbind_search_lib" lineno="70"> +<summary> +Search rpcbind lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpcbind_read_lib_files" lineno="89"> +<summary> +Read rpcbind lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpcbind_manage_lib_files" lineno="109"> +<summary> +Create, read, write, and delete +rpcbind lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpcbind_admin" lineno="135"> +<summary> +All of the rules required to administrate +an rpcbind environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the rpcbind domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="rpm" filename="policy/modules/contrib/rpm.if"> +<summary>Policy for the RPM package manager.</summary> +<interface name="rpm_domtrans" lineno="13"> +<summary> +Execute rpm programs in the rpm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpm_debuginfo_domtrans" lineno="32"> +<summary> +Execute debuginfo_install programs in the rpm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpm_domtrans_script" lineno="51"> +<summary> +Execute rpm_script programs in the rpm_script domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rpm_run" lineno="79"> +<summary> +Execute RPM programs in the RPM domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the RPM domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rpm_exec" lineno="98"> +<summary> +Execute the rpm client in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_signull" lineno="117"> +<summary> +Send a null signal to rpm. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_use_fds" lineno="135"> +<summary> +Inherit and use file descriptors from RPM. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_read_pipes" lineno="153"> +<summary> +Read from an unnamed RPM pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_rw_pipes" lineno="171"> +<summary> +Read and write an unnamed RPM pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_dbus_chat" lineno="190"> +<summary> +Send and receive messages from +rpm over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_dontaudit_dbus_chat" lineno="211"> +<summary> +Do not audit attempts to send and +receive messages from rpm over dbus. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="rpm_script_dbus_chat" lineno="232"> +<summary> +Send and receive messages from +rpm_script over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_search_log" lineno="252"> +<summary> +Search RPM log directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_append_log" lineno="272"> +<summary> +Allow the specified domain to append +to rpm log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_log" lineno="291"> +<summary> +Create, read, write, and delete the RPM log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_use_script_fds" lineno="310"> +<summary> +Inherit and use file descriptors from RPM scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_script_tmp_files" lineno="329"> +<summary> +Create, read, write, and delete RPM +script temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_append_tmp_files" lineno="349"> +<summary> +Allow the specified domain to append +to rpm tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_tmp_files" lineno="369"> +<summary> +Create, read, write, and delete RPM +temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_read_script_tmp_files" lineno="388"> +<summary> +Read RPM script temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_read_cache" lineno="408"> +<summary> +Read the RPM cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_cache" lineno="429"> +<summary> +Create, read, write, and delete the RPM package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_read_db" lineno="450"> +<summary> +Read the RPM package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_delete_db" lineno="471"> +<summary> +Delete the RPM package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_db" lineno="490"> +<summary> +Create, read, write, and delete the RPM package database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_dontaudit_manage_db" lineno="511"> +<summary> +Do not audit attempts to create, read, +write, and delete the RPM package database. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="rpm_read_pid_files" lineno="531"> +<summary> +Read rpm pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_manage_pid_files" lineno="550"> +<summary> +Create, read, write, and delete rpm pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rpm_pid_filetrans" lineno="569"> +<summary> +Create files in /var/run with the rpm pid file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="rshd" filename="policy/modules/contrib/rshd.if"> +<summary>Remote shell service.</summary> +<interface name="rshd_domtrans" lineno="13"> +<summary> +Domain transition to rshd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="rssh" filename="policy/modules/contrib/rssh.if"> +<summary>Restricted (scp/sftp) only shell</summary> +<interface name="rssh_role" lineno="18"> +<summary> +Role access for rssh +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="rssh_spec_domtrans" lineno="40"> +<summary> +Transition to all user rssh domains. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rssh_exec" lineno="59"> +<summary> +Execute the rssh program +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rssh_domtrans_chroot_helper" lineno="77"> +<summary> +Execute a domain transition to run rssh_chroot_helper. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rssh_read_ro_content" lineno="95"> +<summary> +Read all users rssh read-only content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="rsync" filename="policy/modules/contrib/rsync.if"> +<summary>Fast incremental file transfer for synchronization</summary> +<interface name="rsync_entry_type" lineno="14"> +<summary> +Make rsync an entry point for +the specified domain. +</summary> +<param name="domain"> +<summary> +The domain for which init scripts are an entrypoint. +</summary> +</param> +</interface> +<interface name="rsync_entry_spec_domtrans" lineno="47"> +<summary> +Execute a rsync in a specified domain. +</summary> +<desc> +<p> +Execute a rsync in a specified domain. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +Domain to transition to. +</summary> +</param> +</interface> +<interface name="rsync_entry_domtrans" lineno="80"> +<summary> +Execute a rsync in a specified domain. +</summary> +<desc> +<p> +Execute a rsync in a specified domain. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +Domain to transition to. +</summary> +</param> +</interface> +<interface name="rsync_exec" lineno="99"> +<summary> +Execute rsync in the caller domain domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="rsync_read_config" lineno="117"> +<summary> +Read rsync config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rsync_write_config" lineno="136"> +<summary> +Write to rsync config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="rsync_export_all_ro" dftval="false"> +<desc> +<p> +Allow rsync to export any files/directories read only. +</p> +</desc> +</tunable> +<tunable name="allow_rsync_anon_write" dftval="false"> +<desc> +<p> +Allow rsync to modify public files +used for public file transfer services. Files/Directories must be +labeled public_content_rw_t. +</p> +</desc> +</tunable> +</module> +<module name="rtkit" filename="policy/modules/contrib/rtkit.if"> +<summary>Realtime scheduling for user processes.</summary> +<interface name="rtkit_daemon_domtrans" lineno="13"> +<summary> +Execute a domain transition to run rtkit_daemon. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rtkit_daemon_dbus_chat" lineno="32"> +<summary> +Send and receive messages from +rtkit_daemon over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rtkit_scheduled" lineno="52"> +<summary> +Allow rtkit to control scheduling for your process +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="rwho" filename="policy/modules/contrib/rwho.if"> +<summary>Who is logged in on other machines?</summary> +<interface name="rwho_domtrans" lineno="13"> +<summary> +Execute a domain transition to run rwho. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="rwho_search_log" lineno="31"> +<summary> +Search rwho log directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rwho_read_log_files" lineno="50"> +<summary> +Read rwho log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rwho_search_spool" lineno="70"> +<summary> +Search rwho spool directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rwho_read_spool_files" lineno="89"> +<summary> +Read rwho spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rwho_manage_spool_files" lineno="109"> +<summary> +Create, read, write, and delete +rwho spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="rwho_admin" lineno="135"> +<summary> +All of the rules required to administrate +an rwho environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="samba" filename="policy/modules/contrib/samba.if"> +<summary> +SMB and CIFS client/server programs for UNIX and +name Service Switch daemon for resolving names +from Windows NT servers. +</summary> +<interface name="samba_domtrans_nmbd" lineno="17"> +<summary> +Execute nmbd net in the nmbd_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_signal_nmbd" lineno="36"> +<summary> +Allow domain to signal samba +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_initrc_domtrans" lineno="53"> +<summary> +Execute samba server in the samba domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_domtrans_net" lineno="71"> +<summary> +Execute samba net in the samba_net domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_run_net" lineno="97"> +<summary> +Execute samba net in the samba_net domain, and +allow the specified role the samba_net domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_domtrans_smbmount" lineno="116"> +<summary> +Execute smbmount in the smbmount domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_run_smbmount" lineno="142"> +<summary> +Execute smbmount interactively and do +a domain transition to the smbmount domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_read_config" lineno="163"> +<summary> +Allow the specified domain to read +samba configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_rw_config" lineno="184"> +<summary> +Allow the specified domain to read +and write samba configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_manage_config" lineno="205"> +<summary> +Allow the specified domain to read +and write samba configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_read_log" lineno="226"> +<summary> +Allow the specified domain to read samba's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_append_log" lineno="247"> +<summary> +Allow the specified domain to append to samba's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_exec_log" lineno="267"> +<summary> +Execute samba log in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_read_secrets" lineno="286"> +<summary> +Allow the specified domain to read samba's secrets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_read_share_files" lineno="305"> +<summary> +Allow the specified domain to read samba's shares +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_search_var" lineno="325"> +<summary> +Allow the specified domain to search +samba /var directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_read_var_files" lineno="346"> +<summary> +Allow the specified domain to +read samba /var files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_dontaudit_write_var_files" lineno="367"> +<summary> +Do not audit attempts to write samba +/var files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="samba_rw_var_files" lineno="386"> +<summary> +Allow the specified domain to +read and write samba /var files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_manage_var_files" lineno="407"> +<summary> +Allow the specified domain to +read and write samba /var files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_domtrans_smbcontrol" lineno="427"> +<summary> +Execute a domain transition to run smbcontrol. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_run_smbcontrol" lineno="452"> +<summary> +Execute smbcontrol in the smbcontrol domain, and +allow the specified role the smbcontrol domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="samba_domtrans_smbd" lineno="471"> +<summary> +Execute smbd in the smbd_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_signal_smbd" lineno="490"> +<summary> +Allow domain to signal samba +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_dontaudit_use_fds" lineno="507"> +<summary> +Do not audit attempts to use file descriptors from samba. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="samba_write_smbmount_tcp_sockets" lineno="525"> +<summary> +Allow the specified domain to write to smbmount tcp sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_rw_smbmount_tcp_sockets" lineno="543"> +<summary> +Allow the specified domain to read and write to smbmount tcp sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_domtrans_winbind_helper" lineno="561"> +<summary> +Execute winbind_helper in the winbind_helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samba_run_winbind_helper" lineno="586"> +<summary> +Execute winbind_helper in the winbind_helper domain, and +allow the specified role the winbind_helper domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samba_read_winbind_pid" lineno="605"> +<summary> +Allow the specified domain to read the winbind pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_stream_connect_winbind" lineno="624"> +<summary> +Connect to winbind. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samba_admin" lineno="662"> +<summary> +All of the rules required to administrate +an samba environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the samba domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_smbd_anon_write" dftval="false"> +<desc> +<p> +Allow samba to modify public files used for public file +transfer services. Files/Directories must be labeled +public_content_rw_t. +</p> +</desc> +</tunable> +<tunable name="samba_create_home_dirs" dftval="false"> +<desc> +<p> +Allow samba to create new home directories (e.g. via PAM) +</p> +</desc> +</tunable> +<tunable name="samba_domain_controller" dftval="false"> +<desc> +<p> +Allow samba to act as the domain controller, add users, +groups and change passwords. + +</p> +</desc> +</tunable> +<tunable name="samba_enable_home_dirs" dftval="false"> +<desc> +<p> +Allow samba to share users home directories. +</p> +</desc> +</tunable> +<tunable name="samba_export_all_ro" dftval="false"> +<desc> +<p> +Allow samba to share any file/directory read only. +</p> +</desc> +</tunable> +<tunable name="samba_export_all_rw" dftval="false"> +<desc> +<p> +Allow samba to share any file/directory read/write. +</p> +</desc> +</tunable> +<tunable name="samba_run_unconfined" dftval="false"> +<desc> +<p> +Allow samba to run unconfined scripts +</p> +</desc> +</tunable> +<tunable name="samba_share_nfs" dftval="false"> +<desc> +<p> +Allow samba to export NFS volumes. +</p> +</desc> +</tunable> +<tunable name="samba_share_fusefs" dftval="false"> +<desc> +<p> +Allow samba to export ntfs/fusefs volumes. +</p> +</desc> +</tunable> +</module> +<module name="sambagui" filename="policy/modules/contrib/sambagui.if"> +<summary>system-config-samba dbus service policy</summary> +</module> +<module name="samhain" filename="policy/modules/contrib/samhain.if"> +<summary>Samhain - check file integrity</summary> +<template name="samhain_service_template" lineno="17"> +<summary> +The template containing the most basic rules +common to the samhain domains. +</summary> +<param name="samhaindomain_prefix"> +<summary> +The prefix of the samhain domains(e.g., samhain +for the domain of command line access, samhaind +for the domain started by init script). +</summary> +</param> +<rolebase/> +</template> +<interface name="samhain_domtrans" lineno="104"> +<summary> +Execute samhain in the samhain domain +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="samhain_run" lineno="141"> +<summary> +Execute samhain in the samhain domain with the clearance security +level and allow the specifiled role the samhain domain. +</summary> +<desc> +<p> +Execute samhain in the samhain domain with the clearance security +level and allow the specifiled role the samhain domain. +</p> +<p> +The range_transition rule used in this interface requires that +the calling domain should have the clearance security level +otherwise the MLS constraint for process transition would fail. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed to access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="samhain_manage_config_files" lineno="164"> +<summary> +Manage samhain configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samhain_manage_db_files" lineno="183"> +<summary> +Manage samhain database files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samhain_manage_init_script_files" lineno="202"> +<summary> +Manage samhain init script files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samhain_manage_log_files" lineno="221"> +<summary> +Manage samhain log and log.lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samhain_manage_pid_files" lineno="240"> +<summary> +Manage samhain pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="samhain_admin" lineno="268"> +<summary> +All of the rules required to administrate +the samhain environment. +</summary> +<desc> +<p> +This interface assumes that the calling domain has been able to +remove an entry from /var/lib/ or /var/log/ and belongs to the +mlsfilewrite attribute, since samhain files may be of clearance +security level while their parent directories are of s0. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="sanlock" filename="policy/modules/contrib/sanlock.if"> +<summary>policy for sanlock</summary> +<interface name="sanlock_domtrans" lineno="13"> +<summary> +Execute a domain transition to run sanlock. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sanlock_initrc_domtrans" lineno="31"> +<summary> +Execute sanlock server in the sanlock domain. +</summary> +<param name="domain"> +<summary> +The type of the process performing this action. +</summary> +</param> +</interface> +<interface name="sanlock_manage_pid_files" lineno="49"> +<summary> +Create, read, write, and delete sanlock PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sanlock_stream_connect" lineno="68"> +<summary> +Connect to sanlock over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sanlock_admin" lineno="94"> +<summary> +All of the rules required to administrate +an sanlock environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="sanlock_use_nfs" dftval="false"> +<desc> +<p> +Allow confined virtual guests to manage nfs files +</p> +</desc> +</tunable> +<tunable name="sanlock_use_samba" dftval="false"> +<desc> +<p> +Allow confined virtual guests to manage cifs files +</p> +</desc> +</tunable> +</module> +<module name="sasl" filename="policy/modules/contrib/sasl.if"> +<summary>SASL authentication server</summary> +<interface name="sasl_connect" lineno="13"> +<summary> +Connect to SASL. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sasl_admin" lineno="39"> +<summary> +All of the rules required to administrate +an sasl environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_saslauthd_read_shadow" dftval="false"> +<desc> +<p> +Allow sasl to read shadow +</p> +</desc> +</tunable> +</module> +<module name="sblim" filename="policy/modules/contrib/sblim.if"> +<summary> policy for SBLIM Gatherer </summary> +<interface name="sblim_domtrans_gatherd" lineno="13"> +<summary> +Transition to gatherd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sblim_read_pid_files" lineno="32"> +<summary> +Read gatherd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sblim_admin" lineno="58"> +<summary> +All of the rules required to administrate +an gatherd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="screen" filename="policy/modules/contrib/screen.if"> +<summary>GNU terminal multiplexer</summary> +<template name="screen_role_template" lineno="24"> +<summary> +The role template for the screen module. +</summary> +<param name="role_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +</module> +<module name="sectoolm" filename="policy/modules/contrib/sectoolm.if"> +<summary>Sectool security audit tool</summary> +</module> +<module name="sendmail" filename="policy/modules/contrib/sendmail.if"> +<summary>Policy for sendmail.</summary> +<interface name="sendmail_stub" lineno="13"> +<summary> +Sendmail stub interface. No access allowed. +</summary> +<param name="domain" unused="true"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_rw_pipes" lineno="30"> +<summary> +Allow attempts to read and write to +sendmail unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_domtrans" lineno="48"> +<summary> +Domain transition to sendmail. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sendmail_run" lineno="76"> +<summary> +Execute the sendmail program in the sendmail domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the sendmail domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sendmail_signal" lineno="95"> +<summary> +Send generic signals to sendmail. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_rw_tcp_sockets" lineno="113"> +<summary> +Read and write sendmail TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_dontaudit_rw_tcp_sockets" lineno="132"> +<summary> +Do not audit attempts to read and write +sendmail TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sendmail_rw_unix_stream_sockets" lineno="150"> +<summary> +Read and write sendmail unix_stream_sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_dontaudit_rw_unix_stream_sockets" lineno="169"> +<summary> +Do not audit attempts to read and write +sendmail unix_stream_sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sendmail_read_log" lineno="188"> +<summary> +Read sendmail logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sendmail_manage_log" lineno="208"> +<summary> +Create, read, write, and delete sendmail logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sendmail_create_log" lineno="227"> +<summary> +Create sendmail logs with the correct type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_manage_tmp_files" lineno="245"> +<summary> +Manage sendmail tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sendmail_domtrans_unconfined" lineno="264"> +<summary> +Execute sendmail in the unconfined sendmail domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sendmail_run_unconfined" lineno="290"> +<summary> +Execute sendmail in the unconfined sendmail domain, and +allow the specified role the unconfined sendmail domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="setroubleshoot" filename="policy/modules/contrib/setroubleshoot.if"> +<summary>SELinux troubleshooting service</summary> +<interface name="setroubleshoot_stream_connect" lineno="13"> +<summary> +Connect to setroubleshootd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="setroubleshoot_dontaudit_stream_connect" lineno="34"> +<summary> +Dontaudit attempts to connect to setroubleshootd +over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="setroubleshoot_dbus_chat" lineno="54"> +<summary> +Send and receive messages from +setroubleshoot over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="setroubleshoot_dontaudit_dbus_chat" lineno="75"> +<summary> +Do not audit send and receive messages from +setroubleshoot over dbus. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="setroubleshoot_dbus_chat_fixit" lineno="96"> +<summary> +Send and receive messages from +setroubleshoot fixit over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="setroubleshoot_admin" lineno="118"> +<summary> +All of the rules required to administrate +an setroubleshoot environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="shorewall" filename="policy/modules/contrib/shorewall.if"> +<summary>Shoreline Firewall high-level tool for configuring netfilter</summary> +<interface name="shorewall_domtrans" lineno="13"> +<summary> +Execute a domain transition to run shorewall. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="shorewall_lib_domtrans" lineno="31"> +<summary> +Execute a domain transition to run shorewall. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="shorewall_read_config" lineno="49"> +<summary> +Read shorewall etc configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_read_pid_files" lineno="68"> +<summary> +Read shorewall PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_rw_pid_files" lineno="87"> +<summary> +Read and write shorewall PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_read_lib_files" lineno="106"> +<summary> +Read shorewall /var/lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_rw_lib_files" lineno="126"> +<summary> +Read and write shorewall /var/lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_read_tmp_files" lineno="146"> +<summary> +Read shorewall tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="shorewall_admin" lineno="172"> +<summary> +All of the rules required to administrate +an shorewall environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the syslog domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="shutdown" filename="policy/modules/contrib/shutdown.if"> +<summary>System shutdown command</summary> +<interface name="shutdown_domtrans" lineno="13"> +<summary> +Execute a domain transition to run shutdown. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="shutdown_run" lineno="43"> +<summary> +Execute shutdown in the shutdown domain, and +allow the specified role the shutdown domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="shutdown_getattr_exec_files" lineno="62"> +<summary> +Get attributes of shutdown executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="slocate" filename="policy/modules/contrib/slocate.if"> +<summary>Update database for mlocate</summary> +<interface name="slocate_create_append_log" lineno="13"> +<summary> +Create the locate log with append mode. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="locate_read_lib_files" lineno="33"> +<summary> +Read locate lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="slrnpull" filename="policy/modules/contrib/slrnpull.if"> +<summary>Service for downloading news feeds the slrn newsreader.</summary> +<interface name="slrnpull_search_spool" lineno="13"> +<summary> +Allow the domain to search slrnpull spools. +</summary> +<param name="pty_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="slrnpull_manage_spool" lineno="33"> +<summary> +Allow the domain to create, read, +write, and delete slrnpull spools. +</summary> +<param name="pty_type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="smartmon" filename="policy/modules/contrib/smartmon.if"> +<summary>Smart disk monitoring daemon policy</summary> +<interface name="smartmon_read_tmp_files" lineno="13"> +<summary> +Allow caller to read smartmon temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smartmon_admin" lineno="38"> +<summary> +All of the rules required to administrate +an smartmon environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="smartmon_3ware" dftval="false"> +<desc> +<p> +Enable additional permissions needed to support +devices on 3ware controllers. +</p> +</desc> +</tunable> +</module> +<module name="smokeping" filename="policy/modules/contrib/smokeping.if"> +<summary>Smokeping network latency measurement.</summary> +<interface name="smokeping_domtrans" lineno="13"> +<summary> +Execute a domain transition to run smokeping. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="smokeping_initrc_domtrans" lineno="31"> +<summary> +Execute smokeping server in the smokeping domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="smokeping_read_pid_files" lineno="49"> +<summary> +Read smokeping PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smokeping_manage_pid_files" lineno="68"> +<summary> +Manage smokeping PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smokeping_getattr_lib_files" lineno="87"> +<summary> +Get attributes of smokeping lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smokeping_read_lib_files" lineno="106"> +<summary> +Read smokeping lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smokeping_manage_lib_files" lineno="125"> +<summary> +Manage smokeping lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="smokeping_admin" lineno="151"> +<summary> +All of the rules required to administrate +a smokeping environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="smoltclient" filename="policy/modules/contrib/smoltclient.if"> +<summary>The Fedora hardware profiler client</summary> +</module> +<module name="snmp" filename="policy/modules/contrib/snmp.if"> +<summary>Simple network management protocol services</summary> +<interface name="snmp_stream_connect" lineno="13"> +<summary> +Connect to snmpd using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="snmp_tcp_connect" lineno="32"> +<summary> +Use snmp over a TCP connection. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="snmp_udp_chat" lineno="46"> +<summary> +Send and receive UDP traffic to SNMP (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="snmp_read_snmp_var_lib_files" lineno="60"> +<summary> +Read snmpd libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="snmp_dontaudit_read_snmp_var_lib_files" lineno="80"> +<summary> +dontaudit Read snmpd libraries. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="snmp_dontaudit_write_snmp_var_lib_files" lineno="99"> +<summary> +dontaudit write snmpd libraries files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="snmp_admin" lineno="124"> +<summary> +All of the rules required to administrate +an snmp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the snmp domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="snort" filename="policy/modules/contrib/snort.if"> +<summary>Snort network intrusion detection system</summary> +<interface name="snort_domtrans" lineno="13"> +<summary> +Execute a domain transition to run snort. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="snort_admin" lineno="38"> +<summary> +All of the rules required to administrate +an snort environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the snort domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="sosreport" filename="policy/modules/contrib/sosreport.if"> +<summary>sosreport - Generate debugging information for system</summary> +<interface name="sosreport_domtrans" lineno="13"> +<summary> +Execute a domain transition to run sosreport. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sosreport_run" lineno="37"> +<summary> +Execute sosreport in the sosreport domain, and +allow the specified role the sosreport domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="sosreport_role" lineno="61"> +<summary> +Role access for sosreport +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="sosreport_read_tmp_files" lineno="85"> +<summary> +Allow the specified domain to read +sosreport tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sosreport_append_tmp_files" lineno="104"> +<summary> +Append sosreport tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sosreport_delete_tmp_files" lineno="122"> +<summary> +Delete sosreport tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="soundserver" filename="policy/modules/contrib/soundserver.if"> +<summary>sound server for network audio server programs, nasd, yiff, etc</summary> +<interface name="soundserver_tcp_connect" lineno="13"> +<summary> +Connect to the sound server over a TCP socket (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="soundserver_admin" lineno="34"> +<summary> +All of the rules required to administrate +an soundd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the soundd domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="spamassassin" filename="policy/modules/contrib/spamassassin.if"> +<summary>Filter used for removing unsolicited email.</summary> +<interface name="spamassassin_role" lineno="18"> +<summary> +Role access for spamassassin +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="spamassassin_exec" lineno="52"> +<summary> +Execute the standalone spamassassin +program in the caller directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_signal_spamd" lineno="71"> +<summary> +Singnal the spam assassin daemon +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_exec_spamd" lineno="90"> +<summary> +Execute the spamassassin daemon +program in the caller directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_domtrans_client" lineno="108"> +<summary> +Execute spamassassin client in the spamassassin client domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="spamassassin_exec_client" lineno="127"> +<summary> +Execute the spamassassin client +program in the caller directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_domtrans_local_client" lineno="145"> +<summary> +Execute spamassassin standalone client in the user spamassassin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="spamassassin_read_lib_files" lineno="163"> +<summary> +read spamd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_manage_lib_files" lineno="183"> +<summary> +Create, read, write, and delete +spamd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_read_spamd_tmp_files" lineno="202"> +<summary> +Read temporary spamd file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="spamassassin_dontaudit_getattr_spamd_tmp_sockets" lineno="221"> +<summary> +Do not audit attempts to get attributes of temporary +spamd sockets/ +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<tunable name="spamassassin_can_network" dftval="false"> +<desc> +<p> +Allow user spamassassin clients to use the network. +</p> +</desc> +</tunable> +<tunable name="spamd_enable_home_dirs" dftval="true"> +<desc> +<p> +Allow spamd to read/write user home directories. +</p> +</desc> +</tunable> +</module> +<module name="speedtouch" filename="policy/modules/contrib/speedtouch.if"> +<summary>Alcatel speedtouch USB ADSL modem</summary> +</module> +<module name="squid" filename="policy/modules/contrib/squid.if"> +<summary>Squid caching http proxy server</summary> +<interface name="squid_domtrans" lineno="13"> +<summary> +Execute squid in the squid domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="squid_exec" lineno="32"> +<summary> +Execute squid +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="squid_signal" lineno="50"> +<summary> +Send generic signals to squid. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="squid_rw_stream_sockets" lineno="69"> +<summary> +Allow read and write squid +unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="squid_dontaudit_search_cache" lineno="88"> +<summary> +Do not audit attempts to search squid cache dirs +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="squid_read_config" lineno="107"> +<summary> +Read squid configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="squid_read_log" lineno="127"> +<summary> +Append squid logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="squid_append_log" lineno="146"> +<summary> +Append squid logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="squid_manage_logs" lineno="167"> +<summary> +Create, read, write, and delete +squid logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="squid_use" lineno="186"> +<summary> +Use squid services by connecting over TCP. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="squid_admin" lineno="207"> +<summary> +All of the rules required to administrate +an squid environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the squid domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="squid_connect_any" dftval="false"> +<desc> +<p> +Allow squid to connect to all ports, not just +HTTP, FTP, and Gopher ports. +</p> +</desc> +</tunable> +<tunable name="squid_use_tproxy" dftval="false"> +<desc> +<p> +Allow squid to run as a transparent proxy (TPROXY) +</p> +</desc> +</tunable> +</module> +<module name="sssd" filename="policy/modules/contrib/sssd.if"> +<summary>System Security Services Daemon</summary> +<interface name="sssd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run sssd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sssd_initrc_domtrans" lineno="31"> +<summary> +Execute sssd server in the sssd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sssd_read_public_files" lineno="49"> +<summary> +Read sssd public files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_read_pid_files" lineno="68"> +<summary> +Read sssd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_manage_pids" lineno="87"> +<summary> +Manage sssd var_run files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_search_lib" lineno="106"> +<summary> +Search sssd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_dontaudit_search_lib" lineno="125"> +<summary> +Do not audit attempts to search sssd lib directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sssd_read_lib_files" lineno="144"> +<summary> +Read sssd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_manage_lib_files" lineno="164"> +<summary> +Create, read, write, and delete +sssd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_dbus_chat" lineno="184"> +<summary> +Send and receive messages from +sssd over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_stream_connect" lineno="204"> +<summary> +Connect to sssd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sssd_admin" lineno="235"> +<summary> +All of the rules required to administrate +an sssd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the sssd domain. +</summary> +</param> +<param name="terminal"> +<summary> +The type of the user terminal. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="stunnel" filename="policy/modules/contrib/stunnel.if"> +<summary>SSL Tunneling Proxy</summary> +<interface name="stunnel_service_domain" lineno="18"> +<summary> +Define the specified domain as a stunnel inetd service. +</summary> +<param name="domain"> +<summary> +The type associated with the stunnel inetd service process. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +</module> +<module name="sxid" filename="policy/modules/contrib/sxid.if"> +<summary>SUID/SGID program monitoring</summary> +<interface name="sxid_read_log" lineno="15"> +<summary> +Allow the specified domain to read +sxid log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="sysstat" filename="policy/modules/contrib/sysstat.if"> +<summary>Policy for sysstat. Reports on various system states</summary> +<interface name="sysstat_manage_log" lineno="14"> +<summary> +Manage sysstat logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="tcpd" filename="policy/modules/contrib/tcpd.if"> +<summary>Policy for TCP daemon.</summary> +<interface name="tcpd_domtrans" lineno="13"> +<summary> +Execute tcpd in the tcpd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tcpd_wrapped_domain" lineno="37"> +<summary> +Create a domain for services that +utilize tcp wrappers. +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +</interface> +</module> +<module name="tcsd" filename="policy/modules/contrib/tcsd.if"> +<summary>TSS Core Services (TCS) daemon (tcsd) policy</summary> +<interface name="tcsd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run tcsd. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tcsd_initrc_domtrans" lineno="31"> +<summary> +Execute tcsd server in the tcsd domain. +</summary> +<param name="domain"> +<summary> +The type of the process performing this action. +</summary> +</param> +</interface> +<interface name="tcsd_search_lib" lineno="49"> +<summary> +Search tcsd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tcsd_manage_lib_dirs" lineno="68"> +<summary> +Manage tcsd lib dirs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tcsd_read_lib_files" lineno="87"> +<summary> +Read tcsd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tcsd_manage_lib_files" lineno="107"> +<summary> +Create, read, write, and delete +tcsd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tcsd_admin" lineno="133"> +<summary> +All of the rules required to administrate +an tcsd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="telepathy" filename="policy/modules/contrib/telepathy.if"> +<summary>Telepathy communications framework.</summary> +<template name="telepathy_domain_template" lineno="15"> +<summary> +Creates basic types for telepathy +domain +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<template name="telepathy_role" lineno="45"> +<summary> +Role access for telepathy domains +</summary> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="telepathy_gabble_stream_connect" lineno="88"> +<summary> +Stream connect to Telepathy Gabble +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="telepathy_gabble_dbus_chat" lineno="108"> +<summary> +Send DBus messages to and from +Telepathy Gabble. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="telepathy_mission_control_read_state" lineno="133"> +<summary> +Read telepathy mission control state. +</summary> +<param name="role_prefix"> +<summary> +Prefix to be used. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="telepathy_msn_stream_connect" lineno="152"> +<summary> +Stream connect to telepathy MSN managers +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="telepathy_salut_stream_connect" lineno="171"> +<summary> +Stream connect to Telepathy Salut +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="telepathy_tcp_connect_generic_network_ports" dftval="false"> +<desc> +<p> +Allow the Telepathy connection managers +to connect to any generic TCP port. +</p> +</desc> +</tunable> +<tunable name="telepathy_connect_all_ports" dftval="false"> +<desc> +<p> +Allow the Telepathy connection managers +to connect to any network port. +</p> +</desc> +</tunable> +</module> +<module name="telnet" filename="policy/modules/contrib/telnet.if"> +<summary>Telnet daemon</summary> +</module> +<module name="tftp" filename="policy/modules/contrib/tftp.if"> +<summary>Trivial file transfer protocol daemon</summary> +<interface name="tftp_read_content" lineno="13"> +<summary> +Read tftp content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tftp_manage_rw_content" lineno="31"> +<summary> +Manage tftp /var/lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tftp_admin" lineno="53"> +<summary> +All of the rules required to administrate +an tftp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="tftp_anon_write" dftval="false"> +<desc> +<p> +Allow tftp to modify public files +used for public file transfer services. +</p> +</desc> +</tunable> +</module> +<module name="tgtd" filename="policy/modules/contrib/tgtd.if"> +<summary>Linux Target Framework Daemon.</summary> +<desc> +<p> +Linux target framework (tgt) aims to simplify various +SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation +and maintenance. Our key goals are the clean integration into +the scsi-mid layer and implementing a great portion of tgt +in user space. +</p> +</desc> +<interface name="tgtd_rw_semaphores" lineno="22"> +<summary> +Allow read and write access to tgtd semaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tgtd_manage_semaphores" lineno="40"> +<summary> +Manage tgtd sempaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="thunderbird" filename="policy/modules/contrib/thunderbird.if"> +<summary>Thunderbird email client</summary> +<interface name="thunderbird_role" lineno="18"> +<summary> +Role access for thunderbird +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="thunderbird_domtrans" lineno="57"> +<summary> +Run thunderbird in the user thunderbird domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="timidity" filename="policy/modules/contrib/timidity.if"> +<summary>MIDI to WAV converter and player configured as a service</summary> +</module> +<module name="tmpreaper" filename="policy/modules/contrib/tmpreaper.if"> +<summary>Manage temporary directory sizes and file ages</summary> +<interface name="tmpreaper_exec" lineno="13"> +<summary> +Execute tmpreaper in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="tor" filename="policy/modules/contrib/tor.if"> +<summary>TOR, the onion router</summary> +<interface name="tor_domtrans" lineno="13"> +<summary> +Execute a domain transition to run TOR. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tor_admin" lineno="38"> +<summary> +All of the rules required to administrate +an tor environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the tor domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="tor_bind_all_unreserved_ports" dftval="false"> +<desc> +<p> +Allow tor daemon to bind +tcp sockets to all unreserved ports. +</p> +</desc> +</tunable> +</module> +<module name="transproxy" filename="policy/modules/contrib/transproxy.if"> +<summary>HTTP transperant proxy</summary> +</module> +<module name="tripwire" filename="policy/modules/contrib/tripwire.if"> +<summary>Tripwire file integrity checker.</summary> +<desc> +<p> +Tripwire file integrity checker. +</p> +<p> +NOTE: Tripwire creates temp file in its current working directory. +This policy does not allow write access to home directories, so +users will need to either cd to a directory where they have write +permission, or set the TEMPDIRECTORY variable in the tripwire config +file. The latter is preferable, as then the file_type_auto_trans +rules will kick in and label the files as private to tripwire. +</p> +</desc> +<interface name="tripwire_domtrans_tripwire" lineno="26"> +<summary> +Execute tripwire in the tripwire domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tripwire_run_tripwire" lineno="51"> +<summary> +Execute tripwire in the tripwire domain, and +allow the specified role the tripwire domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="tripwire_domtrans_twadmin" lineno="70"> +<summary> +Execute twadmin in the twadmin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tripwire_run_twadmin" lineno="95"> +<summary> +Execute twadmin in the twadmin domain, and +allow the specified role the twadmin domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="tripwire_domtrans_twprint" lineno="114"> +<summary> +Execute twprint in the twprint domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tripwire_run_twprint" lineno="139"> +<summary> +Execute twprint in the twprint domain, and +allow the specified role the twprint domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="tripwire_domtrans_siggen" lineno="158"> +<summary> +Execute siggen in the siggen domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tripwire_run_siggen" lineno="183"> +<summary> +Execute siggen in the siggen domain, and +allow the specified role the siggen domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="tuned" filename="policy/modules/contrib/tuned.if"> +<summary>Dynamic adaptive system tuning daemon</summary> +<interface name="tuned_domtrans" lineno="13"> +<summary> +Execute a domain transition to run tuned. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tuned_exec" lineno="31"> +<summary> +Execute tuned in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tuned_read_pid_files" lineno="50"> +<summary> +Read tuned PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tuned_manage_pid_files" lineno="69"> +<summary> +Manage tuned PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tuned_initrc_domtrans" lineno="88"> +<summary> +Execute tuned server in the tuned domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="tuned_admin" lineno="113"> +<summary> +All of the rules required to administrate +an tuned environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="tvtime" filename="policy/modules/contrib/tvtime.if"> +<summary> tvtime - a high quality television application </summary> +<interface name="tvtime_role" lineno="18"> +<summary> +Role access for tvtime +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +</module> +<module name="tzdata" filename="policy/modules/contrib/tzdata.if"> +<summary>Time zone updater</summary> +<interface name="tzdata_domtrans" lineno="13"> +<summary> +Execute a domain transition to run tzdata. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="tzdata_run" lineno="38"> +<summary> +Execute the tzdata program in the tzdata domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the tzdata domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="ucspitcp" filename="policy/modules/contrib/ucspitcp.if"> +<summary>ucspitcp policy</summary> +<desc> +<p> +Policy for DJB's ucspi-tcpd +</p> +</desc> +<interface name="ucspitcp_service_domain" lineno="23"> +<summary> +Define a specified domain as a ucspitcp service. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="entrypoint"> +<summary> +The type associated with the process program. +</summary> +</param> +</interface> +</module> +<module name="ulogd" filename="policy/modules/contrib/ulogd.if"> +<summary>Iptables/netfilter userspace logging daemon.</summary> +<interface name="ulogd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run ulogd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ulogd_read_config" lineno="33"> +<summary> +Allow the specified domain to read +ulogd configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ulogd_read_log" lineno="53"> +<summary> +Allow the specified domain to read ulogd's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ulogd_search_log" lineno="73"> +<summary> +Allow the specified domain to search ulogd's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ulogd_append_log" lineno="93"> +<summary> +Allow the specified domain to append to ulogd's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ulogd_admin" lineno="120"> +<summary> +All of the rules required to administrate +an ulogd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the syslog domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="uml" filename="policy/modules/contrib/uml.if"> +<summary>Policy for UML</summary> +<interface name="uml_role" lineno="18"> +<summary> +Role access for uml +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="uml_setattr_util_sockets" lineno="74"> +<summary> +Set attributes on uml utility socket files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uml_manage_util_files" lineno="92"> +<summary> +Manage uml utility files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="updfstab" filename="policy/modules/contrib/updfstab.if"> +<summary>Red Hat utility to change /etc/fstab.</summary> +<interface name="updfstab_domtrans" lineno="13"> +<summary> +Execute updfstab in the updfstab domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="uptime" filename="policy/modules/contrib/uptime.if"> +<summary>Uptime daemon</summary> +</module> +<module name="usbmodules" filename="policy/modules/contrib/usbmodules.if"> +<summary>List kernel modules of USB devices</summary> +<interface name="usbmodules_domtrans" lineno="13"> +<summary> +Execute usbmodules in the usbmodules domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usbmodules_run" lineno="39"> +<summary> +Execute usbmodules in the usbmodules domain, and +allow the specified role the usbmodules domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="usbmuxd" filename="policy/modules/contrib/usbmuxd.if"> +<summary>USB multiplexing daemon for communicating with Apple iPod Touch and iPhone</summary> +<interface name="usbmuxd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run usbmuxd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usbmuxd_stream_connect" lineno="32"> +<summary> +Connect to usbmuxd over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="userhelper" filename="policy/modules/contrib/userhelper.if"> +<summary>SELinux utility to run a shell with a new role</summary> +<template name="userhelper_role_template" lineno="24"> +<summary> +The role template for the userhelper module. +</summary> +<param name="userrole_prefix"> +<summary> +The prefix of the user role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="user_role"> +<summary> +The user role. +</summary> +</param> +<param name="user_domain"> +<summary> +The user domain associated with the role. +</summary> +</param> +</template> +<interface name="userhelper_search_config" lineno="178"> +<summary> +Search the userhelper configuration directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userhelper_dontaudit_search_config" lineno="197"> +<summary> +Do not audit attempts to search +the userhelper configuration directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userhelper_use_fd" lineno="215"> +<summary> +Allow domain to use userhelper file descriptor. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userhelper_sigchld" lineno="233"> +<summary> +Allow domain to send sigchld to userhelper. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userhelper_exec" lineno="251"> +<summary> +Execute the userhelper program in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="usernetctl" filename="policy/modules/contrib/usernetctl.if"> +<summary>User network interface configuration helper</summary> +<interface name="usernetctl_domtrans" lineno="13"> +<summary> +Execute usernetctl in the usernetctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="usernetctl_run" lineno="38"> +<summary> +Execute usernetctl in the usernetctl domain, and +allow the specified role the usernetctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="uucp" filename="policy/modules/contrib/uucp.if"> +<summary>Unix to Unix Copy</summary> +<interface name="uucp_domtrans" lineno="14"> +<summary> +Execute the uucico program in the +uucpd_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="uucp_append_log" lineno="33"> +<summary> +Allow the specified domain to append +to uucp log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uucp_manage_spool" lineno="53"> +<summary> +Create, read, write, and delete uucp spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uucp_domtrans_uux" lineno="75"> +<summary> +Execute the master uux program in the +uux_t domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="uucp_admin" lineno="95"> +<summary> +All of the rules required to administrate +an uucp environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="uuidd" filename="policy/modules/contrib/uuidd.if"> +<summary>policy for uuidd</summary> +<interface name="uuidd_domtrans" lineno="13"> +<summary> +Transition to uuidd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="uuidd_initrc_domtrans" lineno="32"> +<summary> +Execute uuidd server in the uuidd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_search_lib" lineno="50"> +<summary> +Search uuidd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_read_lib_files" lineno="69"> +<summary> +Read uuidd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_manage_lib_files" lineno="88"> +<summary> +Manage uuidd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_manage_lib_dirs" lineno="107"> +<summary> +Manage uuidd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_read_pid_files" lineno="126"> +<summary> +Read uuidd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_stream_connect_manager" lineno="145"> +<summary> +Connect to uuidd over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="uuidd_admin" lineno="171"> +<summary> +All of the rules required to administrate +an uuidd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="uwimap" filename="policy/modules/contrib/uwimap.if"> +<summary>University of Washington IMAP toolkit POP3 and IMAP mail server</summary> +<interface name="uwimap_domtrans" lineno="13"> +<summary> +Execute the UW IMAP/POP3 servers with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="varnishd" filename="policy/modules/contrib/varnishd.if"> +<summary>Varnishd http accelerator daemon</summary> +<interface name="varnishd_domtrans" lineno="13"> +<summary> +Execute varnishd in the varnishd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="varnishd_exec" lineno="32"> +<summary> +Execute varnishd +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_read_config" lineno="50"> +<summary> +Read varnishd configuration file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_read_lib_files" lineno="69"> +<summary> +Read varnish lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_read_log" lineno="88"> +<summary> +Read varnish logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_append_log" lineno="107"> +<summary> +Append varnish logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_manage_log" lineno="126"> +<summary> +Manage varnish logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="varnishd_admin_varnishlog" lineno="152"> +<summary> +All of the rules required to administrate +an varnishlog environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the varnishlog domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="varnishd_admin" lineno="190"> +<summary> +All of the rules required to administrate +an varnishd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the varnishd domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="varnishd_connect_any" dftval="false"> +<desc> +<p> +Allow varnishd to connect to all ports, +not just HTTP. +</p> +</desc> +</tunable> +</module> +<module name="vbetool" filename="policy/modules/contrib/vbetool.if"> +<summary>run real-mode video BIOS code to alter hardware state</summary> +<interface name="vbetool_domtrans" lineno="13"> +<summary> +Execute vbetool application in the vbetool domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vbetool_run" lineno="38"> +<summary> +Execute vbetool in the vbetool domain, and +allow the specified role the vbetool domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<tunable name="vbetool_mmap_zero_ignore" dftval="false"> +<desc> +<p> +Ignore vbetool mmap_zero errors. +</p> +</desc> +</tunable> +</module> +<module name="vdagent" filename="policy/modules/contrib/vdagent.if"> +<summary>policy for vdagent</summary> +<interface name="vdagent_domtrans" lineno="13"> +<summary> +Execute a domain transition to run vdagent. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vdagent_getattr_exec_files" lineno="31"> +<summary> +Getattr on vdagent executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vdagent_getattr_log" lineno="49"> +<summary> +Get the attributes of vdagent logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vdagent_read_pid_files" lineno="68"> +<summary> +Read vdagent PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vdagent_stream_connect" lineno="88"> +<summary> +Connect to vdagent over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vdagent_admin" lineno="114"> +<summary> +All of the rules required to administrate +an vdagent environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="vhostmd" filename="policy/modules/contrib/vhostmd.if"> +<summary>Virtual host metrics daemon</summary> +<interface name="vhostmd_domtrans" lineno="13"> +<summary> +Execute a domain transition to run vhostmd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vhostmd_initrc_domtrans" lineno="31"> +<summary> +Execute vhostmd server in the vhostmd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vhostmd_read_tmpfs_files" lineno="49"> +<summary> +Allow domain to read, vhostmd tmpfs files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_dontaudit_read_tmpfs_files" lineno="69"> +<summary> +Do not audit attempts to read, +vhostmd tmpfs files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="vhostmd_rw_tmpfs_files" lineno="87"> +<summary> +Allow domain to read and write vhostmd tmpfs files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_manage_tmpfs_files" lineno="106"> +<summary> +Create, read, write, and delete vhostmd tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_read_pid_files" lineno="125"> +<summary> +Read vhostmd PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_manage_pid_files" lineno="144"> +<summary> +Manage vhostmd var_run files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_stream_connect" lineno="162"> +<summary> +Connect to vhostmd over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vhostmd_dontaudit_rw_stream_connect" lineno="182"> +<summary> +Dontaudit read and write to vhostmd +over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="vhostmd_admin" lineno="207"> +<summary> +All of the rules required to administrate +an vhostmd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="virt" filename="policy/modules/contrib/virt.if"> +<summary>Libvirt virtualization API</summary> +<template name="virt_domain_template" lineno="14"> +<summary> +Creates types and rules for a basic +qemu process domain. +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<interface name="virt_image" lineno="87"> +<summary> +Make the specified type usable as a virt image +</summary> +<param name="type"> +<summary> +Type to be used as a virtual image +</summary> +</param> +</interface> +<interface name="virt_domtrans" lineno="109"> +<summary> +Execute a domain transition to run virt. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="virt_stream_connect" lineno="127"> +<summary> +Connect to virt over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_attach_tun_iface" lineno="146"> +<summary> +Allow domain to attach to virt TUN devices +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_config" lineno="165"> +<summary> +Read virt config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_config" lineno="186"> +<summary> +manage virt config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_content" lineno="207"> +<summary> +Allow domain to manage virt image files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_pid_files" lineno="242"> +<summary> +Read virt PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_pid_files" lineno="261"> +<summary> +Manage virt pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_search_lib" lineno="280"> +<summary> +Search virt lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_lib_files" lineno="299"> +<summary> +Read virt lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_lib_files" lineno="320"> +<summary> +Create, read, write, and delete +virt lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_log" lineno="340"> +<summary> +Allow the specified domain to read virt's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="virt_append_log" lineno="360"> +<summary> +Allow the specified domain to append +virt log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_log" lineno="379"> +<summary> +Allow domain to manage virt log files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_read_images" lineno="399"> +<summary> +Allow domain to read virt image files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_svirt_cache" lineno="436"> +<summary> +Create, read, write, and delete +svirt cache files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_manage_images" lineno="457"> +<summary> +Allow domain to manage virt image files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="virt_admin" lineno="500"> +<summary> +All of the rules required to administrate +an virt environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="virt_use_comm" dftval="false"> +<desc> +<p> +Allow virt to use serial/parallell communication ports +</p> +</desc> +</tunable> +<tunable name="virt_use_fusefs" dftval="false"> +<desc> +<p> +Allow virt to read fuse files +</p> +</desc> +</tunable> +<tunable name="virt_use_nfs" dftval="false"> +<desc> +<p> +Allow virt to manage nfs files +</p> +</desc> +</tunable> +<tunable name="virt_use_samba" dftval="false"> +<desc> +<p> +Allow virt to manage cifs files +</p> +</desc> +</tunable> +<tunable name="virt_use_sysfs" dftval="false"> +<desc> +<p> +Allow virt to manage device configuration, (pci) +</p> +</desc> +</tunable> +<tunable name="virt_use_usb" dftval="true"> +<desc> +<p> +Allow virt to use usb devices +</p> +</desc> +</tunable> +</module> +<module name="vlock" filename="policy/modules/contrib/vlock.if"> +<summary>Lock one or more sessions on the Linux console.</summary> +<interface name="vlock_domtrans" lineno="13"> +<summary> +Execute vlock in the vlock domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vlock_run" lineno="39"> +<summary> +Execute vlock in the vlock domain, and +allow the specified role the vlock domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed to access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="vmware" filename="policy/modules/contrib/vmware.if"> +<summary>VMWare Workstation virtual machines</summary> +<interface name="vmware_role" lineno="18"> +<summary> +Role access for vmware +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="vmware_exec_host" lineno="43"> +<summary> +Execute vmware host executables +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vmware_read_system_config" lineno="61"> +<summary> +Read VMWare system configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vmware_append_system_config" lineno="79"> +<summary> +Append to VMWare system configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vmware_append_log" lineno="97"> +<summary> +Append to VMWare log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="vnstatd" filename="policy/modules/contrib/vnstatd.if"> +<summary>Console network traffic monitor.</summary> +<interface name="vnstatd_domtrans_vnstat" lineno="13"> +<summary> +Execute a domain transition to run vnstat. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vnstatd_domtrans" lineno="31"> +<summary> +Execute a domain transition to run vnstatd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vnstatd_search_lib" lineno="49"> +<summary> +Search vnstatd lib directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vnstatd_manage_lib_dirs" lineno="68"> +<summary> +Manage vnstatd lib dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vnstatd_read_lib_files" lineno="87"> +<summary> +Read vnstatd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vnstatd_manage_lib_files" lineno="107"> +<summary> +Create, read, write, and delete +vnstatd lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vnstatd_admin" lineno="133"> +<summary> +All of the rules required to administrate +an vnstatd environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="vpn" filename="policy/modules/contrib/vpn.if"> +<summary>Virtual Private Networking client</summary> +<interface name="vpn_domtrans" lineno="13"> +<summary> +Execute VPN clients in the vpnc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="vpn_run" lineno="38"> +<summary> +Execute VPN clients in the vpnc domain, and +allow the specified role the vpnc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="vpn_kill" lineno="57"> +<summary> +Send VPN clients the kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vpn_signal" lineno="75"> +<summary> +Send generic signals to VPN clients. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vpn_signull" lineno="93"> +<summary> +Send signull to VPN clients. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vpn_dbus_chat" lineno="112"> +<summary> +Send and receive messages from +Vpnc over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="vpn_relabelfrom_tun_socket" lineno="132"> +<summary> +Relabelfrom from vpnc socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="w3c" filename="policy/modules/contrib/w3c.if"> +<summary>W3C Markup Validator</summary> +</module> +<module name="watchdog" filename="policy/modules/contrib/watchdog.if"> +<summary>Software watchdog</summary> +</module> +<module name="webadm" filename="policy/modules/contrib/webadm.if"> +<summary>Web administrator role</summary> +<interface name="webadm_role_change" lineno="14"> +<summary> +Change to the web administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="webadm_role_change_to" lineno="44"> +<summary> +Change from the web administrator role. +</summary> +<desc> +<p> +Change from the web administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="webadm_manage_user_files" dftval="false"> +<desc> +<p> +Allow webadm to manage files in users home directories +</p> +</desc> +</tunable> +<tunable name="webadm_read_user_files" dftval="false"> +<desc> +<p> +Allow webadm to read files in users home directories +</p> +</desc> +</tunable> +</module> +<module name="webalizer" filename="policy/modules/contrib/webalizer.if"> +<summary>Web server log analysis</summary> +<interface name="webalizer_domtrans" lineno="13"> +<summary> +Execute webalizer in the webalizer domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="webalizer_run" lineno="38"> +<summary> +Execute webalizer in the webalizer domain, and +allow the specified role the webalizer domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="wine" filename="policy/modules/contrib/wine.if"> +<summary>Wine Is Not an Emulator. Run Windows programs in Linux.</summary> +<template name="wine_role" lineno="30"> +<summary> +The per role template for the wine module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for wine applications. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +</template> +<template name="wine_role_template" lineno="87"> +<summary> +The role template for the wine module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for wine applications. +</p> +</desc> +<param name="role_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="wine_domtrans" lineno="127"> +<summary> +Execute the wine program in the wine domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="wine_run" lineno="152"> +<summary> +Execute wine in the wine domain, and +allow the specified role the wine domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="wine_rw_shm" lineno="172"> +<summary> +Read and write wine Shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="wine_mmap_zero_ignore" dftval="false"> +<desc> +<p> +Ignore wine mmap_zero errors. +</p> +</desc> +</tunable> +</module> +<module name="wireshark" filename="policy/modules/contrib/wireshark.if"> +<summary>Wireshark packet capture tool.</summary> +<interface name="wireshark_role" lineno="18"> +<summary> +Role access for wireshark +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +<interface name="wireshark_domtrans" lineno="49"> +<summary> +Run wireshark in wireshark domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="wm" filename="policy/modules/contrib/wm.if"> +<summary>X Window Managers</summary> +<template name="wm_role_template" lineno="30"> +<summary> +The role template for the wm module. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for window manager applications. +</p> +</desc> +<param name="role_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</template> +<interface name="wm_exec" lineno="105"> +<summary> +Execute the wm program in the wm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="xen" filename="policy/modules/contrib/xen.if"> +<summary>Xen hypervisor</summary> +<interface name="xen_domtrans" lineno="13"> +<summary> +Execute a domain transition to run xend. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="xen_use_fds" lineno="31"> +<summary> +Inherit and use xen file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_dontaudit_use_fds" lineno="50"> +<summary> +Do not audit attempts to inherit +xen file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xen_read_image_files" lineno="68"> +<summary> +Read xend image files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_rw_image_files" lineno="90"> +<summary> +Allow the specified domain to read/write +xend image files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_append_log" lineno="111"> +<summary> +Allow the specified domain to append +xend log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_manage_log" lineno="132"> +<summary> +Create, read, write, and delete the +xend log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_dontaudit_rw_unix_stream_sockets" lineno="154"> +<summary> +Do not audit attempts to read and write +Xen unix domain stream sockets. These +are leaked file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xen_stream_connect_xenstore" lineno="172"> +<summary> +Connect to xenstored over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_stream_connect" lineno="191"> +<summary> +Connect to xend over an unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xen_domtrans_xm" lineno="213"> +<summary> +Execute a domain transition to run xm. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="xen_stream_connect_xm" lineno="231"> +<summary> +Connect to xm over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="xend_run_blktap" dftval="true"> +<desc> +<p> +Allow xend to run blktapctrl/tapdisk. +Not required if using dedicated logical volumes for disk images. +</p> +</desc> +</tunable> +<tunable name="xend_run_qemu" dftval="true"> +<desc> +<p> +Allow xend to run qemu-dm. +Not required if using paravirt and no vfb. +</p> +</desc> +</tunable> +<tunable name="xen_use_nfs" dftval="false"> +<desc> +<p> +Allow xen to manage nfs files +</p> +</desc> +</tunable> +</module> +<module name="xfs" filename="policy/modules/contrib/xfs.if"> +<summary>X Windows Font Server </summary> +<interface name="xfs_read_sockets" lineno="13"> +<summary> +Read a X font server named socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xfs_stream_connect" lineno="33"> +<summary> +Connect to a X font server over +a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xfs_exec" lineno="53"> +<summary> +Allow the specified domain to execute xfs +in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="xguest" filename="policy/modules/contrib/xguest.if"> +<summary>Least privledge xwindows user role</summary> +<interface name="xguest_role_change" lineno="14"> +<summary> +Change to the xguest role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="xguest_role_change_to" lineno="44"> +<summary> +Change from the xguest role. +</summary> +<desc> +<p> +Change from the xguest role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="xguest_mount_media" dftval="true"> +<desc> +<p> +Allow xguest users to mount removable media +</p> +</desc> +</tunable> +<tunable name="xguest_connect_network" dftval="true"> +<desc> +<p> +Allow xguest to configure Network Manager +</p> +</desc> +</tunable> +<tunable name="xguest_use_bluetooth" dftval="true"> +<desc> +<p> +Allow xguest to use blue tooth devices +</p> +</desc> +</tunable> +</module> +<module name="xprint" filename="policy/modules/contrib/xprint.if"> +<summary>X print server</summary> +</module> +<module name="xscreensaver" filename="policy/modules/contrib/xscreensaver.if"> +<summary>X Screensaver</summary> +<interface name="xscreensaver_role" lineno="18"> +<summary> +Role access for xscreensaver +</summary> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</interface> +</module> +<module name="yam" filename="policy/modules/contrib/yam.if"> +<summary>Yum/Apt Mirroring</summary> +<interface name="yam_domtrans" lineno="13"> +<summary> +Execute yam in the yam domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="yam_run" lineno="39"> +<summary> +Execute yam in the yam domain, and +allow the specified role the yam domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="yam_read_content" lineno="58"> +<summary> +Read yam content. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="zabbix" filename="policy/modules/contrib/zabbix.if"> +<summary>Distributed infrastructure monitoring</summary> +<interface name="zabbix_domtrans" lineno="13"> +<summary> +Execute a domain transition to run zabbix. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="zabbix_tcp_connect" lineno="31"> +<summary> +Allow connectivity to the zabbix server +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zabbix_read_log" lineno="53"> +<summary> +Allow the specified domain to read zabbix's log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="zabbix_append_log" lineno="73"> +<summary> +Allow the specified domain to append +zabbix log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zabbix_read_pid_files" lineno="92"> +<summary> +Read zabbix PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zabbix_agent_tcp_connect" lineno="111"> +<summary> +Allow connectivity to a zabbix agent +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zabbix_admin" lineno="139"> +<summary> +All of the rules required to administrate +an zabbix environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the zabbix domain. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="zarafa" filename="policy/modules/contrib/zarafa.if"> +<summary>Zarafa collaboration platform.</summary> +<template name="zarafa_domain_template" lineno="14"> +<summary> +Creates types and rules for a basic +zararfa init daemon domain. +</summary> +<param name="prefix"> +<summary> +Prefix for the domain. +</summary> +</param> +</template> +<interface name="zarafa_search_config" lineno="58"> +<summary> +Allow the specified domain to search +zarafa configuration dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zarafa_domtrans_deliver" lineno="77"> +<summary> +Execute a domain transition to run zarafa_deliver. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="zarafa_domtrans_server" lineno="95"> +<summary> +Execute a domain transition to run zarafa_server. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="zarafa_stream_connect_server" lineno="113"> +<summary> +Connect to zarafa-server unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="zebra" filename="policy/modules/contrib/zebra.if"> +<summary>Zebra border gateway protocol network routing service</summary> +<interface name="zebra_read_config" lineno="14"> +<summary> +Read the configuration files for zebra. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="zebra_stream_connect" lineno="35"> +<summary> +Connect to zebra over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="zebra_admin" lineno="62"> +<summary> +All of the rules required to administrate +an zebra environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the zebra domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_zebra_write_config" dftval="false"> +<desc> +<p> +Allow zebra daemon to write it configuration files +</p> +</desc> +</tunable> +</module> +<module name="zosremote" filename="policy/modules/contrib/zosremote.if"> +<summary>policy for z/OS Remote-services Audit dispatcher plugin</summary> +<interface name="zosremote_domtrans" lineno="13"> +<summary> +Execute a domain transition to run audispd-zos-remote. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="zosremote_run" lineno="38"> +<summary> +Allow specified type and role to transition and +run in the zos_remote_t domain. Allow specified type +to use zos_remote_t terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +</module> +</layer> +<layer name="kernel"> +<summary>Policy modules for kernel resources.</summary> +<module name="corecommands" filename="policy/modules/kernel/corecommands.if"> +<summary> +Core policy for shells, and generic programs +in /bin, /sbin, /usr/bin, and /usr/sbin. +</summary> +<required val="true"> +Contains the base bin and sbin directory types +which need to be searched for the kernel to +run init. +</required> +<interface name="corecmd_executable_file" lineno="23"> +<summary> +Make the specified type usable for files +that are exectuables, such as binary programs. +This does not include shared libraries. +</summary> +<param name="type"> +<summary> +Type to be used for files. +</summary> +</param> +</interface> +<interface name="corecmd_bin_alias" lineno="53"> +<summary> +Create a aliased type to generic bin files. (Deprecated) +</summary> +<desc> +<p> +Create a aliased type to generic bin files. (Deprecated) +</p> +<p> +This is added to support targeted policy. Its +use should be limited. It has no effect +on the strict policy. +</p> +</desc> +<param name="domain"> +<summary> +Alias type for bin_t. +</summary> +</param> +</interface> +<interface name="corecmd_bin_entry_type" lineno="68"> +<summary> +Make general progams in bin an entrypoint for +the specified domain. +</summary> +<param name="domain"> +<summary> +The domain for which bin_t is an entrypoint. +</summary> +</param> +</interface> +<interface name="corecmd_sbin_entry_type" lineno="87"> +<summary> +Make general progams in sbin an entrypoint for +the specified domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +The domain for which sbin programs are an entrypoint. +</summary> +</param> +</interface> +<interface name="corecmd_shell_entry_type" lineno="102"> +<summary> +Make the shell an entrypoint for the specified domain. +</summary> +<param name="domain"> +<summary> +The domain for which the shell is an entrypoint. +</summary> +</param> +</interface> +<interface name="corecmd_search_bin" lineno="120"> +<summary> +Search the contents of bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_search_bin" lineno="138"> +<summary> +Do not audit attempts to search the contents of bin directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_list_bin" lineno="156"> +<summary> +List the contents of bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_write_bin_dirs" lineno="174"> +<summary> +Do not audit attempts to write bin directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_getattr_bin_files" lineno="192"> +<summary> +Get the attributes of files in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_getattr_bin_files" lineno="210"> +<summary> +Get the attributes of files in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_bin_files" lineno="229"> +<summary> +Read files in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_write_bin_files" lineno="247"> +<summary> +Do not audit attempts to write bin files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_read_bin_symlinks" lineno="265"> +<summary> +Read symbolic links in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_bin_pipes" lineno="283"> +<summary> +Read pipes in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_bin_sockets" lineno="301"> +<summary> +Read named sockets in bin directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_exec_bin" lineno="340"> +<summary> +Execute generic programs in bin directories, +in the caller domain. +</summary> +<desc> +<p> +Allow the specified domain to execute generic programs +in system bin directories (/bin, /sbin, /usr/bin, +/usr/sbin) a without domain transition. +</p> +<p> +Typically, this interface should be used when the domain +executes general system progams within the privileges +of the source domain. Some examples of these programs +are ls, cp, sed, python, and tar. This does not include +shells, such as bash. +</p> +<p> +Related interface: +</p> +<ul> +<li>corecmd_exec_shell()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_manage_bin_files" lineno="360"> +<summary> +Create, read, write, and delete bin files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_relabel_bin_files" lineno="378"> +<summary> +Relabel to and from the bin type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_mmap_bin_files" lineno="396"> +<summary> +Mmap a bin file as executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_bin_spec_domtrans" lineno="440"> +<summary> +Execute a file in a bin directory +in the specified domain but do not +do it automatically. This is an explicit +transition, requiring the caller to use setexeccon(). +</summary> +<desc> +<p> +Execute a file in a bin directory +in the specified domain. This allows +the specified domain to execute any file +on these filesystems in the specified +domain. This is not suggested. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +the userhelper policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="corecmd_bin_domtrans" lineno="483"> +<summary> +Execute a file in a bin directory +in the specified domain. +</summary> +<desc> +<p> +Execute a file in a bin directory +in the specified domain. This allows +the specified domain to execute any file +on these filesystems in the specified +domain. This is not suggested. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +the ssh-agent policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="corecmd_search_sbin" lineno="502"> +<summary> +Search the contents of sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_search_sbin" lineno="518"> +<summary> +Do not audit attempts to search +sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_list_sbin" lineno="533"> +<summary> +List the contents of sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_write_sbin_dirs" lineno="549"> +<summary> +Do not audit attempts to write +sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_getattr_sbin_files" lineno="564"> +<summary> +Get the attributes of sbin files. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_dontaudit_getattr_sbin_files" lineno="580"> +<summary> +Do not audit attempts to get the attibutes +of sbin files. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_read_sbin_files" lineno="595"> +<summary> +Read files in sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_sbin_symlinks" lineno="610"> +<summary> +Read symbolic links in sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_sbin_pipes" lineno="625"> +<summary> +Read named pipes in sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_read_sbin_sockets" lineno="640"> +<summary> +Read named sockets in sbin directories. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_exec_sbin" lineno="656"> +<summary> +Execute generic programs in sbin directories, +in the caller domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_manage_sbin_files" lineno="672"> +<summary> +Create, read, write, and delete sbin files. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_relabel_sbin_files" lineno="688"> +<summary> +Relabel to and from the sbin type. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_mmap_sbin_files" lineno="704"> +<summary> +Mmap a sbin file as executable. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_sbin_domtrans" lineno="743"> +<summary> +Execute a file in a sbin directory +in the specified domain. (Deprecated) +</summary> +<desc> +<p> +Execute a file in a sbin directory +in the specified domain. This allows +the specified domain to execute any file +on these filesystems in the specified +domain. This is not suggested. (Deprecated) +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +the ssh-agent policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="corecmd_sbin_spec_domtrans" lineno="784"> +<summary> +Execute a file in a sbin directory +in the specified domain but do not +do it automatically. This is an explicit +transition, requiring the caller to use setexeccon(). (Deprecated) +</summary> +<desc> +<p> +Execute a file in a sbin directory +in the specified domain. This allows +the specified domain to execute any file +on these filesystems in the specified +domain. This is not suggested. (Deprecated) +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +the userhelper policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="corecmd_check_exec_shell" lineno="799"> +<summary> +Check if a shell is executable (DAC-wise). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_exec_shell" lineno="837"> +<summary> +Execute shells in the caller domain. +</summary> +<desc> +<p> +Allow the specified domain to execute shells without +a domain transition. +</p> +<p> +Typically, this interface should be used when the domain +executes shells within the privileges +of the source domain. Some examples of these programs +are bash, tcsh, and zsh. +</p> +<p> +Related interface: +</p> +<ul> +<li>corecmd_exec_bin()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_exec_ls" lineno="857"> +<summary> +Execute ls in the caller domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_shell_spec_domtrans" lineno="891"> +<summary> +Execute a shell in the target domain. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<desc> +<p> +Execute a shell in the target domain. This +is an explicit transition, requiring the +caller to use setexeccon(). +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the shell process. +</summary> +</param> +</interface> +<interface name="corecmd_shell_domtrans" lineno="926"> +<summary> +Execute a shell in the specified domain. +</summary> +<desc> +<p> +Execute a shell in the specified domain. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the shell process. +</summary> +</param> +</interface> +<interface name="corecmd_exec_chroot" lineno="945"> +<summary> +Execute chroot in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corecmd_getattr_all_executables" lineno="966"> +<summary> +Get the attributes of all executable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="corecmd_read_all_executables" lineno="987"> +<summary> +Read all executable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="corecmd_exec_all_executables" lineno="1006"> +<summary> +Execute all executable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="corecmd_dontaudit_exec_all_executables" lineno="1027"> +<summary> +Do not audit attempts to execute all executables. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corecmd_manage_all_executables" lineno="1046"> +<summary> +Create, read, write, and all executable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="corecmd_relabel_all_executables" lineno="1067"> +<summary> +Relabel to and from the bin type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="corecmd_mmap_all_executables" lineno="1086"> +<summary> +Mmap all executables as executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="corenetwork" filename="policy/modules/kernel/corenetwork.if"> +<summary>Policy controlling access to network objects</summary> +<required val="true"> +Contains the initial SIDs for network objects. +</required> +<interface name="corenet_port" lineno="29"> +<summary> +Define type to be a network port type +</summary> +<desc> +<p> +Define type to be a network port type +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for network ports. +</summary> +</param> +</interface> +<interface name="corenet_reserved_port" lineno="56"> +<summary> +Define network type to be a reserved port (lt 1024) +</summary> +<desc> +<p> +Define network type to be a reserved port (lt 1024) +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for network ports. +</summary> +</param> +</interface> +<interface name="corenet_rpc_port" lineno="83"> +<summary> +Define network type to be a rpc port ( 512 lt PORT lt 1024) +</summary> +<desc> +<p> +Define network type to be a rpc port ( 512 lt PORT lt 1024) +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for network ports. +</summary> +</param> +</interface> +<interface name="corenet_node" lineno="110"> +<summary> +Define type to be a network node type +</summary> +<desc> +<p> +Define type to be a network node type +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for network nodes. +</summary> +</param> +</interface> +<interface name="corenet_packet" lineno="137"> +<summary> +Define type to be a network packet type +</summary> +<desc> +<p> +Define type to be a network packet type +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for a network packet. +</summary> +</param> +</interface> +<interface name="corenet_client_packet" lineno="164"> +<summary> +Define type to be a network client packet type +</summary> +<desc> +<p> +Define type to be a network client packet type +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for a network client packet. +</summary> +</param> +</interface> +<interface name="corenet_server_packet" lineno="191"> +<summary> +Define type to be a network server packet type +</summary> +<desc> +<p> +Define type to be a network server packet type +</p> +<p> +This is for supporting third party modules and its +use is not allowed in upstream reference policy. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used for a network server packet. +</summary> +</param> +</interface> +<interface name="corenet_spd_type" lineno="210"> +<summary> +Make the specified type usable +for labeled ipsec. +</summary> +<param name="domain"> +<summary> +Type to be used for labeled ipsec. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_generic_if" lineno="256"> +<summary> +Send and receive TCP network traffic on generic interfaces. +</summary> +<desc> +<p> +Allow the specified domain to send and receive TCP network +traffic on generic network interfaces. +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_tcp_sendrecv_generic_node()</li> +<li>corenet_tcp_sendrecv_all_ports()</li> +<li>corenet_tcp_connect_all_ports()</li> +</ul> +<p> +Example client being able to connect to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:tcp_socket create_stream_socket_perms; +corenet_tcp_sendrecv_generic_if(myclient_t) +corenet_tcp_sendrecv_generic_node(myclient_t) +corenet_tcp_sendrecv_all_ports(myclient_t) +corenet_tcp_connect_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_generic_if" lineno="274"> +<summary> +Send UDP network traffic on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_send_generic_if" lineno="293"> +<summary> +Dontaudit attempts to send UDP network traffic +on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_generic_if" lineno="311"> +<summary> +Receive UDP network traffic on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_receive_generic_if" lineno="330"> +<summary> +Do not audit attempts to receive UDP network +traffic on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_generic_if" lineno="374"> +<summary> +Send and receive UDP network traffic on generic interfaces. +</summary> +<desc> +<p> +Allow the specified domain to send and receive UDP network +traffic on generic network interfaces. +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_udp_sendrecv_generic_node()</li> +<li>corenet_udp_sendrecv_all_ports()</li> +</ul> +<p> +Example client being able to send to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:udp_socket create_socket_perms; +corenet_udp_sendrecv_generic_if(myclient_t) +corenet_udp_sendrecv_generic_node(myclient_t) +corenet_udp_sendrecv_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_generic_if" lineno="390"> +<summary> +Do not audit attempts to send and receive UDP network +traffic on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_raw_send_generic_if" lineno="405"> +<summary> +Send raw IP packets on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_receive_generic_if" lineno="423"> +<summary> +Receive raw IP packets on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_sendrecv_generic_if" lineno="441"> +<summary> +Send and receive raw IP packets on generic interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_out_generic_if" lineno="457"> +<summary> +Allow outgoing network traffic on the generic interfaces. +</summary> +<param name="domain"> +<summary> +The peer label of the outgoing network traffic. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_in_generic_if" lineno="476"> +<summary> +Allow incoming traffic on the generic interfaces. +</summary> +<param name="domain"> +<summary> +The peer label of the incoming network traffic. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_inout_generic_if" lineno="495"> +<summary> +Allow incoming and outgoing network traffic on the generic interfaces. +</summary> +<param name="domain"> +<summary> +The peer label of the network traffic. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_tcp_sendrecv_all_if" lineno="510"> +<summary> +Send and receive TCP network traffic on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_send_all_if" lineno="528"> +<summary> +Send UDP network traffic on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_all_if" lineno="546"> +<summary> +Receive UDP network traffic on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_all_if" lineno="564"> +<summary> +Send and receive UDP network traffic on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_send_all_if" lineno="579"> +<summary> +Send raw IP packets on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_receive_all_if" lineno="597"> +<summary> +Receive raw IP packets on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_sendrecv_all_if" lineno="615"> +<summary> +Send and receive raw IP packets on all interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_generic_node" lineno="658"> +<summary> +Send and receive TCP network traffic on generic nodes. +</summary> +<desc> +<p> +Allow the specified domain to send and receive TCP network +traffic to/from generic network nodes (hostnames/networks). +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_tcp_sendrecv_generic_if()</li> +<li>corenet_tcp_sendrecv_all_ports()</li> +<li>corenet_tcp_connect_all_ports()</li> +</ul> +<p> +Example client being able to connect to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:tcp_socket create_stream_socket_perms; +corenet_tcp_sendrecv_generic_if(myclient_t) +corenet_tcp_sendrecv_generic_node(myclient_t) +corenet_tcp_sendrecv_all_ports(myclient_t) +corenet_tcp_connect_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_generic_node" lineno="676"> +<summary> +Send UDP network traffic on generic nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_generic_node" lineno="694"> +<summary> +Receive UDP network traffic on generic nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_generic_node" lineno="738"> +<summary> +Send and receive UDP network traffic on generic nodes. +</summary> +<desc> +<p> +Allow the specified domain to send and receive UDP network +traffic to/from generic network nodes (hostnames/networks). +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_udp_sendrecv_generic_if()</li> +<li>corenet_udp_sendrecv_all_ports()</li> +</ul> +<p> +Example client being able to send to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:udp_socket create_socket_perms; +corenet_udp_sendrecv_generic_if(myclient_t) +corenet_udp_sendrecv_generic_node(myclient_t) +corenet_udp_sendrecv_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_raw_send_generic_node" lineno="753"> +<summary> +Send raw IP packets on generic nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_receive_generic_node" lineno="771"> +<summary> +Receive raw IP packets on generic nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_sendrecv_generic_node" lineno="789"> +<summary> +Send and receive raw IP packets on generic nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_generic_node" lineno="819"> +<summary> +Bind TCP sockets to generic nodes. +</summary> +<desc> +<p> +Bind TCP sockets to generic nodes. This is +necessary for binding a socket so it +can be used for servers to listen +for incoming connections. +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_udp_bind_generic_node()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="1"/> +</interface> +<interface name="corenet_udp_bind_generic_node" lineno="852"> +<summary> +Bind UDP sockets to generic nodes. +</summary> +<desc> +<p> +Bind UDP sockets to generic nodes. This is +necessary for binding a socket so it +can be used for servers to listen +for incoming connections. +</p> +<p> +Related interface: +</p> +<ul> +<li>corenet_tcp_bind_generic_node()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="1"/> +</interface> +<interface name="corenet_raw_bind_generic_node" lineno="871"> +<summary> +Bind raw sockets to genric nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_out_generic_node" lineno="890"> +<summary> +Allow outgoing network traffic to generic nodes. +</summary> +<param name="domain"> +<summary> +The peer label of the outgoing network traffic. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_in_generic_node" lineno="909"> +<summary> +Allow incoming network traffic from generic nodes. +</summary> +<param name="domain"> +<summary> +The peer label of the incoming network traffic. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_inout_generic_node" lineno="928"> +<summary> +Allow incoming and outgoing network traffic with generic nodes. +</summary> +<param name="domain"> +<summary> +The peer label of the network traffic. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_tcp_sendrecv_all_nodes" lineno="943"> +<summary> +Send and receive TCP network traffic on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_send_all_nodes" lineno="961"> +<summary> +Send UDP network traffic on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="980"> +<summary> +Do not audit attempts to send UDP network +traffic on any nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_all_nodes" lineno="998"> +<summary> +Receive UDP network traffic on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1017"> +<summary> +Do not audit attempts to receive UDP +network traffic on all nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_all_nodes" lineno="1035"> +<summary> +Send and receive UDP network traffic on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1051"> +<summary> +Do not audit attempts to send and receive UDP +network traffic on any nodes nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_raw_send_all_nodes" lineno="1066"> +<summary> +Send raw IP packets on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_receive_all_nodes" lineno="1084"> +<summary> +Receive raw IP packets on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_sendrecv_all_nodes" lineno="1102"> +<summary> +Send and receive raw IP packets on all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_all_nodes" lineno="1117"> +<summary> +Bind TCP sockets to all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_all_nodes" lineno="1135"> +<summary> +Bind UDP sockets to all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_bind_all_nodes" lineno="1154"> +<summary> +Bind raw sockets to all nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_generic_port" lineno="1172"> +<summary> +Send and receive TCP network traffic on generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1190"> +<summary> +Do not audit send and receive TCP network traffic on generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_send_generic_port" lineno="1208"> +<summary> +Send UDP network traffic on generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_generic_port" lineno="1226"> +<summary> +Receive UDP network traffic on generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_generic_port" lineno="1244"> +<summary> +Send and receive UDP network traffic on generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_generic_port" lineno="1259"> +<summary> +Bind TCP sockets to generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1279"> +<summary> +Do not audit bind TCP sockets to generic ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_generic_port" lineno="1297"> +<summary> +Bind UDP sockets to generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_generic_port" lineno="1317"> +<summary> +Connect TCP sockets to generic ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_all_ports" lineno="1361"> +<summary> +Send and receive TCP network traffic on all ports. +</summary> +<desc> +<p> +Send and receive TCP network traffic on all ports. +Related interfaces: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_tcp_sendrecv_generic_if()</li> +<li>corenet_tcp_sendrecv_generic_node()</li> +<li>corenet_tcp_connect_all_ports()</li> +<li>corenet_tcp_bind_all_ports()</li> +</ul> +<p> +Example client being able to connect to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:tcp_socket create_stream_socket_perms; +corenet_tcp_sendrecv_generic_if(myclient_t) +corenet_tcp_sendrecv_generic_node(myclient_t) +corenet_tcp_sendrecv_all_ports(myclient_t) +corenet_tcp_connect_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_all_ports" lineno="1379"> +<summary> +Send UDP network traffic on all ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_all_ports" lineno="1397"> +<summary> +Receive UDP network traffic on all ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_all_ports" lineno="1439"> +<summary> +Send and receive UDP network traffic on all ports. +</summary> +<desc> +<p> +Send and receive UDP network traffic on all ports. +Related interfaces: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_udp_sendrecv_generic_if()</li> +<li>corenet_udp_sendrecv_generic_node()</li> +<li>corenet_udp_bind_all_ports()</li> +</ul> +<p> +Example client being able to send to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:udp_socket create_socket_perms; +corenet_udp_sendrecv_generic_if(myclient_t) +corenet_udp_sendrecv_generic_node(myclient_t) +corenet_udp_sendrecv_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_tcp_bind_all_ports" lineno="1454"> +<summary> +Bind TCP sockets to all ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1473"> +<summary> +Do not audit attepts to bind TCP sockets to any ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_all_ports" lineno="1491"> +<summary> +Bind UDP sockets to all ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1510"> +<summary> +Do not audit attepts to bind UDP sockets to any ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_all_ports" lineno="1556"> +<summary> +Connect TCP sockets to all ports. +</summary> +<desc> +<p> +Connect TCP sockets to all ports +</p> +<p> +Related interfaces: +</p> +<ul> +<li>corenet_all_recvfrom_unlabeled()</li> +<li>corenet_tcp_sendrecv_generic_if()</li> +<li>corenet_tcp_sendrecv_generic_node()</li> +<li>corenet_tcp_sendrecv_all_ports()</li> +<li>corenet_tcp_bind_all_ports()</li> +</ul> +<p> +Example client being able to connect to all ports over +generic nodes, without labeled networking: +</p> +<p> +allow myclient_t self:tcp_socket create_stream_socket_perms; +corenet_tcp_sendrecv_generic_if(myclient_t) +corenet_tcp_sendrecv_generic_node(myclient_t) +corenet_tcp_sendrecv_all_ports(myclient_t) +corenet_tcp_connect_all_ports(myclient_t) +corenet_all_recvfrom_unlabeled(myclient_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="1"/> +</interface> +<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1575"> +<summary> +Do not audit attempts to connect TCP sockets +to all ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_reserved_port" lineno="1593"> +<summary> +Send and receive TCP network traffic on generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_send_reserved_port" lineno="1611"> +<summary> +Send UDP network traffic on generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_reserved_port" lineno="1629"> +<summary> +Receive UDP network traffic on generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_reserved_port" lineno="1647"> +<summary> +Send and receive UDP network traffic on generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_reserved_port" lineno="1662"> +<summary> +Bind TCP sockets to generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_reserved_port" lineno="1681"> +<summary> +Bind UDP sockets to generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_reserved_port" lineno="1700"> +<summary> +Connect TCP sockets to generic reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1718"> +<summary> +Send and receive TCP network traffic on all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_send_all_reserved_ports" lineno="1736"> +<summary> +Send UDP network traffic on all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_receive_all_reserved_ports" lineno="1754"> +<summary> +Receive UDP network traffic on all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1772"> +<summary> +Send and receive UDP network traffic on all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_all_reserved_ports" lineno="1787"> +<summary> +Bind TCP sockets to all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1806"> +<summary> +Do not audit attempts to bind TCP sockets to all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_all_reserved_ports" lineno="1824"> +<summary> +Bind UDP sockets to all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="1843"> +<summary> +Do not audit attempts to bind UDP sockets to all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="1861"> +<summary> +Bind TCP sockets to all ports > 1024. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_all_unreserved_ports" lineno="1879"> +<summary> +Bind UDP sockets to all ports > 1024. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_all_reserved_ports" lineno="1897"> +<summary> +Connect TCP sockets to reserved ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="1915"> +<summary> +Connect TCP sockets to all ports > 1024. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="1934"> +<summary> +Do not audit attempts to connect TCP sockets +all reserved ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_connect_all_rpc_ports" lineno="1952"> +<summary> +Connect TCP sockets to rpc ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="1971"> +<summary> +Do not audit attempts to connect TCP sockets +all rpc ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_rw_tun_tap_dev" lineno="1989"> +<summary> +Read and write the TUN/TAP virtual network device. +</summary> +<param name="domain"> +<summary> +The domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2009"> +<summary> +Do not audit attempts to read or write the TUN/TAP +virtual network device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_getattr_ppp_dev" lineno="2027"> +<summary> +Getattr the point-to-point device. +</summary> +<param name="domain"> +<summary> +The domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_rw_ppp_dev" lineno="2045"> +<summary> +Read and write the point-to-point device. +</summary> +<param name="domain"> +<summary> +The domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_bind_all_rpc_ports" lineno="2064"> +<summary> +Bind TCP sockets to all RPC ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2083"> +<summary> +Do not audit attempts to bind TCP sockets to all RPC ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_bind_all_rpc_ports" lineno="2101"> +<summary> +Bind UDP sockets to all RPC ports. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2120"> +<summary> +Do not audit attempts to bind UDP sockets to all RPC ports. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_non_ipsec_sendrecv" lineno="2151"> +<summary> +Send and receive messages on a +non-encrypted (no IPSEC) network +session. +</summary> +<desc> +<p> +Send and receive messages on a +non-encrypted (no IPSEC) network +session. (Deprecated) +</p> +<p> +The corenet_all_recvfrom_unlabeled() interface should be used instead +of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_non_ipsec_sendrecv" lineno="2179"> +<summary> +Do not audit attempts to send and receive +messages on a non-encrypted (no IPSEC) network +session. +</summary> +<desc> +<p> +Do not audit attempts to send and receive +messages on a non-encrypted (no IPSEC) network +session. +</p> +<p> +The corenet_dontaudit_all_recvfrom_unlabeled() interface should be +used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_recv_netlabel" lineno="2194"> +<summary> +Receive TCP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_recvfrom_netlabel" lineno="2209"> +<summary> +Receive TCP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_recvfrom_unlabeled" lineno="2228"> +<summary> +Receive TCP packets from an unlabled connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_recv_netlabel" lineno="2249"> +<summary> +Do not audit attempts to receive TCP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2265"> +<summary> +Do not audit attempts to receive TCP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2285"> +<summary> +Do not audit attempts to receive TCP packets from an unlabeled +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_udp_recv_netlabel" lineno="2305"> +<summary> +Receive UDP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_recvfrom_netlabel" lineno="2320"> +<summary> +Receive UDP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_udp_recvfrom_unlabeled" lineno="2339"> +<summary> +Receive UDP packets from an unlabeled connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_recv_netlabel" lineno="2360"> +<summary> +Do not audit attempts to receive UDP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2376"> +<summary> +Do not audit attempts to receive UDP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2396"> +<summary> +Do not audit attempts to receive UDP packets from an unlabeled +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_raw_recv_netlabel" lineno="2416"> +<summary> +Receive Raw IP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_recvfrom_netlabel" lineno="2431"> +<summary> +Receive Raw IP packets from a NetLabel connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_raw_recvfrom_unlabeled" lineno="2450"> +<summary> +Receive Raw IP packets from an unlabeled connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_raw_recv_netlabel" lineno="2471"> +<summary> +Do not audit attempts to receive Raw IP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2487"> +<summary> +Do not audit attempts to receive Raw IP packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2507"> +<summary> +Do not audit attempts to receive Raw IP packets from an unlabeled +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_all_recvfrom_unlabeled" lineno="2539"> +<summary> +Receive packets from an unlabeled connection. +</summary> +<desc> +<p> +Allow the specified domain to receive packets from an +unlabeled connection. On machines that do not utilize +labeled networking, this will be required on all +networking domains. On machines tha do utilize +labeled networking, this will be required for any +networking domain that is allowed to receive +network traffic that does not have a label. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_all_recvfrom_netlabel" lineno="2572"> +<summary> +Receive packets from a NetLabel connection. +</summary> +<desc> +<p> +Allow the specified domain to receive NetLabel +network traffic, which utilizes the Commercial IP +Security Option (CIPSO) to set the MLS level +of the network packets. This is required for +all networking domains that receive NetLabel +network traffic. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2591"> +<summary> +Do not audit attempts to receive packets from an unlabeled connection. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2614"> +<summary> +Do not audit attempts to receive packets from a NetLabel +connection. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="corenet_tcp_recvfrom_labeled" lineno="2646"> +<summary> +Rules for receiving labeled TCP packets. +</summary> +<desc> +<p> +Rules for receiving labeled TCP packets. +</p> +<p> +Due to the nature of TCP, this is bidirectional. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="peer_domain"> +<summary> +Peer domain. +</summary> +</param> +</interface> +<interface name="corenet_udp_recvfrom_labeled" lineno="2674"> +<summary> +Rules for receiving labeled UDP packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="peer_domain"> +<summary> +Peer domain. +</summary> +</param> +</interface> +<interface name="corenet_raw_recvfrom_labeled" lineno="2699"> +<summary> +Rules for receiving labeled raw IP packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="peer_domain"> +<summary> +Peer domain. +</summary> +</param> +</interface> +<interface name="corenet_all_recvfrom_labeled" lineno="2733"> +<summary> +Rules for receiving labeled packets via TCP, UDP and raw IP. +</summary> +<desc> +<p> +Rules for receiving labeled packets via TCP, UDP and raw IP. +</p> +<p> +Due to the nature of TCP, the rules (for TCP +networking only) are bidirectional. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="peer_domain"> +<summary> +Peer domain. +</summary> +</param> +</interface> +<interface name="corenet_setcontext_all_spds" lineno="2750"> +<summary> +Make the specified type usable +for labeled ipsec. +</summary> +<param name="domain"> +<summary> +Type to be used for labeled ipsec. +</summary> +</param> +</interface> +<interface name="corenet_send_generic_client_packets" lineno="2768"> +<summary> +Send generic client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_receive_generic_client_packets" lineno="2786"> +<summary> +Receive generic client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_generic_client_packets" lineno="2804"> +<summary> +Send and receive generic client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_relabelto_generic_client_packets" lineno="2819"> +<summary> +Relabel packets to the generic client packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_generic_server_packets" lineno="2837"> +<summary> +Send generic server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_receive_generic_server_packets" lineno="2855"> +<summary> +Receive generic server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_generic_server_packets" lineno="2873"> +<summary> +Send and receive generic server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_relabelto_generic_server_packets" lineno="2888"> +<summary> +Relabel packets to the generic server packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_unlabeled_packets" lineno="2913"> +<summary> +Send and receive unlabeled packets. +</summary> +<desc> +<p> +Send and receive unlabeled packets. +These packets do not match any netfilter +SECMARK rules. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_all_client_packets" lineno="2927"> +<summary> +Send all client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_receive_all_client_packets" lineno="2945"> +<summary> +Receive all client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_all_client_packets" lineno="2963"> +<summary> +Send and receive all client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_relabelto_all_client_packets" lineno="2978"> +<summary> +Relabel packets to any client packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_all_server_packets" lineno="2996"> +<summary> +Send all server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_receive_all_server_packets" lineno="3014"> +<summary> +Receive all server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_all_server_packets" lineno="3032"> +<summary> +Send and receive all server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_relabelto_all_server_packets" lineno="3047"> +<summary> +Relabel packets to any server packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_all_packets" lineno="3065"> +<summary> +Send all packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_receive_all_packets" lineno="3083"> +<summary> +Receive all packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_sendrecv_all_packets" lineno="3101"> +<summary> +Send and receive all packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_relabelto_all_packets" lineno="3116"> +<summary> +Relabel packets to any packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_unconfined" lineno="3134"> +<summary> +Unconfined access to network objects. +</summary> +<param name="domain"> +<summary> +The domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3154"> +<summary> +Send and receive TCP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_afs_bos_port" lineno="3173"> +<summary> +Send UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3192"> +<summary> +Do not audit attempts to send UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_afs_bos_port" lineno="3211"> +<summary> +Receive UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="3230"> +<summary> +Do not audit attempts to receive UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="3249"> +<summary> +Send and receive UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="3266"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_afs_bos_port" lineno="3282"> +<summary> +Bind TCP sockets to the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_afs_bos_port" lineno="3302"> +<summary> +Bind UDP sockets to the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_afs_bos_port" lineno="3321"> +<summary> +Make a TCP connection to the afs_bos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_bos_client_packets" lineno="3341"> +<summary> +Send afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="3360"> +<summary> +Do not audit attempts to send afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_bos_client_packets" lineno="3379"> +<summary> +Receive afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="3398"> +<summary> +Do not audit attempts to receive afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="3417"> +<summary> +Send and receive afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="3433"> +<summary> +Do not audit attempts to send and receive afs_bos_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_bos_client_packets" lineno="3448"> +<summary> +Relabel packets to afs_bos_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_bos_server_packets" lineno="3468"> +<summary> +Send afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="3487"> +<summary> +Do not audit attempts to send afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_bos_server_packets" lineno="3506"> +<summary> +Receive afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="3525"> +<summary> +Do not audit attempts to receive afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="3544"> +<summary> +Send and receive afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="3560"> +<summary> +Do not audit attempts to send and receive afs_bos_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_bos_server_packets" lineno="3575"> +<summary> +Relabel packets to afs_bos_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="3597"> +<summary> +Send and receive TCP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_afs_fs_port" lineno="3616"> +<summary> +Send UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="3635"> +<summary> +Do not audit attempts to send UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_afs_fs_port" lineno="3654"> +<summary> +Receive UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="3673"> +<summary> +Do not audit attempts to receive UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="3692"> +<summary> +Send and receive UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="3709"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_afs_fs_port" lineno="3725"> +<summary> +Bind TCP sockets to the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_afs_fs_port" lineno="3745"> +<summary> +Bind UDP sockets to the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_afs_fs_port" lineno="3764"> +<summary> +Make a TCP connection to the afs_fs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_fs_client_packets" lineno="3784"> +<summary> +Send afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="3803"> +<summary> +Do not audit attempts to send afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_fs_client_packets" lineno="3822"> +<summary> +Receive afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="3841"> +<summary> +Do not audit attempts to receive afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="3860"> +<summary> +Send and receive afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="3876"> +<summary> +Do not audit attempts to send and receive afs_fs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_fs_client_packets" lineno="3891"> +<summary> +Relabel packets to afs_fs_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_fs_server_packets" lineno="3911"> +<summary> +Send afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="3930"> +<summary> +Do not audit attempts to send afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_fs_server_packets" lineno="3949"> +<summary> +Receive afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="3968"> +<summary> +Do not audit attempts to receive afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="3987"> +<summary> +Send and receive afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4003"> +<summary> +Do not audit attempts to send and receive afs_fs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_fs_server_packets" lineno="4018"> +<summary> +Relabel packets to afs_fs_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4040"> +<summary> +Send and receive TCP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_afs_ka_port" lineno="4059"> +<summary> +Send UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4078"> +<summary> +Do not audit attempts to send UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_afs_ka_port" lineno="4097"> +<summary> +Receive UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4116"> +<summary> +Do not audit attempts to receive UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4135"> +<summary> +Send and receive UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4152"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_afs_ka_port" lineno="4168"> +<summary> +Bind TCP sockets to the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_afs_ka_port" lineno="4188"> +<summary> +Bind UDP sockets to the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_afs_ka_port" lineno="4207"> +<summary> +Make a TCP connection to the afs_ka port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_ka_client_packets" lineno="4227"> +<summary> +Send afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4246"> +<summary> +Do not audit attempts to send afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_ka_client_packets" lineno="4265"> +<summary> +Receive afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="4284"> +<summary> +Do not audit attempts to receive afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="4303"> +<summary> +Send and receive afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="4319"> +<summary> +Do not audit attempts to send and receive afs_ka_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_ka_client_packets" lineno="4334"> +<summary> +Relabel packets to afs_ka_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_ka_server_packets" lineno="4354"> +<summary> +Send afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="4373"> +<summary> +Do not audit attempts to send afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_ka_server_packets" lineno="4392"> +<summary> +Receive afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="4411"> +<summary> +Do not audit attempts to receive afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="4430"> +<summary> +Send and receive afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="4446"> +<summary> +Do not audit attempts to send and receive afs_ka_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_ka_server_packets" lineno="4461"> +<summary> +Relabel packets to afs_ka_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="4483"> +<summary> +Send and receive TCP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_afs_pt_port" lineno="4502"> +<summary> +Send UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="4521"> +<summary> +Do not audit attempts to send UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_afs_pt_port" lineno="4540"> +<summary> +Receive UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="4559"> +<summary> +Do not audit attempts to receive UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="4578"> +<summary> +Send and receive UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="4595"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_afs_pt_port" lineno="4611"> +<summary> +Bind TCP sockets to the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_afs_pt_port" lineno="4631"> +<summary> +Bind UDP sockets to the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_afs_pt_port" lineno="4650"> +<summary> +Make a TCP connection to the afs_pt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_pt_client_packets" lineno="4670"> +<summary> +Send afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="4689"> +<summary> +Do not audit attempts to send afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_pt_client_packets" lineno="4708"> +<summary> +Receive afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="4727"> +<summary> +Do not audit attempts to receive afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="4746"> +<summary> +Send and receive afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="4762"> +<summary> +Do not audit attempts to send and receive afs_pt_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_pt_client_packets" lineno="4777"> +<summary> +Relabel packets to afs_pt_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_pt_server_packets" lineno="4797"> +<summary> +Send afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="4816"> +<summary> +Do not audit attempts to send afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_pt_server_packets" lineno="4835"> +<summary> +Receive afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="4854"> +<summary> +Do not audit attempts to receive afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="4873"> +<summary> +Send and receive afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="4889"> +<summary> +Do not audit attempts to send and receive afs_pt_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_pt_server_packets" lineno="4904"> +<summary> +Relabel packets to afs_pt_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="4926"> +<summary> +Send and receive TCP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_afs_vl_port" lineno="4945"> +<summary> +Send UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="4964"> +<summary> +Do not audit attempts to send UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_afs_vl_port" lineno="4983"> +<summary> +Receive UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5002"> +<summary> +Do not audit attempts to receive UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5021"> +<summary> +Send and receive UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5038"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_afs_vl_port" lineno="5054"> +<summary> +Bind TCP sockets to the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_afs_vl_port" lineno="5074"> +<summary> +Bind UDP sockets to the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_afs_vl_port" lineno="5093"> +<summary> +Make a TCP connection to the afs_vl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_vl_client_packets" lineno="5113"> +<summary> +Send afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5132"> +<summary> +Do not audit attempts to send afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_vl_client_packets" lineno="5151"> +<summary> +Receive afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5170"> +<summary> +Do not audit attempts to receive afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5189"> +<summary> +Send and receive afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5205"> +<summary> +Do not audit attempts to send and receive afs_vl_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_vl_client_packets" lineno="5220"> +<summary> +Relabel packets to afs_vl_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_afs_vl_server_packets" lineno="5240"> +<summary> +Send afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5259"> +<summary> +Do not audit attempts to send afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_afs_vl_server_packets" lineno="5278"> +<summary> +Receive afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5297"> +<summary> +Do not audit attempts to receive afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="5316"> +<summary> +Send and receive afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="5332"> +<summary> +Do not audit attempts to send and receive afs_vl_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_afs_vl_server_packets" lineno="5347"> +<summary> +Relabel packets to afs_vl_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_agentx_port" lineno="5369"> +<summary> +Send and receive TCP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_agentx_port" lineno="5388"> +<summary> +Send UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="5407"> +<summary> +Do not audit attempts to send UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_agentx_port" lineno="5426"> +<summary> +Receive UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="5445"> +<summary> +Do not audit attempts to receive UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_agentx_port" lineno="5464"> +<summary> +Send and receive UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="5481"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the agentx port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_agentx_port" lineno="5497"> +<summary> +Bind TCP sockets to the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_agentx_port" lineno="5517"> +<summary> +Bind UDP sockets to the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_agentx_port" lineno="5536"> +<summary> +Make a TCP connection to the agentx port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_agentx_client_packets" lineno="5556"> +<summary> +Send agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="5575"> +<summary> +Do not audit attempts to send agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_agentx_client_packets" lineno="5594"> +<summary> +Receive agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="5613"> +<summary> +Do not audit attempts to receive agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_agentx_client_packets" lineno="5632"> +<summary> +Send and receive agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="5648"> +<summary> +Do not audit attempts to send and receive agentx_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_agentx_client_packets" lineno="5663"> +<summary> +Relabel packets to agentx_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_agentx_server_packets" lineno="5683"> +<summary> +Send agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="5702"> +<summary> +Do not audit attempts to send agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_agentx_server_packets" lineno="5721"> +<summary> +Receive agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="5740"> +<summary> +Do not audit attempts to receive agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_agentx_server_packets" lineno="5759"> +<summary> +Send and receive agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="5775"> +<summary> +Do not audit attempts to send and receive agentx_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_agentx_server_packets" lineno="5790"> +<summary> +Relabel packets to agentx_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_amanda_port" lineno="5812"> +<summary> +Send and receive TCP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_amanda_port" lineno="5831"> +<summary> +Send UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="5850"> +<summary> +Do not audit attempts to send UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_amanda_port" lineno="5869"> +<summary> +Receive UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="5888"> +<summary> +Do not audit attempts to receive UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_amanda_port" lineno="5907"> +<summary> +Send and receive UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="5924"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the amanda port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_amanda_port" lineno="5940"> +<summary> +Bind TCP sockets to the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_amanda_port" lineno="5960"> +<summary> +Bind UDP sockets to the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_amanda_port" lineno="5979"> +<summary> +Make a TCP connection to the amanda port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amanda_client_packets" lineno="5999"> +<summary> +Send amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="6018"> +<summary> +Do not audit attempts to send amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amanda_client_packets" lineno="6037"> +<summary> +Receive amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="6056"> +<summary> +Do not audit attempts to receive amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amanda_client_packets" lineno="6075"> +<summary> +Send and receive amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="6091"> +<summary> +Do not audit attempts to send and receive amanda_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amanda_client_packets" lineno="6106"> +<summary> +Relabel packets to amanda_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amanda_server_packets" lineno="6126"> +<summary> +Send amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="6145"> +<summary> +Do not audit attempts to send amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amanda_server_packets" lineno="6164"> +<summary> +Receive amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="6183"> +<summary> +Do not audit attempts to receive amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amanda_server_packets" lineno="6202"> +<summary> +Send and receive amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="6218"> +<summary> +Do not audit attempts to send and receive amanda_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amanda_server_packets" lineno="6233"> +<summary> +Relabel packets to amanda_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="6255"> +<summary> +Send and receive TCP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_amavisd_recv_port" lineno="6274"> +<summary> +Send UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="6293"> +<summary> +Do not audit attempts to send UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_amavisd_recv_port" lineno="6312"> +<summary> +Receive UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="6331"> +<summary> +Do not audit attempts to receive UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="6350"> +<summary> +Send and receive UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="6367"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="6383"> +<summary> +Bind TCP sockets to the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_amavisd_recv_port" lineno="6403"> +<summary> +Bind UDP sockets to the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="6422"> +<summary> +Make a TCP connection to the amavisd_recv port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amavisd_recv_client_packets" lineno="6442"> +<summary> +Send amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="6461"> +<summary> +Do not audit attempts to send amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amavisd_recv_client_packets" lineno="6480"> +<summary> +Receive amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="6499"> +<summary> +Do not audit attempts to receive amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="6518"> +<summary> +Send and receive amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="6534"> +<summary> +Do not audit attempts to send and receive amavisd_recv_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="6549"> +<summary> +Relabel packets to amavisd_recv_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amavisd_recv_server_packets" lineno="6569"> +<summary> +Send amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="6588"> +<summary> +Do not audit attempts to send amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amavisd_recv_server_packets" lineno="6607"> +<summary> +Receive amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="6626"> +<summary> +Do not audit attempts to receive amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="6645"> +<summary> +Send and receive amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="6661"> +<summary> +Do not audit attempts to send and receive amavisd_recv_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="6676"> +<summary> +Relabel packets to amavisd_recv_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="6698"> +<summary> +Send and receive TCP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_amavisd_send_port" lineno="6717"> +<summary> +Send UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="6736"> +<summary> +Do not audit attempts to send UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_amavisd_send_port" lineno="6755"> +<summary> +Receive UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="6774"> +<summary> +Do not audit attempts to receive UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="6793"> +<summary> +Send and receive UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="6810"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_amavisd_send_port" lineno="6826"> +<summary> +Bind TCP sockets to the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_amavisd_send_port" lineno="6846"> +<summary> +Bind UDP sockets to the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_amavisd_send_port" lineno="6865"> +<summary> +Make a TCP connection to the amavisd_send port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amavisd_send_client_packets" lineno="6885"> +<summary> +Send amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="6904"> +<summary> +Do not audit attempts to send amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amavisd_send_client_packets" lineno="6923"> +<summary> +Receive amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="6942"> +<summary> +Do not audit attempts to receive amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="6961"> +<summary> +Send and receive amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="6977"> +<summary> +Do not audit attempts to send and receive amavisd_send_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="6992"> +<summary> +Relabel packets to amavisd_send_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amavisd_send_server_packets" lineno="7012"> +<summary> +Send amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="7031"> +<summary> +Do not audit attempts to send amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amavisd_send_server_packets" lineno="7050"> +<summary> +Receive amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="7069"> +<summary> +Do not audit attempts to receive amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="7088"> +<summary> +Send and receive amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="7104"> +<summary> +Do not audit attempts to send and receive amavisd_send_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="7119"> +<summary> +Relabel packets to amavisd_send_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_amqp_port" lineno="7141"> +<summary> +Send and receive TCP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_amqp_port" lineno="7160"> +<summary> +Send UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="7179"> +<summary> +Do not audit attempts to send UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_amqp_port" lineno="7198"> +<summary> +Receive UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="7217"> +<summary> +Do not audit attempts to receive UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_amqp_port" lineno="7236"> +<summary> +Send and receive UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="7253"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the amqp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_amqp_port" lineno="7269"> +<summary> +Bind TCP sockets to the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_amqp_port" lineno="7289"> +<summary> +Bind UDP sockets to the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_amqp_port" lineno="7308"> +<summary> +Make a TCP connection to the amqp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amqp_client_packets" lineno="7328"> +<summary> +Send amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="7347"> +<summary> +Do not audit attempts to send amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amqp_client_packets" lineno="7366"> +<summary> +Receive amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="7385"> +<summary> +Do not audit attempts to receive amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amqp_client_packets" lineno="7404"> +<summary> +Send and receive amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="7420"> +<summary> +Do not audit attempts to send and receive amqp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amqp_client_packets" lineno="7435"> +<summary> +Relabel packets to amqp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_amqp_server_packets" lineno="7455"> +<summary> +Send amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="7474"> +<summary> +Do not audit attempts to send amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_amqp_server_packets" lineno="7493"> +<summary> +Receive amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="7512"> +<summary> +Do not audit attempts to receive amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_amqp_server_packets" lineno="7531"> +<summary> +Send and receive amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="7547"> +<summary> +Do not audit attempts to send and receive amqp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_amqp_server_packets" lineno="7562"> +<summary> +Relabel packets to amqp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_aol_port" lineno="7584"> +<summary> +Send and receive TCP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_aol_port" lineno="7603"> +<summary> +Send UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_aol_port" lineno="7622"> +<summary> +Do not audit attempts to send UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_aol_port" lineno="7641"> +<summary> +Receive UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="7660"> +<summary> +Do not audit attempts to receive UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_aol_port" lineno="7679"> +<summary> +Send and receive UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="7696"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the aol port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_aol_port" lineno="7712"> +<summary> +Bind TCP sockets to the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_aol_port" lineno="7732"> +<summary> +Bind UDP sockets to the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_aol_port" lineno="7751"> +<summary> +Make a TCP connection to the aol port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_aol_client_packets" lineno="7771"> +<summary> +Send aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_aol_client_packets" lineno="7790"> +<summary> +Do not audit attempts to send aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_aol_client_packets" lineno="7809"> +<summary> +Receive aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="7828"> +<summary> +Do not audit attempts to receive aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_aol_client_packets" lineno="7847"> +<summary> +Send and receive aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="7863"> +<summary> +Do not audit attempts to send and receive aol_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_aol_client_packets" lineno="7878"> +<summary> +Relabel packets to aol_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_aol_server_packets" lineno="7898"> +<summary> +Send aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_aol_server_packets" lineno="7917"> +<summary> +Do not audit attempts to send aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_aol_server_packets" lineno="7936"> +<summary> +Receive aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="7955"> +<summary> +Do not audit attempts to receive aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_aol_server_packets" lineno="7974"> +<summary> +Send and receive aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="7990"> +<summary> +Do not audit attempts to send and receive aol_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_aol_server_packets" lineno="8005"> +<summary> +Relabel packets to aol_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="8027"> +<summary> +Send and receive TCP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_apcupsd_port" lineno="8046"> +<summary> +Send UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="8065"> +<summary> +Do not audit attempts to send UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_apcupsd_port" lineno="8084"> +<summary> +Receive UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="8103"> +<summary> +Do not audit attempts to receive UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="8122"> +<summary> +Send and receive UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="8139"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_apcupsd_port" lineno="8155"> +<summary> +Bind TCP sockets to the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_apcupsd_port" lineno="8175"> +<summary> +Bind UDP sockets to the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_apcupsd_port" lineno="8194"> +<summary> +Make a TCP connection to the apcupsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_apcupsd_client_packets" lineno="8214"> +<summary> +Send apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="8233"> +<summary> +Do not audit attempts to send apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_apcupsd_client_packets" lineno="8252"> +<summary> +Receive apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="8271"> +<summary> +Do not audit attempts to receive apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="8290"> +<summary> +Send and receive apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="8306"> +<summary> +Do not audit attempts to send and receive apcupsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_apcupsd_client_packets" lineno="8321"> +<summary> +Relabel packets to apcupsd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_apcupsd_server_packets" lineno="8341"> +<summary> +Send apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="8360"> +<summary> +Do not audit attempts to send apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_apcupsd_server_packets" lineno="8379"> +<summary> +Receive apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="8398"> +<summary> +Do not audit attempts to receive apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="8417"> +<summary> +Send and receive apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="8433"> +<summary> +Do not audit attempts to send and receive apcupsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_apcupsd_server_packets" lineno="8448"> +<summary> +Relabel packets to apcupsd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="8470"> +<summary> +Send and receive TCP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_asterisk_port" lineno="8489"> +<summary> +Send UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="8508"> +<summary> +Do not audit attempts to send UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_asterisk_port" lineno="8527"> +<summary> +Receive UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="8546"> +<summary> +Do not audit attempts to receive UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_asterisk_port" lineno="8565"> +<summary> +Send and receive UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="8582"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_asterisk_port" lineno="8598"> +<summary> +Bind TCP sockets to the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_asterisk_port" lineno="8618"> +<summary> +Bind UDP sockets to the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_asterisk_port" lineno="8637"> +<summary> +Make a TCP connection to the asterisk port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_asterisk_client_packets" lineno="8657"> +<summary> +Send asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="8676"> +<summary> +Do not audit attempts to send asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_asterisk_client_packets" lineno="8695"> +<summary> +Receive asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="8714"> +<summary> +Do not audit attempts to receive asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_asterisk_client_packets" lineno="8733"> +<summary> +Send and receive asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="8749"> +<summary> +Do not audit attempts to send and receive asterisk_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_asterisk_client_packets" lineno="8764"> +<summary> +Relabel packets to asterisk_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_asterisk_server_packets" lineno="8784"> +<summary> +Send asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="8803"> +<summary> +Do not audit attempts to send asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_asterisk_server_packets" lineno="8822"> +<summary> +Receive asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="8841"> +<summary> +Do not audit attempts to receive asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_asterisk_server_packets" lineno="8860"> +<summary> +Send and receive asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="8876"> +<summary> +Do not audit attempts to send and receive asterisk_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_asterisk_server_packets" lineno="8891"> +<summary> +Relabel packets to asterisk_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_audit_port" lineno="8913"> +<summary> +Send and receive TCP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_audit_port" lineno="8932"> +<summary> +Send UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_audit_port" lineno="8951"> +<summary> +Do not audit attempts to send UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_audit_port" lineno="8970"> +<summary> +Receive UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="8989"> +<summary> +Do not audit attempts to receive UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_audit_port" lineno="9008"> +<summary> +Send and receive UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="9025"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the audit port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_audit_port" lineno="9041"> +<summary> +Bind TCP sockets to the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_audit_port" lineno="9061"> +<summary> +Bind UDP sockets to the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_audit_port" lineno="9080"> +<summary> +Make a TCP connection to the audit port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_audit_client_packets" lineno="9100"> +<summary> +Send audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_audit_client_packets" lineno="9119"> +<summary> +Do not audit attempts to send audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_audit_client_packets" lineno="9138"> +<summary> +Receive audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="9157"> +<summary> +Do not audit attempts to receive audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_audit_client_packets" lineno="9176"> +<summary> +Send and receive audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="9192"> +<summary> +Do not audit attempts to send and receive audit_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_audit_client_packets" lineno="9207"> +<summary> +Relabel packets to audit_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_audit_server_packets" lineno="9227"> +<summary> +Send audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_audit_server_packets" lineno="9246"> +<summary> +Do not audit attempts to send audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_audit_server_packets" lineno="9265"> +<summary> +Receive audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="9284"> +<summary> +Do not audit attempts to receive audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_audit_server_packets" lineno="9303"> +<summary> +Send and receive audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="9319"> +<summary> +Do not audit attempts to send and receive audit_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_audit_server_packets" lineno="9334"> +<summary> +Relabel packets to audit_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_auth_port" lineno="9356"> +<summary> +Send and receive TCP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_auth_port" lineno="9375"> +<summary> +Send UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_auth_port" lineno="9394"> +<summary> +Do not audit attempts to send UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_auth_port" lineno="9413"> +<summary> +Receive UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="9432"> +<summary> +Do not audit attempts to receive UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_auth_port" lineno="9451"> +<summary> +Send and receive UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="9468"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the auth port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_auth_port" lineno="9484"> +<summary> +Bind TCP sockets to the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_auth_port" lineno="9504"> +<summary> +Bind UDP sockets to the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_auth_port" lineno="9523"> +<summary> +Make a TCP connection to the auth port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_auth_client_packets" lineno="9543"> +<summary> +Send auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_auth_client_packets" lineno="9562"> +<summary> +Do not audit attempts to send auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_auth_client_packets" lineno="9581"> +<summary> +Receive auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="9600"> +<summary> +Do not audit attempts to receive auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_auth_client_packets" lineno="9619"> +<summary> +Send and receive auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="9635"> +<summary> +Do not audit attempts to send and receive auth_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_auth_client_packets" lineno="9650"> +<summary> +Relabel packets to auth_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_auth_server_packets" lineno="9670"> +<summary> +Send auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_auth_server_packets" lineno="9689"> +<summary> +Do not audit attempts to send auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_auth_server_packets" lineno="9708"> +<summary> +Receive auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="9727"> +<summary> +Do not audit attempts to receive auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_auth_server_packets" lineno="9746"> +<summary> +Send and receive auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="9762"> +<summary> +Do not audit attempts to send and receive auth_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_auth_server_packets" lineno="9777"> +<summary> +Relabel packets to auth_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_bgp_port" lineno="9799"> +<summary> +Send and receive TCP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_bgp_port" lineno="9818"> +<summary> +Send UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="9837"> +<summary> +Do not audit attempts to send UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_bgp_port" lineno="9856"> +<summary> +Receive UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="9875"> +<summary> +Do not audit attempts to receive UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_bgp_port" lineno="9894"> +<summary> +Send and receive UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="9911"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the bgp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_bgp_port" lineno="9927"> +<summary> +Bind TCP sockets to the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_bgp_port" lineno="9947"> +<summary> +Bind UDP sockets to the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_bgp_port" lineno="9966"> +<summary> +Make a TCP connection to the bgp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_bgp_client_packets" lineno="9986"> +<summary> +Send bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="10005"> +<summary> +Do not audit attempts to send bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_bgp_client_packets" lineno="10024"> +<summary> +Receive bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="10043"> +<summary> +Do not audit attempts to receive bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_bgp_client_packets" lineno="10062"> +<summary> +Send and receive bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="10078"> +<summary> +Do not audit attempts to send and receive bgp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_bgp_client_packets" lineno="10093"> +<summary> +Relabel packets to bgp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_bgp_server_packets" lineno="10113"> +<summary> +Send bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="10132"> +<summary> +Do not audit attempts to send bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_bgp_server_packets" lineno="10151"> +<summary> +Receive bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="10170"> +<summary> +Do not audit attempts to receive bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_bgp_server_packets" lineno="10189"> +<summary> +Send and receive bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="10205"> +<summary> +Do not audit attempts to send and receive bgp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_bgp_server_packets" lineno="10220"> +<summary> +Relabel packets to bgp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_boinc_port" lineno="10242"> +<summary> +Send and receive TCP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_boinc_port" lineno="10261"> +<summary> +Send UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="10280"> +<summary> +Do not audit attempts to send UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_boinc_port" lineno="10299"> +<summary> +Receive UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="10318"> +<summary> +Do not audit attempts to receive UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_boinc_port" lineno="10337"> +<summary> +Send and receive UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="10354"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the boinc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_boinc_port" lineno="10370"> +<summary> +Bind TCP sockets to the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_boinc_port" lineno="10390"> +<summary> +Bind UDP sockets to the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_boinc_port" lineno="10409"> +<summary> +Make a TCP connection to the boinc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_boinc_client_packets" lineno="10429"> +<summary> +Send boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="10448"> +<summary> +Do not audit attempts to send boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_boinc_client_packets" lineno="10467"> +<summary> +Receive boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="10486"> +<summary> +Do not audit attempts to receive boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_boinc_client_packets" lineno="10505"> +<summary> +Send and receive boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="10521"> +<summary> +Do not audit attempts to send and receive boinc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_boinc_client_packets" lineno="10536"> +<summary> +Relabel packets to boinc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_boinc_server_packets" lineno="10556"> +<summary> +Send boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="10575"> +<summary> +Do not audit attempts to send boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_boinc_server_packets" lineno="10594"> +<summary> +Receive boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="10613"> +<summary> +Do not audit attempts to receive boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_boinc_server_packets" lineno="10632"> +<summary> +Send and receive boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="10648"> +<summary> +Do not audit attempts to send and receive boinc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_boinc_server_packets" lineno="10663"> +<summary> +Relabel packets to boinc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_biff_port" lineno="10685"> +<summary> +Send and receive TCP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_biff_port" lineno="10704"> +<summary> +Send UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_biff_port" lineno="10723"> +<summary> +Do not audit attempts to send UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_biff_port" lineno="10742"> +<summary> +Receive UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="10761"> +<summary> +Do not audit attempts to receive UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_biff_port" lineno="10780"> +<summary> +Send and receive UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="10797"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the biff port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_biff_port" lineno="10813"> +<summary> +Bind TCP sockets to the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_biff_port" lineno="10833"> +<summary> +Bind UDP sockets to the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_biff_port" lineno="10852"> +<summary> +Make a TCP connection to the biff port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_biff_client_packets" lineno="10872"> +<summary> +Send biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_biff_client_packets" lineno="10891"> +<summary> +Do not audit attempts to send biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_biff_client_packets" lineno="10910"> +<summary> +Receive biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="10929"> +<summary> +Do not audit attempts to receive biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_biff_client_packets" lineno="10948"> +<summary> +Send and receive biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="10964"> +<summary> +Do not audit attempts to send and receive biff_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_biff_client_packets" lineno="10979"> +<summary> +Relabel packets to biff_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_biff_server_packets" lineno="10999"> +<summary> +Send biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_biff_server_packets" lineno="11018"> +<summary> +Do not audit attempts to send biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_biff_server_packets" lineno="11037"> +<summary> +Receive biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="11056"> +<summary> +Do not audit attempts to receive biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_biff_server_packets" lineno="11075"> +<summary> +Send and receive biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="11091"> +<summary> +Do not audit attempts to send and receive biff_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_biff_server_packets" lineno="11106"> +<summary> +Relabel packets to biff_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="11128"> +<summary> +Send and receive TCP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_certmaster_port" lineno="11147"> +<summary> +Send UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="11166"> +<summary> +Do not audit attempts to send UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_certmaster_port" lineno="11185"> +<summary> +Receive UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="11204"> +<summary> +Do not audit attempts to receive UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_certmaster_port" lineno="11223"> +<summary> +Send and receive UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="11240"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_certmaster_port" lineno="11256"> +<summary> +Bind TCP sockets to the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_certmaster_port" lineno="11276"> +<summary> +Bind UDP sockets to the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_certmaster_port" lineno="11295"> +<summary> +Make a TCP connection to the certmaster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_certmaster_client_packets" lineno="11315"> +<summary> +Send certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="11334"> +<summary> +Do not audit attempts to send certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_certmaster_client_packets" lineno="11353"> +<summary> +Receive certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="11372"> +<summary> +Do not audit attempts to receive certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_certmaster_client_packets" lineno="11391"> +<summary> +Send and receive certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="11407"> +<summary> +Do not audit attempts to send and receive certmaster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_certmaster_client_packets" lineno="11422"> +<summary> +Relabel packets to certmaster_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_certmaster_server_packets" lineno="11442"> +<summary> +Send certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="11461"> +<summary> +Do not audit attempts to send certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_certmaster_server_packets" lineno="11480"> +<summary> +Receive certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="11499"> +<summary> +Do not audit attempts to receive certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_certmaster_server_packets" lineno="11518"> +<summary> +Send and receive certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="11534"> +<summary> +Do not audit attempts to send and receive certmaster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_certmaster_server_packets" lineno="11549"> +<summary> +Relabel packets to certmaster_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="11571"> +<summary> +Send and receive TCP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_chronyd_port" lineno="11590"> +<summary> +Send UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="11609"> +<summary> +Do not audit attempts to send UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_chronyd_port" lineno="11628"> +<summary> +Receive UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="11647"> +<summary> +Do not audit attempts to receive UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_chronyd_port" lineno="11666"> +<summary> +Send and receive UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="11683"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_chronyd_port" lineno="11699"> +<summary> +Bind TCP sockets to the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_chronyd_port" lineno="11719"> +<summary> +Bind UDP sockets to the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_chronyd_port" lineno="11738"> +<summary> +Make a TCP connection to the chronyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_chronyd_client_packets" lineno="11758"> +<summary> +Send chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="11777"> +<summary> +Do not audit attempts to send chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_chronyd_client_packets" lineno="11796"> +<summary> +Receive chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="11815"> +<summary> +Do not audit attempts to receive chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_chronyd_client_packets" lineno="11834"> +<summary> +Send and receive chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="11850"> +<summary> +Do not audit attempts to send and receive chronyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_chronyd_client_packets" lineno="11865"> +<summary> +Relabel packets to chronyd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_chronyd_server_packets" lineno="11885"> +<summary> +Send chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="11904"> +<summary> +Do not audit attempts to send chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_chronyd_server_packets" lineno="11923"> +<summary> +Receive chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="11942"> +<summary> +Do not audit attempts to receive chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_chronyd_server_packets" lineno="11961"> +<summary> +Send and receive chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="11977"> +<summary> +Do not audit attempts to send and receive chronyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_chronyd_server_packets" lineno="11992"> +<summary> +Relabel packets to chronyd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_clamd_port" lineno="12014"> +<summary> +Send and receive TCP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_clamd_port" lineno="12033"> +<summary> +Send UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="12052"> +<summary> +Do not audit attempts to send UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_clamd_port" lineno="12071"> +<summary> +Receive UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="12090"> +<summary> +Do not audit attempts to receive UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_clamd_port" lineno="12109"> +<summary> +Send and receive UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="12126"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the clamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_clamd_port" lineno="12142"> +<summary> +Bind TCP sockets to the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_clamd_port" lineno="12162"> +<summary> +Bind UDP sockets to the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_clamd_port" lineno="12181"> +<summary> +Make a TCP connection to the clamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_clamd_client_packets" lineno="12201"> +<summary> +Send clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="12220"> +<summary> +Do not audit attempts to send clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_clamd_client_packets" lineno="12239"> +<summary> +Receive clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="12258"> +<summary> +Do not audit attempts to receive clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_clamd_client_packets" lineno="12277"> +<summary> +Send and receive clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="12293"> +<summary> +Do not audit attempts to send and receive clamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_clamd_client_packets" lineno="12308"> +<summary> +Relabel packets to clamd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_clamd_server_packets" lineno="12328"> +<summary> +Send clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="12347"> +<summary> +Do not audit attempts to send clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_clamd_server_packets" lineno="12366"> +<summary> +Receive clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="12385"> +<summary> +Do not audit attempts to receive clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_clamd_server_packets" lineno="12404"> +<summary> +Send and receive clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="12420"> +<summary> +Do not audit attempts to send and receive clamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_clamd_server_packets" lineno="12435"> +<summary> +Relabel packets to clamd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="12457"> +<summary> +Send and receive TCP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_clockspeed_port" lineno="12476"> +<summary> +Send UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="12495"> +<summary> +Do not audit attempts to send UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_clockspeed_port" lineno="12514"> +<summary> +Receive UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="12533"> +<summary> +Do not audit attempts to receive UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="12552"> +<summary> +Send and receive UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="12569"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_clockspeed_port" lineno="12585"> +<summary> +Bind TCP sockets to the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_clockspeed_port" lineno="12605"> +<summary> +Bind UDP sockets to the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_clockspeed_port" lineno="12624"> +<summary> +Make a TCP connection to the clockspeed port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_clockspeed_client_packets" lineno="12644"> +<summary> +Send clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="12663"> +<summary> +Do not audit attempts to send clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_clockspeed_client_packets" lineno="12682"> +<summary> +Receive clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="12701"> +<summary> +Do not audit attempts to receive clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="12720"> +<summary> +Send and receive clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="12736"> +<summary> +Do not audit attempts to send and receive clockspeed_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_clockspeed_client_packets" lineno="12751"> +<summary> +Relabel packets to clockspeed_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_clockspeed_server_packets" lineno="12771"> +<summary> +Send clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="12790"> +<summary> +Do not audit attempts to send clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_clockspeed_server_packets" lineno="12809"> +<summary> +Receive clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="12828"> +<summary> +Do not audit attempts to receive clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="12847"> +<summary> +Send and receive clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="12863"> +<summary> +Do not audit attempts to send and receive clockspeed_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_clockspeed_server_packets" lineno="12878"> +<summary> +Relabel packets to clockspeed_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_cluster_port" lineno="12900"> +<summary> +Send and receive TCP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_cluster_port" lineno="12919"> +<summary> +Send UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="12938"> +<summary> +Do not audit attempts to send UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_cluster_port" lineno="12957"> +<summary> +Receive UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="12976"> +<summary> +Do not audit attempts to receive UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_cluster_port" lineno="12995"> +<summary> +Send and receive UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="13012"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the cluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_cluster_port" lineno="13028"> +<summary> +Bind TCP sockets to the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_cluster_port" lineno="13048"> +<summary> +Bind UDP sockets to the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_cluster_port" lineno="13067"> +<summary> +Make a TCP connection to the cluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cluster_client_packets" lineno="13087"> +<summary> +Send cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="13106"> +<summary> +Do not audit attempts to send cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cluster_client_packets" lineno="13125"> +<summary> +Receive cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="13144"> +<summary> +Do not audit attempts to receive cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cluster_client_packets" lineno="13163"> +<summary> +Send and receive cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="13179"> +<summary> +Do not audit attempts to send and receive cluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cluster_client_packets" lineno="13194"> +<summary> +Relabel packets to cluster_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cluster_server_packets" lineno="13214"> +<summary> +Send cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="13233"> +<summary> +Do not audit attempts to send cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cluster_server_packets" lineno="13252"> +<summary> +Receive cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="13271"> +<summary> +Do not audit attempts to receive cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cluster_server_packets" lineno="13290"> +<summary> +Send and receive cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="13306"> +<summary> +Do not audit attempts to send and receive cluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cluster_server_packets" lineno="13321"> +<summary> +Relabel packets to cluster_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="13343"> +<summary> +Send and receive TCP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_cobbler_port" lineno="13362"> +<summary> +Send UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="13381"> +<summary> +Do not audit attempts to send UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_cobbler_port" lineno="13400"> +<summary> +Receive UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="13419"> +<summary> +Do not audit attempts to receive UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_cobbler_port" lineno="13438"> +<summary> +Send and receive UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="13455"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_cobbler_port" lineno="13471"> +<summary> +Bind TCP sockets to the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_cobbler_port" lineno="13491"> +<summary> +Bind UDP sockets to the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_cobbler_port" lineno="13510"> +<summary> +Make a TCP connection to the cobbler port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cobbler_client_packets" lineno="13530"> +<summary> +Send cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="13549"> +<summary> +Do not audit attempts to send cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cobbler_client_packets" lineno="13568"> +<summary> +Receive cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="13587"> +<summary> +Do not audit attempts to receive cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cobbler_client_packets" lineno="13606"> +<summary> +Send and receive cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="13622"> +<summary> +Do not audit attempts to send and receive cobbler_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cobbler_client_packets" lineno="13637"> +<summary> +Relabel packets to cobbler_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cobbler_server_packets" lineno="13657"> +<summary> +Send cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="13676"> +<summary> +Do not audit attempts to send cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cobbler_server_packets" lineno="13695"> +<summary> +Receive cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="13714"> +<summary> +Do not audit attempts to receive cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cobbler_server_packets" lineno="13733"> +<summary> +Send and receive cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="13749"> +<summary> +Do not audit attempts to send and receive cobbler_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cobbler_server_packets" lineno="13764"> +<summary> +Relabel packets to cobbler_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_comsat_port" lineno="13786"> +<summary> +Send and receive TCP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_comsat_port" lineno="13805"> +<summary> +Send UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="13824"> +<summary> +Do not audit attempts to send UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_comsat_port" lineno="13843"> +<summary> +Receive UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="13862"> +<summary> +Do not audit attempts to receive UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_comsat_port" lineno="13881"> +<summary> +Send and receive UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="13898"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the comsat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_comsat_port" lineno="13914"> +<summary> +Bind TCP sockets to the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_comsat_port" lineno="13934"> +<summary> +Bind UDP sockets to the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_comsat_port" lineno="13953"> +<summary> +Make a TCP connection to the comsat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_comsat_client_packets" lineno="13973"> +<summary> +Send comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="13992"> +<summary> +Do not audit attempts to send comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_comsat_client_packets" lineno="14011"> +<summary> +Receive comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="14030"> +<summary> +Do not audit attempts to receive comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_comsat_client_packets" lineno="14049"> +<summary> +Send and receive comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="14065"> +<summary> +Do not audit attempts to send and receive comsat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_comsat_client_packets" lineno="14080"> +<summary> +Relabel packets to comsat_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_comsat_server_packets" lineno="14100"> +<summary> +Send comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="14119"> +<summary> +Do not audit attempts to send comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_comsat_server_packets" lineno="14138"> +<summary> +Receive comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="14157"> +<summary> +Do not audit attempts to receive comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_comsat_server_packets" lineno="14176"> +<summary> +Send and receive comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="14192"> +<summary> +Do not audit attempts to send and receive comsat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_comsat_server_packets" lineno="14207"> +<summary> +Relabel packets to comsat_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_cvs_port" lineno="14229"> +<summary> +Send and receive TCP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_cvs_port" lineno="14248"> +<summary> +Send UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="14267"> +<summary> +Do not audit attempts to send UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_cvs_port" lineno="14286"> +<summary> +Receive UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="14305"> +<summary> +Do not audit attempts to receive UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_cvs_port" lineno="14324"> +<summary> +Send and receive UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="14341"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the cvs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_cvs_port" lineno="14357"> +<summary> +Bind TCP sockets to the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_cvs_port" lineno="14377"> +<summary> +Bind UDP sockets to the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_cvs_port" lineno="14396"> +<summary> +Make a TCP connection to the cvs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cvs_client_packets" lineno="14416"> +<summary> +Send cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="14435"> +<summary> +Do not audit attempts to send cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cvs_client_packets" lineno="14454"> +<summary> +Receive cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="14473"> +<summary> +Do not audit attempts to receive cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cvs_client_packets" lineno="14492"> +<summary> +Send and receive cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="14508"> +<summary> +Do not audit attempts to send and receive cvs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cvs_client_packets" lineno="14523"> +<summary> +Relabel packets to cvs_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cvs_server_packets" lineno="14543"> +<summary> +Send cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="14562"> +<summary> +Do not audit attempts to send cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cvs_server_packets" lineno="14581"> +<summary> +Receive cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="14600"> +<summary> +Do not audit attempts to receive cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cvs_server_packets" lineno="14619"> +<summary> +Send and receive cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="14635"> +<summary> +Do not audit attempts to send and receive cvs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cvs_server_packets" lineno="14650"> +<summary> +Relabel packets to cvs_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="14672"> +<summary> +Send and receive TCP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_cyphesis_port" lineno="14691"> +<summary> +Send UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="14710"> +<summary> +Do not audit attempts to send UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_cyphesis_port" lineno="14729"> +<summary> +Receive UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="14748"> +<summary> +Do not audit attempts to receive UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="14767"> +<summary> +Send and receive UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="14784"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_cyphesis_port" lineno="14800"> +<summary> +Bind TCP sockets to the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_cyphesis_port" lineno="14820"> +<summary> +Bind UDP sockets to the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_cyphesis_port" lineno="14839"> +<summary> +Make a TCP connection to the cyphesis port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cyphesis_client_packets" lineno="14859"> +<summary> +Send cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="14878"> +<summary> +Do not audit attempts to send cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cyphesis_client_packets" lineno="14897"> +<summary> +Receive cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="14916"> +<summary> +Do not audit attempts to receive cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="14935"> +<summary> +Send and receive cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="14951"> +<summary> +Do not audit attempts to send and receive cyphesis_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cyphesis_client_packets" lineno="14966"> +<summary> +Relabel packets to cyphesis_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_cyphesis_server_packets" lineno="14986"> +<summary> +Send cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="15005"> +<summary> +Do not audit attempts to send cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_cyphesis_server_packets" lineno="15024"> +<summary> +Receive cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="15043"> +<summary> +Do not audit attempts to receive cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="15062"> +<summary> +Send and receive cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="15078"> +<summary> +Do not audit attempts to send and receive cyphesis_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_cyphesis_server_packets" lineno="15093"> +<summary> +Relabel packets to cyphesis_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_daap_port" lineno="15115"> +<summary> +Send and receive TCP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_daap_port" lineno="15134"> +<summary> +Send UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_daap_port" lineno="15153"> +<summary> +Do not audit attempts to send UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_daap_port" lineno="15172"> +<summary> +Receive UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="15191"> +<summary> +Do not audit attempts to receive UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_daap_port" lineno="15210"> +<summary> +Send and receive UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="15227"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the daap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_daap_port" lineno="15243"> +<summary> +Bind TCP sockets to the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_daap_port" lineno="15263"> +<summary> +Bind UDP sockets to the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_daap_port" lineno="15282"> +<summary> +Make a TCP connection to the daap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_daap_client_packets" lineno="15302"> +<summary> +Send daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_daap_client_packets" lineno="15321"> +<summary> +Do not audit attempts to send daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_daap_client_packets" lineno="15340"> +<summary> +Receive daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="15359"> +<summary> +Do not audit attempts to receive daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_daap_client_packets" lineno="15378"> +<summary> +Send and receive daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="15394"> +<summary> +Do not audit attempts to send and receive daap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_daap_client_packets" lineno="15409"> +<summary> +Relabel packets to daap_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_daap_server_packets" lineno="15429"> +<summary> +Send daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_daap_server_packets" lineno="15448"> +<summary> +Do not audit attempts to send daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_daap_server_packets" lineno="15467"> +<summary> +Receive daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="15486"> +<summary> +Do not audit attempts to receive daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_daap_server_packets" lineno="15505"> +<summary> +Send and receive daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="15521"> +<summary> +Do not audit attempts to send and receive daap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_daap_server_packets" lineno="15536"> +<summary> +Relabel packets to daap_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="15558"> +<summary> +Send and receive TCP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dbskkd_port" lineno="15577"> +<summary> +Send UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="15596"> +<summary> +Do not audit attempts to send UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dbskkd_port" lineno="15615"> +<summary> +Receive UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="15634"> +<summary> +Do not audit attempts to receive UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="15653"> +<summary> +Send and receive UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="15670"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dbskkd_port" lineno="15686"> +<summary> +Bind TCP sockets to the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dbskkd_port" lineno="15706"> +<summary> +Bind UDP sockets to the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dbskkd_port" lineno="15725"> +<summary> +Make a TCP connection to the dbskkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dbskkd_client_packets" lineno="15745"> +<summary> +Send dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="15764"> +<summary> +Do not audit attempts to send dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dbskkd_client_packets" lineno="15783"> +<summary> +Receive dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="15802"> +<summary> +Do not audit attempts to receive dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="15821"> +<summary> +Send and receive dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="15837"> +<summary> +Do not audit attempts to send and receive dbskkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dbskkd_client_packets" lineno="15852"> +<summary> +Relabel packets to dbskkd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dbskkd_server_packets" lineno="15872"> +<summary> +Send dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="15891"> +<summary> +Do not audit attempts to send dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dbskkd_server_packets" lineno="15910"> +<summary> +Receive dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="15929"> +<summary> +Do not audit attempts to receive dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="15948"> +<summary> +Send and receive dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="15964"> +<summary> +Do not audit attempts to send and receive dbskkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dbskkd_server_packets" lineno="15979"> +<summary> +Relabel packets to dbskkd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dcc_port" lineno="16001"> +<summary> +Send and receive TCP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dcc_port" lineno="16020"> +<summary> +Send UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="16039"> +<summary> +Do not audit attempts to send UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dcc_port" lineno="16058"> +<summary> +Receive UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="16077"> +<summary> +Do not audit attempts to receive UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dcc_port" lineno="16096"> +<summary> +Send and receive UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="16113"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dcc_port" lineno="16129"> +<summary> +Bind TCP sockets to the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dcc_port" lineno="16149"> +<summary> +Bind UDP sockets to the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dcc_port" lineno="16168"> +<summary> +Make a TCP connection to the dcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dcc_client_packets" lineno="16188"> +<summary> +Send dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="16207"> +<summary> +Do not audit attempts to send dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dcc_client_packets" lineno="16226"> +<summary> +Receive dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="16245"> +<summary> +Do not audit attempts to receive dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dcc_client_packets" lineno="16264"> +<summary> +Send and receive dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="16280"> +<summary> +Do not audit attempts to send and receive dcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dcc_client_packets" lineno="16295"> +<summary> +Relabel packets to dcc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dcc_server_packets" lineno="16315"> +<summary> +Send dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="16334"> +<summary> +Do not audit attempts to send dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dcc_server_packets" lineno="16353"> +<summary> +Receive dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="16372"> +<summary> +Do not audit attempts to receive dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dcc_server_packets" lineno="16391"> +<summary> +Send and receive dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="16407"> +<summary> +Do not audit attempts to send and receive dcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dcc_server_packets" lineno="16422"> +<summary> +Relabel packets to dcc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dccm_port" lineno="16444"> +<summary> +Send and receive TCP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dccm_port" lineno="16463"> +<summary> +Send UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="16482"> +<summary> +Do not audit attempts to send UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dccm_port" lineno="16501"> +<summary> +Receive UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="16520"> +<summary> +Do not audit attempts to receive UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dccm_port" lineno="16539"> +<summary> +Send and receive UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="16556"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dccm port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dccm_port" lineno="16572"> +<summary> +Bind TCP sockets to the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dccm_port" lineno="16592"> +<summary> +Bind UDP sockets to the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dccm_port" lineno="16611"> +<summary> +Make a TCP connection to the dccm port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dccm_client_packets" lineno="16631"> +<summary> +Send dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="16650"> +<summary> +Do not audit attempts to send dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dccm_client_packets" lineno="16669"> +<summary> +Receive dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="16688"> +<summary> +Do not audit attempts to receive dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dccm_client_packets" lineno="16707"> +<summary> +Send and receive dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="16723"> +<summary> +Do not audit attempts to send and receive dccm_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dccm_client_packets" lineno="16738"> +<summary> +Relabel packets to dccm_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dccm_server_packets" lineno="16758"> +<summary> +Send dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="16777"> +<summary> +Do not audit attempts to send dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dccm_server_packets" lineno="16796"> +<summary> +Receive dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="16815"> +<summary> +Do not audit attempts to receive dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dccm_server_packets" lineno="16834"> +<summary> +Send and receive dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="16850"> +<summary> +Do not audit attempts to send and receive dccm_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dccm_server_packets" lineno="16865"> +<summary> +Relabel packets to dccm_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="16887"> +<summary> +Send and receive TCP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dhcpc_port" lineno="16906"> +<summary> +Send UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="16925"> +<summary> +Do not audit attempts to send UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dhcpc_port" lineno="16944"> +<summary> +Receive UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="16963"> +<summary> +Do not audit attempts to receive UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="16982"> +<summary> +Send and receive UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="16999"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dhcpc_port" lineno="17015"> +<summary> +Bind TCP sockets to the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dhcpc_port" lineno="17035"> +<summary> +Bind UDP sockets to the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dhcpc_port" lineno="17054"> +<summary> +Make a TCP connection to the dhcpc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dhcpc_client_packets" lineno="17074"> +<summary> +Send dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="17093"> +<summary> +Do not audit attempts to send dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dhcpc_client_packets" lineno="17112"> +<summary> +Receive dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="17131"> +<summary> +Do not audit attempts to receive dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="17150"> +<summary> +Send and receive dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="17166"> +<summary> +Do not audit attempts to send and receive dhcpc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dhcpc_client_packets" lineno="17181"> +<summary> +Relabel packets to dhcpc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dhcpc_server_packets" lineno="17201"> +<summary> +Send dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="17220"> +<summary> +Do not audit attempts to send dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dhcpc_server_packets" lineno="17239"> +<summary> +Receive dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="17258"> +<summary> +Do not audit attempts to receive dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="17277"> +<summary> +Send and receive dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="17293"> +<summary> +Do not audit attempts to send and receive dhcpc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dhcpc_server_packets" lineno="17308"> +<summary> +Relabel packets to dhcpc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="17330"> +<summary> +Send and receive TCP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dhcpd_port" lineno="17349"> +<summary> +Send UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="17368"> +<summary> +Do not audit attempts to send UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dhcpd_port" lineno="17387"> +<summary> +Receive UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="17406"> +<summary> +Do not audit attempts to receive UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="17425"> +<summary> +Send and receive UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="17442"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dhcpd_port" lineno="17458"> +<summary> +Bind TCP sockets to the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dhcpd_port" lineno="17478"> +<summary> +Bind UDP sockets to the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dhcpd_port" lineno="17497"> +<summary> +Make a TCP connection to the dhcpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dhcpd_client_packets" lineno="17517"> +<summary> +Send dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="17536"> +<summary> +Do not audit attempts to send dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dhcpd_client_packets" lineno="17555"> +<summary> +Receive dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="17574"> +<summary> +Do not audit attempts to receive dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="17593"> +<summary> +Send and receive dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="17609"> +<summary> +Do not audit attempts to send and receive dhcpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dhcpd_client_packets" lineno="17624"> +<summary> +Relabel packets to dhcpd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dhcpd_server_packets" lineno="17644"> +<summary> +Send dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="17663"> +<summary> +Do not audit attempts to send dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dhcpd_server_packets" lineno="17682"> +<summary> +Receive dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="17701"> +<summary> +Do not audit attempts to receive dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="17720"> +<summary> +Send and receive dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="17736"> +<summary> +Do not audit attempts to send and receive dhcpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dhcpd_server_packets" lineno="17751"> +<summary> +Relabel packets to dhcpd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dict_port" lineno="17773"> +<summary> +Send and receive TCP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dict_port" lineno="17792"> +<summary> +Send UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dict_port" lineno="17811"> +<summary> +Do not audit attempts to send UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dict_port" lineno="17830"> +<summary> +Receive UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="17849"> +<summary> +Do not audit attempts to receive UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dict_port" lineno="17868"> +<summary> +Send and receive UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="17885"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dict port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dict_port" lineno="17901"> +<summary> +Bind TCP sockets to the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dict_port" lineno="17921"> +<summary> +Bind UDP sockets to the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dict_port" lineno="17940"> +<summary> +Make a TCP connection to the dict port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dict_client_packets" lineno="17960"> +<summary> +Send dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dict_client_packets" lineno="17979"> +<summary> +Do not audit attempts to send dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dict_client_packets" lineno="17998"> +<summary> +Receive dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="18017"> +<summary> +Do not audit attempts to receive dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dict_client_packets" lineno="18036"> +<summary> +Send and receive dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="18052"> +<summary> +Do not audit attempts to send and receive dict_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dict_client_packets" lineno="18067"> +<summary> +Relabel packets to dict_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dict_server_packets" lineno="18087"> +<summary> +Send dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dict_server_packets" lineno="18106"> +<summary> +Do not audit attempts to send dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dict_server_packets" lineno="18125"> +<summary> +Receive dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="18144"> +<summary> +Do not audit attempts to receive dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dict_server_packets" lineno="18163"> +<summary> +Send and receive dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="18179"> +<summary> +Do not audit attempts to send and receive dict_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dict_server_packets" lineno="18194"> +<summary> +Relabel packets to dict_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_distccd_port" lineno="18216"> +<summary> +Send and receive TCP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_distccd_port" lineno="18235"> +<summary> +Send UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="18254"> +<summary> +Do not audit attempts to send UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_distccd_port" lineno="18273"> +<summary> +Receive UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="18292"> +<summary> +Do not audit attempts to receive UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_distccd_port" lineno="18311"> +<summary> +Send and receive UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="18328"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the distccd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_distccd_port" lineno="18344"> +<summary> +Bind TCP sockets to the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_distccd_port" lineno="18364"> +<summary> +Bind UDP sockets to the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_distccd_port" lineno="18383"> +<summary> +Make a TCP connection to the distccd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_distccd_client_packets" lineno="18403"> +<summary> +Send distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="18422"> +<summary> +Do not audit attempts to send distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_distccd_client_packets" lineno="18441"> +<summary> +Receive distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="18460"> +<summary> +Do not audit attempts to receive distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_distccd_client_packets" lineno="18479"> +<summary> +Send and receive distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="18495"> +<summary> +Do not audit attempts to send and receive distccd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_distccd_client_packets" lineno="18510"> +<summary> +Relabel packets to distccd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_distccd_server_packets" lineno="18530"> +<summary> +Send distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="18549"> +<summary> +Do not audit attempts to send distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_distccd_server_packets" lineno="18568"> +<summary> +Receive distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="18587"> +<summary> +Do not audit attempts to receive distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_distccd_server_packets" lineno="18606"> +<summary> +Send and receive distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="18622"> +<summary> +Do not audit attempts to send and receive distccd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_distccd_server_packets" lineno="18637"> +<summary> +Relabel packets to distccd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_dns_port" lineno="18659"> +<summary> +Send and receive TCP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_dns_port" lineno="18678"> +<summary> +Send UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_dns_port" lineno="18697"> +<summary> +Do not audit attempts to send UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_dns_port" lineno="18716"> +<summary> +Receive UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="18735"> +<summary> +Do not audit attempts to receive UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_dns_port" lineno="18754"> +<summary> +Send and receive UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="18771"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the dns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_dns_port" lineno="18787"> +<summary> +Bind TCP sockets to the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_dns_port" lineno="18807"> +<summary> +Bind UDP sockets to the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_dns_port" lineno="18826"> +<summary> +Make a TCP connection to the dns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dns_client_packets" lineno="18846"> +<summary> +Send dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dns_client_packets" lineno="18865"> +<summary> +Do not audit attempts to send dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dns_client_packets" lineno="18884"> +<summary> +Receive dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="18903"> +<summary> +Do not audit attempts to receive dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dns_client_packets" lineno="18922"> +<summary> +Send and receive dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="18938"> +<summary> +Do not audit attempts to send and receive dns_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dns_client_packets" lineno="18953"> +<summary> +Relabel packets to dns_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_dns_server_packets" lineno="18973"> +<summary> +Send dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_dns_server_packets" lineno="18992"> +<summary> +Do not audit attempts to send dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_dns_server_packets" lineno="19011"> +<summary> +Receive dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="19030"> +<summary> +Do not audit attempts to receive dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_dns_server_packets" lineno="19049"> +<summary> +Send and receive dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="19065"> +<summary> +Do not audit attempts to send and receive dns_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_dns_server_packets" lineno="19080"> +<summary> +Relabel packets to dns_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_epmap_port" lineno="19102"> +<summary> +Send and receive TCP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_epmap_port" lineno="19121"> +<summary> +Send UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="19140"> +<summary> +Do not audit attempts to send UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_epmap_port" lineno="19159"> +<summary> +Receive UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="19178"> +<summary> +Do not audit attempts to receive UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_epmap_port" lineno="19197"> +<summary> +Send and receive UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="19214"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the epmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_epmap_port" lineno="19230"> +<summary> +Bind TCP sockets to the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_epmap_port" lineno="19250"> +<summary> +Bind UDP sockets to the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_epmap_port" lineno="19269"> +<summary> +Make a TCP connection to the epmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_epmap_client_packets" lineno="19289"> +<summary> +Send epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="19308"> +<summary> +Do not audit attempts to send epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_epmap_client_packets" lineno="19327"> +<summary> +Receive epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="19346"> +<summary> +Do not audit attempts to receive epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_epmap_client_packets" lineno="19365"> +<summary> +Send and receive epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="19381"> +<summary> +Do not audit attempts to send and receive epmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_epmap_client_packets" lineno="19396"> +<summary> +Relabel packets to epmap_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_epmap_server_packets" lineno="19416"> +<summary> +Send epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="19435"> +<summary> +Do not audit attempts to send epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_epmap_server_packets" lineno="19454"> +<summary> +Receive epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="19473"> +<summary> +Do not audit attempts to receive epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_epmap_server_packets" lineno="19492"> +<summary> +Send and receive epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="19508"> +<summary> +Do not audit attempts to send and receive epmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_epmap_server_packets" lineno="19523"> +<summary> +Relabel packets to epmap_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="19545"> +<summary> +Send and receive TCP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_fingerd_port" lineno="19564"> +<summary> +Send UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="19583"> +<summary> +Do not audit attempts to send UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_fingerd_port" lineno="19602"> +<summary> +Receive UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="19621"> +<summary> +Do not audit attempts to receive UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_fingerd_port" lineno="19640"> +<summary> +Send and receive UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="19657"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_fingerd_port" lineno="19673"> +<summary> +Bind TCP sockets to the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_fingerd_port" lineno="19693"> +<summary> +Bind UDP sockets to the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_fingerd_port" lineno="19712"> +<summary> +Make a TCP connection to the fingerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_fingerd_client_packets" lineno="19732"> +<summary> +Send fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="19751"> +<summary> +Do not audit attempts to send fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_fingerd_client_packets" lineno="19770"> +<summary> +Receive fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="19789"> +<summary> +Do not audit attempts to receive fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_fingerd_client_packets" lineno="19808"> +<summary> +Send and receive fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="19824"> +<summary> +Do not audit attempts to send and receive fingerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_fingerd_client_packets" lineno="19839"> +<summary> +Relabel packets to fingerd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_fingerd_server_packets" lineno="19859"> +<summary> +Send fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="19878"> +<summary> +Do not audit attempts to send fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_fingerd_server_packets" lineno="19897"> +<summary> +Receive fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="19916"> +<summary> +Do not audit attempts to receive fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_fingerd_server_packets" lineno="19935"> +<summary> +Send and receive fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="19951"> +<summary> +Do not audit attempts to send and receive fingerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_fingerd_server_packets" lineno="19966"> +<summary> +Relabel packets to fingerd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ftp_port" lineno="19988"> +<summary> +Send and receive TCP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ftp_port" lineno="20007"> +<summary> +Send UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="20026"> +<summary> +Do not audit attempts to send UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ftp_port" lineno="20045"> +<summary> +Receive UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="20064"> +<summary> +Do not audit attempts to receive UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ftp_port" lineno="20083"> +<summary> +Send and receive UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="20100"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ftp_port" lineno="20116"> +<summary> +Bind TCP sockets to the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ftp_port" lineno="20136"> +<summary> +Bind UDP sockets to the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ftp_port" lineno="20155"> +<summary> +Make a TCP connection to the ftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ftp_client_packets" lineno="20175"> +<summary> +Send ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="20194"> +<summary> +Do not audit attempts to send ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ftp_client_packets" lineno="20213"> +<summary> +Receive ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="20232"> +<summary> +Do not audit attempts to receive ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ftp_client_packets" lineno="20251"> +<summary> +Send and receive ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="20267"> +<summary> +Do not audit attempts to send and receive ftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ftp_client_packets" lineno="20282"> +<summary> +Relabel packets to ftp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ftp_server_packets" lineno="20302"> +<summary> +Send ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="20321"> +<summary> +Do not audit attempts to send ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ftp_server_packets" lineno="20340"> +<summary> +Receive ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="20359"> +<summary> +Do not audit attempts to receive ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ftp_server_packets" lineno="20378"> +<summary> +Send and receive ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="20394"> +<summary> +Do not audit attempts to send and receive ftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ftp_server_packets" lineno="20409"> +<summary> +Relabel packets to ftp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="20431"> +<summary> +Send and receive TCP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ftp_data_port" lineno="20450"> +<summary> +Send UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="20469"> +<summary> +Do not audit attempts to send UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ftp_data_port" lineno="20488"> +<summary> +Receive UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="20507"> +<summary> +Do not audit attempts to receive UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="20526"> +<summary> +Send and receive UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="20543"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ftp_data_port" lineno="20559"> +<summary> +Bind TCP sockets to the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ftp_data_port" lineno="20579"> +<summary> +Bind UDP sockets to the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ftp_data_port" lineno="20598"> +<summary> +Make a TCP connection to the ftp_data port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ftp_data_client_packets" lineno="20618"> +<summary> +Send ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="20637"> +<summary> +Do not audit attempts to send ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ftp_data_client_packets" lineno="20656"> +<summary> +Receive ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="20675"> +<summary> +Do not audit attempts to receive ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="20694"> +<summary> +Send and receive ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="20710"> +<summary> +Do not audit attempts to send and receive ftp_data_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ftp_data_client_packets" lineno="20725"> +<summary> +Relabel packets to ftp_data_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ftp_data_server_packets" lineno="20745"> +<summary> +Send ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="20764"> +<summary> +Do not audit attempts to send ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ftp_data_server_packets" lineno="20783"> +<summary> +Receive ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="20802"> +<summary> +Do not audit attempts to receive ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="20821"> +<summary> +Send and receive ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="20837"> +<summary> +Do not audit attempts to send and receive ftp_data_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ftp_data_server_packets" lineno="20852"> +<summary> +Relabel packets to ftp_data_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="20874"> +<summary> +Send and receive TCP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_gatekeeper_port" lineno="20893"> +<summary> +Send UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="20912"> +<summary> +Do not audit attempts to send UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_gatekeeper_port" lineno="20931"> +<summary> +Receive UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="20950"> +<summary> +Do not audit attempts to receive UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="20969"> +<summary> +Send and receive UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="20986"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_gatekeeper_port" lineno="21002"> +<summary> +Bind TCP sockets to the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_gatekeeper_port" lineno="21022"> +<summary> +Bind UDP sockets to the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_gatekeeper_port" lineno="21041"> +<summary> +Make a TCP connection to the gatekeeper port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gatekeeper_client_packets" lineno="21061"> +<summary> +Send gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="21080"> +<summary> +Do not audit attempts to send gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gatekeeper_client_packets" lineno="21099"> +<summary> +Receive gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="21118"> +<summary> +Do not audit attempts to receive gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="21137"> +<summary> +Send and receive gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="21153"> +<summary> +Do not audit attempts to send and receive gatekeeper_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="21168"> +<summary> +Relabel packets to gatekeeper_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gatekeeper_server_packets" lineno="21188"> +<summary> +Send gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="21207"> +<summary> +Do not audit attempts to send gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gatekeeper_server_packets" lineno="21226"> +<summary> +Receive gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="21245"> +<summary> +Do not audit attempts to receive gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="21264"> +<summary> +Send and receive gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="21280"> +<summary> +Do not audit attempts to send and receive gatekeeper_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="21295"> +<summary> +Relabel packets to gatekeeper_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_giftd_port" lineno="21317"> +<summary> +Send and receive TCP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_giftd_port" lineno="21336"> +<summary> +Send UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="21355"> +<summary> +Do not audit attempts to send UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_giftd_port" lineno="21374"> +<summary> +Receive UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="21393"> +<summary> +Do not audit attempts to receive UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_giftd_port" lineno="21412"> +<summary> +Send and receive UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="21429"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the giftd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_giftd_port" lineno="21445"> +<summary> +Bind TCP sockets to the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_giftd_port" lineno="21465"> +<summary> +Bind UDP sockets to the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_giftd_port" lineno="21484"> +<summary> +Make a TCP connection to the giftd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_giftd_client_packets" lineno="21504"> +<summary> +Send giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="21523"> +<summary> +Do not audit attempts to send giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_giftd_client_packets" lineno="21542"> +<summary> +Receive giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="21561"> +<summary> +Do not audit attempts to receive giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_giftd_client_packets" lineno="21580"> +<summary> +Send and receive giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="21596"> +<summary> +Do not audit attempts to send and receive giftd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_giftd_client_packets" lineno="21611"> +<summary> +Relabel packets to giftd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_giftd_server_packets" lineno="21631"> +<summary> +Send giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="21650"> +<summary> +Do not audit attempts to send giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_giftd_server_packets" lineno="21669"> +<summary> +Receive giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="21688"> +<summary> +Do not audit attempts to receive giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_giftd_server_packets" lineno="21707"> +<summary> +Send and receive giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="21723"> +<summary> +Do not audit attempts to send and receive giftd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_giftd_server_packets" lineno="21738"> +<summary> +Relabel packets to giftd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_git_port" lineno="21760"> +<summary> +Send and receive TCP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_git_port" lineno="21779"> +<summary> +Send UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_git_port" lineno="21798"> +<summary> +Do not audit attempts to send UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_git_port" lineno="21817"> +<summary> +Receive UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_git_port" lineno="21836"> +<summary> +Do not audit attempts to receive UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_git_port" lineno="21855"> +<summary> +Send and receive UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="21872"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the git port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_git_port" lineno="21888"> +<summary> +Bind TCP sockets to the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_git_port" lineno="21908"> +<summary> +Bind UDP sockets to the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_git_port" lineno="21927"> +<summary> +Make a TCP connection to the git port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_git_client_packets" lineno="21947"> +<summary> +Send git_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_git_client_packets" lineno="21966"> +<summary> +Do not audit attempts to send git_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_git_client_packets" lineno="21985"> +<summary> +Receive git_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_git_client_packets" lineno="22004"> +<summary> +Do not audit attempts to receive git_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_git_client_packets" lineno="22023"> +<summary> +Send and receive git_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="22039"> +<summary> +Do not audit attempts to send and receive git_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_git_client_packets" lineno="22054"> +<summary> +Relabel packets to git_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_git_server_packets" lineno="22074"> +<summary> +Send git_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_git_server_packets" lineno="22093"> +<summary> +Do not audit attempts to send git_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_git_server_packets" lineno="22112"> +<summary> +Receive git_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_git_server_packets" lineno="22131"> +<summary> +Do not audit attempts to receive git_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_git_server_packets" lineno="22150"> +<summary> +Send and receive git_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="22166"> +<summary> +Do not audit attempts to send and receive git_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_git_server_packets" lineno="22181"> +<summary> +Relabel packets to git_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="22203"> +<summary> +Send and receive TCP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_glance_registry_port" lineno="22222"> +<summary> +Send UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="22241"> +<summary> +Do not audit attempts to send UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_glance_registry_port" lineno="22260"> +<summary> +Receive UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="22279"> +<summary> +Do not audit attempts to receive UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="22298"> +<summary> +Send and receive UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="22315"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_glance_registry_port" lineno="22331"> +<summary> +Bind TCP sockets to the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_glance_registry_port" lineno="22351"> +<summary> +Bind UDP sockets to the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_glance_registry_port" lineno="22370"> +<summary> +Make a TCP connection to the glance_registry port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_glance_registry_client_packets" lineno="22390"> +<summary> +Send glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="22409"> +<summary> +Do not audit attempts to send glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_glance_registry_client_packets" lineno="22428"> +<summary> +Receive glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="22447"> +<summary> +Do not audit attempts to receive glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="22466"> +<summary> +Send and receive glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="22482"> +<summary> +Do not audit attempts to send and receive glance_registry_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_glance_registry_client_packets" lineno="22497"> +<summary> +Relabel packets to glance_registry_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_glance_registry_server_packets" lineno="22517"> +<summary> +Send glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="22536"> +<summary> +Do not audit attempts to send glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_glance_registry_server_packets" lineno="22555"> +<summary> +Receive glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="22574"> +<summary> +Do not audit attempts to receive glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="22593"> +<summary> +Send and receive glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="22609"> +<summary> +Do not audit attempts to send and receive glance_registry_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_glance_registry_server_packets" lineno="22624"> +<summary> +Relabel packets to glance_registry_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_gopher_port" lineno="22646"> +<summary> +Send and receive TCP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_gopher_port" lineno="22665"> +<summary> +Send UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="22684"> +<summary> +Do not audit attempts to send UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_gopher_port" lineno="22703"> +<summary> +Receive UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="22722"> +<summary> +Do not audit attempts to receive UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_gopher_port" lineno="22741"> +<summary> +Send and receive UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="22758"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the gopher port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_gopher_port" lineno="22774"> +<summary> +Bind TCP sockets to the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_gopher_port" lineno="22794"> +<summary> +Bind UDP sockets to the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_gopher_port" lineno="22813"> +<summary> +Make a TCP connection to the gopher port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gopher_client_packets" lineno="22833"> +<summary> +Send gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="22852"> +<summary> +Do not audit attempts to send gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gopher_client_packets" lineno="22871"> +<summary> +Receive gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="22890"> +<summary> +Do not audit attempts to receive gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gopher_client_packets" lineno="22909"> +<summary> +Send and receive gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="22925"> +<summary> +Do not audit attempts to send and receive gopher_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gopher_client_packets" lineno="22940"> +<summary> +Relabel packets to gopher_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gopher_server_packets" lineno="22960"> +<summary> +Send gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="22979"> +<summary> +Do not audit attempts to send gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gopher_server_packets" lineno="22998"> +<summary> +Receive gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="23017"> +<summary> +Do not audit attempts to receive gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gopher_server_packets" lineno="23036"> +<summary> +Send and receive gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="23052"> +<summary> +Do not audit attempts to send and receive gopher_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gopher_server_packets" lineno="23067"> +<summary> +Relabel packets to gopher_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="23089"> +<summary> +Send and receive TCP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_gpsd_port" lineno="23108"> +<summary> +Send UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="23127"> +<summary> +Do not audit attempts to send UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_gpsd_port" lineno="23146"> +<summary> +Receive UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="23165"> +<summary> +Do not audit attempts to receive UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_gpsd_port" lineno="23184"> +<summary> +Send and receive UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="23201"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_gpsd_port" lineno="23217"> +<summary> +Bind TCP sockets to the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_gpsd_port" lineno="23237"> +<summary> +Bind UDP sockets to the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_gpsd_port" lineno="23256"> +<summary> +Make a TCP connection to the gpsd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gpsd_client_packets" lineno="23276"> +<summary> +Send gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="23295"> +<summary> +Do not audit attempts to send gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gpsd_client_packets" lineno="23314"> +<summary> +Receive gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="23333"> +<summary> +Do not audit attempts to receive gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gpsd_client_packets" lineno="23352"> +<summary> +Send and receive gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="23368"> +<summary> +Do not audit attempts to send and receive gpsd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gpsd_client_packets" lineno="23383"> +<summary> +Relabel packets to gpsd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_gpsd_server_packets" lineno="23403"> +<summary> +Send gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="23422"> +<summary> +Do not audit attempts to send gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_gpsd_server_packets" lineno="23441"> +<summary> +Receive gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="23460"> +<summary> +Do not audit attempts to receive gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_gpsd_server_packets" lineno="23479"> +<summary> +Send and receive gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="23495"> +<summary> +Do not audit attempts to send and receive gpsd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_gpsd_server_packets" lineno="23510"> +<summary> +Relabel packets to gpsd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="23532"> +<summary> +Send and receive TCP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_hadoop_datanode_port" lineno="23551"> +<summary> +Send UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="23570"> +<summary> +Do not audit attempts to send UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="23589"> +<summary> +Receive UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="23608"> +<summary> +Do not audit attempts to receive UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="23627"> +<summary> +Send and receive UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="23644"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="23660"> +<summary> +Bind TCP sockets to the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="23680"> +<summary> +Bind UDP sockets to the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="23699"> +<summary> +Make a TCP connection to the hadoop_datanode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hadoop_datanode_client_packets" lineno="23719"> +<summary> +Send hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="23738"> +<summary> +Do not audit attempts to send hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="23757"> +<summary> +Receive hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="23776"> +<summary> +Do not audit attempts to receive hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="23795"> +<summary> +Send and receive hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="23811"> +<summary> +Do not audit attempts to send and receive hadoop_datanode_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="23826"> +<summary> +Relabel packets to hadoop_datanode_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hadoop_datanode_server_packets" lineno="23846"> +<summary> +Send hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="23865"> +<summary> +Do not audit attempts to send hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="23884"> +<summary> +Receive hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="23903"> +<summary> +Do not audit attempts to receive hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="23922"> +<summary> +Send and receive hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="23938"> +<summary> +Do not audit attempts to send and receive hadoop_datanode_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="23953"> +<summary> +Relabel packets to hadoop_datanode_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="23975"> +<summary> +Send and receive TCP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_hadoop_namenode_port" lineno="23994"> +<summary> +Send UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="24013"> +<summary> +Do not audit attempts to send UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="24032"> +<summary> +Receive UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="24051"> +<summary> +Do not audit attempts to receive UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="24070"> +<summary> +Send and receive UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="24087"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="24103"> +<summary> +Bind TCP sockets to the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="24123"> +<summary> +Bind UDP sockets to the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="24142"> +<summary> +Make a TCP connection to the hadoop_namenode port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hadoop_namenode_client_packets" lineno="24162"> +<summary> +Send hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="24181"> +<summary> +Do not audit attempts to send hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="24200"> +<summary> +Receive hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="24219"> +<summary> +Do not audit attempts to receive hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="24238"> +<summary> +Send and receive hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="24254"> +<summary> +Do not audit attempts to send and receive hadoop_namenode_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="24269"> +<summary> +Relabel packets to hadoop_namenode_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hadoop_namenode_server_packets" lineno="24289"> +<summary> +Send hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="24308"> +<summary> +Do not audit attempts to send hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="24327"> +<summary> +Receive hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="24346"> +<summary> +Do not audit attempts to receive hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="24365"> +<summary> +Send and receive hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="24381"> +<summary> +Do not audit attempts to send and receive hadoop_namenode_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="24396"> +<summary> +Relabel packets to hadoop_namenode_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="24418"> +<summary> +Send and receive TCP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_hddtemp_port" lineno="24437"> +<summary> +Send UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="24456"> +<summary> +Do not audit attempts to send UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_hddtemp_port" lineno="24475"> +<summary> +Receive UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="24494"> +<summary> +Do not audit attempts to receive UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="24513"> +<summary> +Send and receive UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="24530"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_hddtemp_port" lineno="24546"> +<summary> +Bind TCP sockets to the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_hddtemp_port" lineno="24566"> +<summary> +Bind UDP sockets to the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_hddtemp_port" lineno="24585"> +<summary> +Make a TCP connection to the hddtemp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hddtemp_client_packets" lineno="24605"> +<summary> +Send hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="24624"> +<summary> +Do not audit attempts to send hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hddtemp_client_packets" lineno="24643"> +<summary> +Receive hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="24662"> +<summary> +Do not audit attempts to receive hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="24681"> +<summary> +Send and receive hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="24697"> +<summary> +Do not audit attempts to send and receive hddtemp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hddtemp_client_packets" lineno="24712"> +<summary> +Relabel packets to hddtemp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hddtemp_server_packets" lineno="24732"> +<summary> +Send hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="24751"> +<summary> +Do not audit attempts to send hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hddtemp_server_packets" lineno="24770"> +<summary> +Receive hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="24789"> +<summary> +Do not audit attempts to receive hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="24808"> +<summary> +Send and receive hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="24824"> +<summary> +Do not audit attempts to send and receive hddtemp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hddtemp_server_packets" lineno="24839"> +<summary> +Relabel packets to hddtemp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_howl_port" lineno="24861"> +<summary> +Send and receive TCP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_howl_port" lineno="24880"> +<summary> +Send UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_howl_port" lineno="24899"> +<summary> +Do not audit attempts to send UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_howl_port" lineno="24918"> +<summary> +Receive UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="24937"> +<summary> +Do not audit attempts to receive UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_howl_port" lineno="24956"> +<summary> +Send and receive UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="24973"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the howl port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_howl_port" lineno="24989"> +<summary> +Bind TCP sockets to the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_howl_port" lineno="25009"> +<summary> +Bind UDP sockets to the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_howl_port" lineno="25028"> +<summary> +Make a TCP connection to the howl port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_howl_client_packets" lineno="25048"> +<summary> +Send howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_howl_client_packets" lineno="25067"> +<summary> +Do not audit attempts to send howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_howl_client_packets" lineno="25086"> +<summary> +Receive howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="25105"> +<summary> +Do not audit attempts to receive howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_howl_client_packets" lineno="25124"> +<summary> +Send and receive howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="25140"> +<summary> +Do not audit attempts to send and receive howl_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_howl_client_packets" lineno="25155"> +<summary> +Relabel packets to howl_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_howl_server_packets" lineno="25175"> +<summary> +Send howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_howl_server_packets" lineno="25194"> +<summary> +Do not audit attempts to send howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_howl_server_packets" lineno="25213"> +<summary> +Receive howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="25232"> +<summary> +Do not audit attempts to receive howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_howl_server_packets" lineno="25251"> +<summary> +Send and receive howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="25267"> +<summary> +Do not audit attempts to send and receive howl_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_howl_server_packets" lineno="25282"> +<summary> +Relabel packets to howl_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_hplip_port" lineno="25304"> +<summary> +Send and receive TCP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_hplip_port" lineno="25323"> +<summary> +Send UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="25342"> +<summary> +Do not audit attempts to send UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_hplip_port" lineno="25361"> +<summary> +Receive UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="25380"> +<summary> +Do not audit attempts to receive UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_hplip_port" lineno="25399"> +<summary> +Send and receive UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="25416"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the hplip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_hplip_port" lineno="25432"> +<summary> +Bind TCP sockets to the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_hplip_port" lineno="25452"> +<summary> +Bind UDP sockets to the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_hplip_port" lineno="25471"> +<summary> +Make a TCP connection to the hplip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hplip_client_packets" lineno="25491"> +<summary> +Send hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="25510"> +<summary> +Do not audit attempts to send hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hplip_client_packets" lineno="25529"> +<summary> +Receive hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="25548"> +<summary> +Do not audit attempts to receive hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hplip_client_packets" lineno="25567"> +<summary> +Send and receive hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="25583"> +<summary> +Do not audit attempts to send and receive hplip_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hplip_client_packets" lineno="25598"> +<summary> +Relabel packets to hplip_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_hplip_server_packets" lineno="25618"> +<summary> +Send hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="25637"> +<summary> +Do not audit attempts to send hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_hplip_server_packets" lineno="25656"> +<summary> +Receive hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="25675"> +<summary> +Do not audit attempts to receive hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_hplip_server_packets" lineno="25694"> +<summary> +Send and receive hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="25710"> +<summary> +Do not audit attempts to send and receive hplip_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_hplip_server_packets" lineno="25725"> +<summary> +Relabel packets to hplip_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_http_port" lineno="25747"> +<summary> +Send and receive TCP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_http_port" lineno="25766"> +<summary> +Send UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_http_port" lineno="25785"> +<summary> +Do not audit attempts to send UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_http_port" lineno="25804"> +<summary> +Receive UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_http_port" lineno="25823"> +<summary> +Do not audit attempts to receive UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_http_port" lineno="25842"> +<summary> +Send and receive UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="25859"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_http_port" lineno="25875"> +<summary> +Bind TCP sockets to the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_http_port" lineno="25895"> +<summary> +Bind UDP sockets to the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_http_port" lineno="25914"> +<summary> +Make a TCP connection to the http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_http_client_packets" lineno="25934"> +<summary> +Send http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_http_client_packets" lineno="25953"> +<summary> +Do not audit attempts to send http_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_http_client_packets" lineno="25972"> +<summary> +Receive http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_http_client_packets" lineno="25991"> +<summary> +Do not audit attempts to receive http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_http_client_packets" lineno="26010"> +<summary> +Send and receive http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="26026"> +<summary> +Do not audit attempts to send and receive http_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_http_client_packets" lineno="26041"> +<summary> +Relabel packets to http_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_http_server_packets" lineno="26061"> +<summary> +Send http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_http_server_packets" lineno="26080"> +<summary> +Do not audit attempts to send http_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_http_server_packets" lineno="26099"> +<summary> +Receive http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_http_server_packets" lineno="26118"> +<summary> +Do not audit attempts to receive http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_http_server_packets" lineno="26137"> +<summary> +Send and receive http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="26153"> +<summary> +Do not audit attempts to send and receive http_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_http_server_packets" lineno="26168"> +<summary> +Relabel packets to http_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="26190"> +<summary> +Send and receive TCP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_http_cache_port" lineno="26209"> +<summary> +Send UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="26228"> +<summary> +Do not audit attempts to send UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_http_cache_port" lineno="26247"> +<summary> +Receive UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="26266"> +<summary> +Do not audit attempts to receive UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_http_cache_port" lineno="26285"> +<summary> +Send and receive UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="26302"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_http_cache_port" lineno="26318"> +<summary> +Bind TCP sockets to the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_http_cache_port" lineno="26338"> +<summary> +Bind UDP sockets to the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_http_cache_port" lineno="26357"> +<summary> +Make a TCP connection to the http_cache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_http_cache_client_packets" lineno="26377"> +<summary> +Send http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="26396"> +<summary> +Do not audit attempts to send http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_http_cache_client_packets" lineno="26415"> +<summary> +Receive http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="26434"> +<summary> +Do not audit attempts to receive http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_http_cache_client_packets" lineno="26453"> +<summary> +Send and receive http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="26469"> +<summary> +Do not audit attempts to send and receive http_cache_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_http_cache_client_packets" lineno="26484"> +<summary> +Relabel packets to http_cache_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_http_cache_server_packets" lineno="26504"> +<summary> +Send http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="26523"> +<summary> +Do not audit attempts to send http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_http_cache_server_packets" lineno="26542"> +<summary> +Receive http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="26561"> +<summary> +Do not audit attempts to receive http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_http_cache_server_packets" lineno="26580"> +<summary> +Send and receive http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="26596"> +<summary> +Do not audit attempts to send and receive http_cache_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_http_cache_server_packets" lineno="26611"> +<summary> +Relabel packets to http_cache_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="26633"> +<summary> +Send and receive TCP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_i18n_input_port" lineno="26652"> +<summary> +Send UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="26671"> +<summary> +Do not audit attempts to send UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_i18n_input_port" lineno="26690"> +<summary> +Receive UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="26709"> +<summary> +Do not audit attempts to receive UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="26728"> +<summary> +Send and receive UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="26745"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_i18n_input_port" lineno="26761"> +<summary> +Bind TCP sockets to the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_i18n_input_port" lineno="26781"> +<summary> +Bind UDP sockets to the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_i18n_input_port" lineno="26800"> +<summary> +Make a TCP connection to the i18n_input port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_i18n_input_client_packets" lineno="26820"> +<summary> +Send i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="26839"> +<summary> +Do not audit attempts to send i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_i18n_input_client_packets" lineno="26858"> +<summary> +Receive i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="26877"> +<summary> +Do not audit attempts to receive i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="26896"> +<summary> +Send and receive i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="26912"> +<summary> +Do not audit attempts to send and receive i18n_input_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_i18n_input_client_packets" lineno="26927"> +<summary> +Relabel packets to i18n_input_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_i18n_input_server_packets" lineno="26947"> +<summary> +Send i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="26966"> +<summary> +Do not audit attempts to send i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_i18n_input_server_packets" lineno="26985"> +<summary> +Receive i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="27004"> +<summary> +Do not audit attempts to receive i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="27023"> +<summary> +Send and receive i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="27039"> +<summary> +Do not audit attempts to send and receive i18n_input_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_i18n_input_server_packets" lineno="27054"> +<summary> +Relabel packets to i18n_input_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_imaze_port" lineno="27076"> +<summary> +Send and receive TCP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_imaze_port" lineno="27095"> +<summary> +Send UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="27114"> +<summary> +Do not audit attempts to send UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_imaze_port" lineno="27133"> +<summary> +Receive UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="27152"> +<summary> +Do not audit attempts to receive UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_imaze_port" lineno="27171"> +<summary> +Send and receive UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="27188"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the imaze port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_imaze_port" lineno="27204"> +<summary> +Bind TCP sockets to the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_imaze_port" lineno="27224"> +<summary> +Bind UDP sockets to the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_imaze_port" lineno="27243"> +<summary> +Make a TCP connection to the imaze port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_imaze_client_packets" lineno="27263"> +<summary> +Send imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="27282"> +<summary> +Do not audit attempts to send imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_imaze_client_packets" lineno="27301"> +<summary> +Receive imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="27320"> +<summary> +Do not audit attempts to receive imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_imaze_client_packets" lineno="27339"> +<summary> +Send and receive imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="27355"> +<summary> +Do not audit attempts to send and receive imaze_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_imaze_client_packets" lineno="27370"> +<summary> +Relabel packets to imaze_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_imaze_server_packets" lineno="27390"> +<summary> +Send imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="27409"> +<summary> +Do not audit attempts to send imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_imaze_server_packets" lineno="27428"> +<summary> +Receive imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="27447"> +<summary> +Do not audit attempts to receive imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_imaze_server_packets" lineno="27466"> +<summary> +Send and receive imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="27482"> +<summary> +Do not audit attempts to send and receive imaze_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_imaze_server_packets" lineno="27497"> +<summary> +Relabel packets to imaze_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="27519"> +<summary> +Send and receive TCP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_inetd_child_port" lineno="27538"> +<summary> +Send UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="27557"> +<summary> +Do not audit attempts to send UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_inetd_child_port" lineno="27576"> +<summary> +Receive UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="27595"> +<summary> +Do not audit attempts to receive UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="27614"> +<summary> +Send and receive UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="27631"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_inetd_child_port" lineno="27647"> +<summary> +Bind TCP sockets to the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_inetd_child_port" lineno="27667"> +<summary> +Bind UDP sockets to the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_inetd_child_port" lineno="27686"> +<summary> +Make a TCP connection to the inetd_child port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_inetd_child_client_packets" lineno="27706"> +<summary> +Send inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="27725"> +<summary> +Do not audit attempts to send inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_inetd_child_client_packets" lineno="27744"> +<summary> +Receive inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="27763"> +<summary> +Do not audit attempts to receive inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="27782"> +<summary> +Send and receive inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="27798"> +<summary> +Do not audit attempts to send and receive inetd_child_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_inetd_child_client_packets" lineno="27813"> +<summary> +Relabel packets to inetd_child_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_inetd_child_server_packets" lineno="27833"> +<summary> +Send inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="27852"> +<summary> +Do not audit attempts to send inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_inetd_child_server_packets" lineno="27871"> +<summary> +Receive inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="27890"> +<summary> +Do not audit attempts to receive inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="27909"> +<summary> +Send and receive inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="27925"> +<summary> +Do not audit attempts to send and receive inetd_child_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_inetd_child_server_packets" lineno="27940"> +<summary> +Relabel packets to inetd_child_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_innd_port" lineno="27962"> +<summary> +Send and receive TCP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_innd_port" lineno="27981"> +<summary> +Send UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_innd_port" lineno="28000"> +<summary> +Do not audit attempts to send UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_innd_port" lineno="28019"> +<summary> +Receive UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="28038"> +<summary> +Do not audit attempts to receive UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_innd_port" lineno="28057"> +<summary> +Send and receive UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="28074"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the innd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_innd_port" lineno="28090"> +<summary> +Bind TCP sockets to the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_innd_port" lineno="28110"> +<summary> +Bind UDP sockets to the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_innd_port" lineno="28129"> +<summary> +Make a TCP connection to the innd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_innd_client_packets" lineno="28149"> +<summary> +Send innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_innd_client_packets" lineno="28168"> +<summary> +Do not audit attempts to send innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_innd_client_packets" lineno="28187"> +<summary> +Receive innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="28206"> +<summary> +Do not audit attempts to receive innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_innd_client_packets" lineno="28225"> +<summary> +Send and receive innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="28241"> +<summary> +Do not audit attempts to send and receive innd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_innd_client_packets" lineno="28256"> +<summary> +Relabel packets to innd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_innd_server_packets" lineno="28276"> +<summary> +Send innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_innd_server_packets" lineno="28295"> +<summary> +Do not audit attempts to send innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_innd_server_packets" lineno="28314"> +<summary> +Receive innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="28333"> +<summary> +Do not audit attempts to receive innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_innd_server_packets" lineno="28352"> +<summary> +Send and receive innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="28368"> +<summary> +Do not audit attempts to send and receive innd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_innd_server_packets" lineno="28383"> +<summary> +Relabel packets to innd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="28405"> +<summary> +Send and receive TCP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ipmi_port" lineno="28424"> +<summary> +Send UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="28443"> +<summary> +Do not audit attempts to send UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ipmi_port" lineno="28462"> +<summary> +Receive UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="28481"> +<summary> +Do not audit attempts to receive UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ipmi_port" lineno="28500"> +<summary> +Send and receive UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="28517"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ipmi_port" lineno="28533"> +<summary> +Bind TCP sockets to the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ipmi_port" lineno="28553"> +<summary> +Bind UDP sockets to the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ipmi_port" lineno="28572"> +<summary> +Make a TCP connection to the ipmi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipmi_client_packets" lineno="28592"> +<summary> +Send ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="28611"> +<summary> +Do not audit attempts to send ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipmi_client_packets" lineno="28630"> +<summary> +Receive ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="28649"> +<summary> +Do not audit attempts to receive ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipmi_client_packets" lineno="28668"> +<summary> +Send and receive ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="28684"> +<summary> +Do not audit attempts to send and receive ipmi_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipmi_client_packets" lineno="28699"> +<summary> +Relabel packets to ipmi_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipmi_server_packets" lineno="28719"> +<summary> +Send ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="28738"> +<summary> +Do not audit attempts to send ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipmi_server_packets" lineno="28757"> +<summary> +Receive ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="28776"> +<summary> +Do not audit attempts to receive ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipmi_server_packets" lineno="28795"> +<summary> +Send and receive ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="28811"> +<summary> +Do not audit attempts to send and receive ipmi_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipmi_server_packets" lineno="28826"> +<summary> +Relabel packets to ipmi_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ipp_port" lineno="28848"> +<summary> +Send and receive TCP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ipp_port" lineno="28867"> +<summary> +Send UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="28886"> +<summary> +Do not audit attempts to send UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ipp_port" lineno="28905"> +<summary> +Receive UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="28924"> +<summary> +Do not audit attempts to receive UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ipp_port" lineno="28943"> +<summary> +Send and receive UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="28960"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ipp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ipp_port" lineno="28976"> +<summary> +Bind TCP sockets to the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ipp_port" lineno="28996"> +<summary> +Bind UDP sockets to the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ipp_port" lineno="29015"> +<summary> +Make a TCP connection to the ipp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipp_client_packets" lineno="29035"> +<summary> +Send ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="29054"> +<summary> +Do not audit attempts to send ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipp_client_packets" lineno="29073"> +<summary> +Receive ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="29092"> +<summary> +Do not audit attempts to receive ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipp_client_packets" lineno="29111"> +<summary> +Send and receive ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="29127"> +<summary> +Do not audit attempts to send and receive ipp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipp_client_packets" lineno="29142"> +<summary> +Relabel packets to ipp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipp_server_packets" lineno="29162"> +<summary> +Send ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="29181"> +<summary> +Do not audit attempts to send ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipp_server_packets" lineno="29200"> +<summary> +Receive ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="29219"> +<summary> +Do not audit attempts to receive ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipp_server_packets" lineno="29238"> +<summary> +Send and receive ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="29254"> +<summary> +Do not audit attempts to send and receive ipp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipp_server_packets" lineno="29269"> +<summary> +Relabel packets to ipp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="29291"> +<summary> +Send and receive TCP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ipsecnat_port" lineno="29310"> +<summary> +Send UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="29329"> +<summary> +Do not audit attempts to send UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ipsecnat_port" lineno="29348"> +<summary> +Receive UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="29367"> +<summary> +Do not audit attempts to receive UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="29386"> +<summary> +Send and receive UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="29403"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ipsecnat_port" lineno="29419"> +<summary> +Bind TCP sockets to the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ipsecnat_port" lineno="29439"> +<summary> +Bind UDP sockets to the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ipsecnat_port" lineno="29458"> +<summary> +Make a TCP connection to the ipsecnat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipsecnat_client_packets" lineno="29478"> +<summary> +Send ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="29497"> +<summary> +Do not audit attempts to send ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipsecnat_client_packets" lineno="29516"> +<summary> +Receive ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="29535"> +<summary> +Do not audit attempts to receive ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="29554"> +<summary> +Send and receive ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="29570"> +<summary> +Do not audit attempts to send and receive ipsecnat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="29585"> +<summary> +Relabel packets to ipsecnat_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ipsecnat_server_packets" lineno="29605"> +<summary> +Send ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="29624"> +<summary> +Do not audit attempts to send ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ipsecnat_server_packets" lineno="29643"> +<summary> +Receive ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="29662"> +<summary> +Do not audit attempts to receive ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="29681"> +<summary> +Send and receive ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="29697"> +<summary> +Do not audit attempts to send and receive ipsecnat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="29712"> +<summary> +Relabel packets to ipsecnat_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ircd_port" lineno="29734"> +<summary> +Send and receive TCP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ircd_port" lineno="29753"> +<summary> +Send UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="29772"> +<summary> +Do not audit attempts to send UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ircd_port" lineno="29791"> +<summary> +Receive UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="29810"> +<summary> +Do not audit attempts to receive UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ircd_port" lineno="29829"> +<summary> +Send and receive UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="29846"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ircd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ircd_port" lineno="29862"> +<summary> +Bind TCP sockets to the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ircd_port" lineno="29882"> +<summary> +Bind UDP sockets to the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ircd_port" lineno="29901"> +<summary> +Make a TCP connection to the ircd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ircd_client_packets" lineno="29921"> +<summary> +Send ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="29940"> +<summary> +Do not audit attempts to send ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ircd_client_packets" lineno="29959"> +<summary> +Receive ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="29978"> +<summary> +Do not audit attempts to receive ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ircd_client_packets" lineno="29997"> +<summary> +Send and receive ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="30013"> +<summary> +Do not audit attempts to send and receive ircd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ircd_client_packets" lineno="30028"> +<summary> +Relabel packets to ircd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ircd_server_packets" lineno="30048"> +<summary> +Send ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="30067"> +<summary> +Do not audit attempts to send ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ircd_server_packets" lineno="30086"> +<summary> +Receive ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="30105"> +<summary> +Do not audit attempts to receive ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ircd_server_packets" lineno="30124"> +<summary> +Send and receive ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="30140"> +<summary> +Do not audit attempts to send and receive ircd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ircd_server_packets" lineno="30155"> +<summary> +Relabel packets to ircd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="30177"> +<summary> +Send and receive TCP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_isakmp_port" lineno="30196"> +<summary> +Send UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="30215"> +<summary> +Do not audit attempts to send UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_isakmp_port" lineno="30234"> +<summary> +Receive UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="30253"> +<summary> +Do not audit attempts to receive UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_isakmp_port" lineno="30272"> +<summary> +Send and receive UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="30289"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_isakmp_port" lineno="30305"> +<summary> +Bind TCP sockets to the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_isakmp_port" lineno="30325"> +<summary> +Bind UDP sockets to the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_isakmp_port" lineno="30344"> +<summary> +Make a TCP connection to the isakmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_isakmp_client_packets" lineno="30364"> +<summary> +Send isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="30383"> +<summary> +Do not audit attempts to send isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_isakmp_client_packets" lineno="30402"> +<summary> +Receive isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="30421"> +<summary> +Do not audit attempts to receive isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_isakmp_client_packets" lineno="30440"> +<summary> +Send and receive isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="30456"> +<summary> +Do not audit attempts to send and receive isakmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_isakmp_client_packets" lineno="30471"> +<summary> +Relabel packets to isakmp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_isakmp_server_packets" lineno="30491"> +<summary> +Send isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="30510"> +<summary> +Do not audit attempts to send isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_isakmp_server_packets" lineno="30529"> +<summary> +Receive isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="30548"> +<summary> +Do not audit attempts to receive isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_isakmp_server_packets" lineno="30567"> +<summary> +Send and receive isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="30583"> +<summary> +Do not audit attempts to send and receive isakmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_isakmp_server_packets" lineno="30598"> +<summary> +Relabel packets to isakmp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="30620"> +<summary> +Send and receive TCP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_iscsi_port" lineno="30639"> +<summary> +Send UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="30658"> +<summary> +Do not audit attempts to send UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_iscsi_port" lineno="30677"> +<summary> +Receive UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="30696"> +<summary> +Do not audit attempts to receive UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_iscsi_port" lineno="30715"> +<summary> +Send and receive UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="30732"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_iscsi_port" lineno="30748"> +<summary> +Bind TCP sockets to the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_iscsi_port" lineno="30768"> +<summary> +Bind UDP sockets to the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_iscsi_port" lineno="30787"> +<summary> +Make a TCP connection to the iscsi port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_iscsi_client_packets" lineno="30807"> +<summary> +Send iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="30826"> +<summary> +Do not audit attempts to send iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_iscsi_client_packets" lineno="30845"> +<summary> +Receive iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="30864"> +<summary> +Do not audit attempts to receive iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_iscsi_client_packets" lineno="30883"> +<summary> +Send and receive iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="30899"> +<summary> +Do not audit attempts to send and receive iscsi_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_iscsi_client_packets" lineno="30914"> +<summary> +Relabel packets to iscsi_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_iscsi_server_packets" lineno="30934"> +<summary> +Send iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="30953"> +<summary> +Do not audit attempts to send iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_iscsi_server_packets" lineno="30972"> +<summary> +Receive iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="30991"> +<summary> +Do not audit attempts to receive iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_iscsi_server_packets" lineno="31010"> +<summary> +Send and receive iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="31026"> +<summary> +Do not audit attempts to send and receive iscsi_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_iscsi_server_packets" lineno="31041"> +<summary> +Relabel packets to iscsi_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_isns_port" lineno="31063"> +<summary> +Send and receive TCP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_isns_port" lineno="31082"> +<summary> +Send UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_isns_port" lineno="31101"> +<summary> +Do not audit attempts to send UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_isns_port" lineno="31120"> +<summary> +Receive UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="31139"> +<summary> +Do not audit attempts to receive UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_isns_port" lineno="31158"> +<summary> +Send and receive UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="31175"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the isns port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_isns_port" lineno="31191"> +<summary> +Bind TCP sockets to the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_isns_port" lineno="31211"> +<summary> +Bind UDP sockets to the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_isns_port" lineno="31230"> +<summary> +Make a TCP connection to the isns port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_isns_client_packets" lineno="31250"> +<summary> +Send isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_isns_client_packets" lineno="31269"> +<summary> +Do not audit attempts to send isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_isns_client_packets" lineno="31288"> +<summary> +Receive isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="31307"> +<summary> +Do not audit attempts to receive isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_isns_client_packets" lineno="31326"> +<summary> +Send and receive isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="31342"> +<summary> +Do not audit attempts to send and receive isns_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_isns_client_packets" lineno="31357"> +<summary> +Relabel packets to isns_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_isns_server_packets" lineno="31377"> +<summary> +Send isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_isns_server_packets" lineno="31396"> +<summary> +Do not audit attempts to send isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_isns_server_packets" lineno="31415"> +<summary> +Receive isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="31434"> +<summary> +Do not audit attempts to receive isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_isns_server_packets" lineno="31453"> +<summary> +Send and receive isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="31469"> +<summary> +Do not audit attempts to send and receive isns_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_isns_server_packets" lineno="31484"> +<summary> +Relabel packets to isns_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="31506"> +<summary> +Send and receive TCP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_jabber_client_port" lineno="31525"> +<summary> +Send UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="31544"> +<summary> +Do not audit attempts to send UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_jabber_client_port" lineno="31563"> +<summary> +Receive UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="31582"> +<summary> +Do not audit attempts to receive UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="31601"> +<summary> +Send and receive UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="31618"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_jabber_client_port" lineno="31634"> +<summary> +Bind TCP sockets to the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_jabber_client_port" lineno="31654"> +<summary> +Bind UDP sockets to the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_jabber_client_port" lineno="31673"> +<summary> +Make a TCP connection to the jabber_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_jabber_client_client_packets" lineno="31693"> +<summary> +Send jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="31712"> +<summary> +Do not audit attempts to send jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_jabber_client_client_packets" lineno="31731"> +<summary> +Receive jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="31750"> +<summary> +Do not audit attempts to receive jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="31769"> +<summary> +Send and receive jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="31785"> +<summary> +Do not audit attempts to send and receive jabber_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_jabber_client_client_packets" lineno="31800"> +<summary> +Relabel packets to jabber_client_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_jabber_client_server_packets" lineno="31820"> +<summary> +Send jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="31839"> +<summary> +Do not audit attempts to send jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_jabber_client_server_packets" lineno="31858"> +<summary> +Receive jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="31877"> +<summary> +Do not audit attempts to receive jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="31896"> +<summary> +Send and receive jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="31912"> +<summary> +Do not audit attempts to send and receive jabber_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_jabber_client_server_packets" lineno="31927"> +<summary> +Relabel packets to jabber_client_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="31949"> +<summary> +Send and receive TCP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_jabber_interserver_port" lineno="31968"> +<summary> +Send UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="31987"> +<summary> +Do not audit attempts to send UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_jabber_interserver_port" lineno="32006"> +<summary> +Receive UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="32025"> +<summary> +Do not audit attempts to receive UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="32044"> +<summary> +Send and receive UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="32061"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="32077"> +<summary> +Bind TCP sockets to the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_jabber_interserver_port" lineno="32097"> +<summary> +Bind UDP sockets to the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="32116"> +<summary> +Make a TCP connection to the jabber_interserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_jabber_interserver_client_packets" lineno="32136"> +<summary> +Send jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="32155"> +<summary> +Do not audit attempts to send jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_jabber_interserver_client_packets" lineno="32174"> +<summary> +Receive jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="32193"> +<summary> +Do not audit attempts to receive jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="32212"> +<summary> +Send and receive jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="32228"> +<summary> +Do not audit attempts to send and receive jabber_interserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="32243"> +<summary> +Relabel packets to jabber_interserver_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_jabber_interserver_server_packets" lineno="32263"> +<summary> +Send jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="32282"> +<summary> +Do not audit attempts to send jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_jabber_interserver_server_packets" lineno="32301"> +<summary> +Receive jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="32320"> +<summary> +Do not audit attempts to receive jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="32339"> +<summary> +Send and receive jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="32355"> +<summary> +Do not audit attempts to send and receive jabber_interserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="32370"> +<summary> +Relabel packets to jabber_interserver_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="32392"> +<summary> +Send and receive TCP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_kerberos_port" lineno="32411"> +<summary> +Send UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="32430"> +<summary> +Do not audit attempts to send UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_kerberos_port" lineno="32449"> +<summary> +Receive UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="32468"> +<summary> +Do not audit attempts to receive UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_kerberos_port" lineno="32487"> +<summary> +Send and receive UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="32504"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_kerberos_port" lineno="32520"> +<summary> +Bind TCP sockets to the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_kerberos_port" lineno="32540"> +<summary> +Bind UDP sockets to the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_kerberos_port" lineno="32559"> +<summary> +Make a TCP connection to the kerberos port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_client_packets" lineno="32579"> +<summary> +Send kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="32598"> +<summary> +Do not audit attempts to send kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_client_packets" lineno="32617"> +<summary> +Receive kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="32636"> +<summary> +Do not audit attempts to receive kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_client_packets" lineno="32655"> +<summary> +Send and receive kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="32671"> +<summary> +Do not audit attempts to send and receive kerberos_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_client_packets" lineno="32686"> +<summary> +Relabel packets to kerberos_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_server_packets" lineno="32706"> +<summary> +Send kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="32725"> +<summary> +Do not audit attempts to send kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_server_packets" lineno="32744"> +<summary> +Receive kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="32763"> +<summary> +Do not audit attempts to receive kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_server_packets" lineno="32782"> +<summary> +Send and receive kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="32798"> +<summary> +Do not audit attempts to send and receive kerberos_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_server_packets" lineno="32813"> +<summary> +Relabel packets to kerberos_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="32835"> +<summary> +Send and receive TCP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_kerberos_admin_port" lineno="32854"> +<summary> +Send UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="32873"> +<summary> +Do not audit attempts to send UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_kerberos_admin_port" lineno="32892"> +<summary> +Receive UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="32911"> +<summary> +Do not audit attempts to receive UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="32930"> +<summary> +Send and receive UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="32947"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="32963"> +<summary> +Bind TCP sockets to the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_kerberos_admin_port" lineno="32983"> +<summary> +Bind UDP sockets to the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="33002"> +<summary> +Make a TCP connection to the kerberos_admin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_admin_client_packets" lineno="33022"> +<summary> +Send kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="33041"> +<summary> +Do not audit attempts to send kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_admin_client_packets" lineno="33060"> +<summary> +Receive kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="33079"> +<summary> +Do not audit attempts to receive kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="33098"> +<summary> +Send and receive kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="33114"> +<summary> +Do not audit attempts to send and receive kerberos_admin_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="33129"> +<summary> +Relabel packets to kerberos_admin_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_admin_server_packets" lineno="33149"> +<summary> +Send kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="33168"> +<summary> +Do not audit attempts to send kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_admin_server_packets" lineno="33187"> +<summary> +Receive kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="33206"> +<summary> +Do not audit attempts to receive kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="33225"> +<summary> +Send and receive kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="33241"> +<summary> +Do not audit attempts to send and receive kerberos_admin_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="33256"> +<summary> +Relabel packets to kerberos_admin_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="33278"> +<summary> +Send and receive TCP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_kerberos_master_port" lineno="33297"> +<summary> +Send UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="33316"> +<summary> +Do not audit attempts to send UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_kerberos_master_port" lineno="33335"> +<summary> +Receive UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="33354"> +<summary> +Do not audit attempts to receive UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="33373"> +<summary> +Send and receive UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="33390"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_kerberos_master_port" lineno="33406"> +<summary> +Bind TCP sockets to the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_kerberos_master_port" lineno="33426"> +<summary> +Bind UDP sockets to the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_kerberos_master_port" lineno="33445"> +<summary> +Make a TCP connection to the kerberos_master port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_master_client_packets" lineno="33465"> +<summary> +Send kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="33484"> +<summary> +Do not audit attempts to send kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_master_client_packets" lineno="33503"> +<summary> +Receive kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="33522"> +<summary> +Do not audit attempts to receive kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="33541"> +<summary> +Send and receive kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="33557"> +<summary> +Do not audit attempts to send and receive kerberos_master_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_master_client_packets" lineno="33572"> +<summary> +Relabel packets to kerberos_master_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kerberos_master_server_packets" lineno="33592"> +<summary> +Send kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="33611"> +<summary> +Do not audit attempts to send kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kerberos_master_server_packets" lineno="33630"> +<summary> +Receive kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="33649"> +<summary> +Do not audit attempts to receive kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="33668"> +<summary> +Send and receive kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="33684"> +<summary> +Do not audit attempts to send and receive kerberos_master_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kerberos_master_server_packets" lineno="33699"> +<summary> +Relabel packets to kerberos_master_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_kismet_port" lineno="33721"> +<summary> +Send and receive TCP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_kismet_port" lineno="33740"> +<summary> +Send UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_kismet_port" lineno="33759"> +<summary> +Do not audit attempts to send UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_kismet_port" lineno="33778"> +<summary> +Receive UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="33797"> +<summary> +Do not audit attempts to receive UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_kismet_port" lineno="33816"> +<summary> +Send and receive UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="33833"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the kismet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_kismet_port" lineno="33849"> +<summary> +Bind TCP sockets to the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_kismet_port" lineno="33869"> +<summary> +Bind UDP sockets to the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_kismet_port" lineno="33888"> +<summary> +Make a TCP connection to the kismet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kismet_client_packets" lineno="33908"> +<summary> +Send kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kismet_client_packets" lineno="33927"> +<summary> +Do not audit attempts to send kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kismet_client_packets" lineno="33946"> +<summary> +Receive kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="33965"> +<summary> +Do not audit attempts to receive kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kismet_client_packets" lineno="33984"> +<summary> +Send and receive kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="34000"> +<summary> +Do not audit attempts to send and receive kismet_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kismet_client_packets" lineno="34015"> +<summary> +Relabel packets to kismet_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kismet_server_packets" lineno="34035"> +<summary> +Send kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kismet_server_packets" lineno="34054"> +<summary> +Do not audit attempts to send kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kismet_server_packets" lineno="34073"> +<summary> +Receive kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="34092"> +<summary> +Do not audit attempts to receive kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kismet_server_packets" lineno="34111"> +<summary> +Send and receive kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="34127"> +<summary> +Do not audit attempts to send and receive kismet_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kismet_server_packets" lineno="34142"> +<summary> +Relabel packets to kismet_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_kprop_port" lineno="34164"> +<summary> +Send and receive TCP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_kprop_port" lineno="34183"> +<summary> +Send UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="34202"> +<summary> +Do not audit attempts to send UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_kprop_port" lineno="34221"> +<summary> +Receive UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="34240"> +<summary> +Do not audit attempts to receive UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_kprop_port" lineno="34259"> +<summary> +Send and receive UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="34276"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the kprop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_kprop_port" lineno="34292"> +<summary> +Bind TCP sockets to the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_kprop_port" lineno="34312"> +<summary> +Bind UDP sockets to the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_kprop_port" lineno="34331"> +<summary> +Make a TCP connection to the kprop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kprop_client_packets" lineno="34351"> +<summary> +Send kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="34370"> +<summary> +Do not audit attempts to send kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kprop_client_packets" lineno="34389"> +<summary> +Receive kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="34408"> +<summary> +Do not audit attempts to receive kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kprop_client_packets" lineno="34427"> +<summary> +Send and receive kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="34443"> +<summary> +Do not audit attempts to send and receive kprop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kprop_client_packets" lineno="34458"> +<summary> +Relabel packets to kprop_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_kprop_server_packets" lineno="34478"> +<summary> +Send kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="34497"> +<summary> +Do not audit attempts to send kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_kprop_server_packets" lineno="34516"> +<summary> +Receive kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="34535"> +<summary> +Do not audit attempts to receive kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_kprop_server_packets" lineno="34554"> +<summary> +Send and receive kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="34570"> +<summary> +Do not audit attempts to send and receive kprop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_kprop_server_packets" lineno="34585"> +<summary> +Relabel packets to kprop_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="34607"> +<summary> +Send and receive TCP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ktalkd_port" lineno="34626"> +<summary> +Send UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="34645"> +<summary> +Do not audit attempts to send UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ktalkd_port" lineno="34664"> +<summary> +Receive UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="34683"> +<summary> +Do not audit attempts to receive UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="34702"> +<summary> +Send and receive UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="34719"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ktalkd_port" lineno="34735"> +<summary> +Bind TCP sockets to the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ktalkd_port" lineno="34755"> +<summary> +Bind UDP sockets to the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ktalkd_port" lineno="34774"> +<summary> +Make a TCP connection to the ktalkd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ktalkd_client_packets" lineno="34794"> +<summary> +Send ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="34813"> +<summary> +Do not audit attempts to send ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ktalkd_client_packets" lineno="34832"> +<summary> +Receive ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="34851"> +<summary> +Do not audit attempts to receive ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="34870"> +<summary> +Send and receive ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="34886"> +<summary> +Do not audit attempts to send and receive ktalkd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ktalkd_client_packets" lineno="34901"> +<summary> +Relabel packets to ktalkd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ktalkd_server_packets" lineno="34921"> +<summary> +Send ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="34940"> +<summary> +Do not audit attempts to send ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ktalkd_server_packets" lineno="34959"> +<summary> +Receive ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="34978"> +<summary> +Do not audit attempts to receive ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="34997"> +<summary> +Send and receive ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="35013"> +<summary> +Do not audit attempts to send and receive ktalkd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ktalkd_server_packets" lineno="35028"> +<summary> +Relabel packets to ktalkd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ldap_port" lineno="35050"> +<summary> +Send and receive TCP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ldap_port" lineno="35069"> +<summary> +Send UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="35088"> +<summary> +Do not audit attempts to send UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ldap_port" lineno="35107"> +<summary> +Receive UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="35126"> +<summary> +Do not audit attempts to receive UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ldap_port" lineno="35145"> +<summary> +Send and receive UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="35162"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ldap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ldap_port" lineno="35178"> +<summary> +Bind TCP sockets to the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ldap_port" lineno="35198"> +<summary> +Bind UDP sockets to the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ldap_port" lineno="35217"> +<summary> +Make a TCP connection to the ldap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ldap_client_packets" lineno="35237"> +<summary> +Send ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="35256"> +<summary> +Do not audit attempts to send ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ldap_client_packets" lineno="35275"> +<summary> +Receive ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="35294"> +<summary> +Do not audit attempts to receive ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ldap_client_packets" lineno="35313"> +<summary> +Send and receive ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="35329"> +<summary> +Do not audit attempts to send and receive ldap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ldap_client_packets" lineno="35344"> +<summary> +Relabel packets to ldap_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ldap_server_packets" lineno="35364"> +<summary> +Send ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="35383"> +<summary> +Do not audit attempts to send ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ldap_server_packets" lineno="35402"> +<summary> +Receive ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="35421"> +<summary> +Do not audit attempts to receive ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ldap_server_packets" lineno="35440"> +<summary> +Send and receive ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="35456"> +<summary> +Do not audit attempts to send and receive ldap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ldap_server_packets" lineno="35471"> +<summary> +Relabel packets to ldap_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_lirc_port" lineno="35493"> +<summary> +Send and receive TCP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_lirc_port" lineno="35512"> +<summary> +Send UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="35531"> +<summary> +Do not audit attempts to send UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_lirc_port" lineno="35550"> +<summary> +Receive UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="35569"> +<summary> +Do not audit attempts to receive UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_lirc_port" lineno="35588"> +<summary> +Send and receive UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="35605"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the lirc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_lirc_port" lineno="35621"> +<summary> +Bind TCP sockets to the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_lirc_port" lineno="35641"> +<summary> +Bind UDP sockets to the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_lirc_port" lineno="35660"> +<summary> +Make a TCP connection to the lirc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lirc_client_packets" lineno="35680"> +<summary> +Send lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="35699"> +<summary> +Do not audit attempts to send lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lirc_client_packets" lineno="35718"> +<summary> +Receive lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="35737"> +<summary> +Do not audit attempts to receive lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lirc_client_packets" lineno="35756"> +<summary> +Send and receive lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="35772"> +<summary> +Do not audit attempts to send and receive lirc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lirc_client_packets" lineno="35787"> +<summary> +Relabel packets to lirc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lirc_server_packets" lineno="35807"> +<summary> +Send lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="35826"> +<summary> +Do not audit attempts to send lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lirc_server_packets" lineno="35845"> +<summary> +Receive lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="35864"> +<summary> +Do not audit attempts to receive lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lirc_server_packets" lineno="35883"> +<summary> +Send and receive lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="35899"> +<summary> +Do not audit attempts to send and receive lirc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lirc_server_packets" lineno="35914"> +<summary> +Relabel packets to lirc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="35936"> +<summary> +Send and receive TCP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_lmtp_port" lineno="35955"> +<summary> +Send UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="35974"> +<summary> +Do not audit attempts to send UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_lmtp_port" lineno="35993"> +<summary> +Receive UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="36012"> +<summary> +Do not audit attempts to receive UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_lmtp_port" lineno="36031"> +<summary> +Send and receive UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="36048"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_lmtp_port" lineno="36064"> +<summary> +Bind TCP sockets to the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_lmtp_port" lineno="36084"> +<summary> +Bind UDP sockets to the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_lmtp_port" lineno="36103"> +<summary> +Make a TCP connection to the lmtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lmtp_client_packets" lineno="36123"> +<summary> +Send lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="36142"> +<summary> +Do not audit attempts to send lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lmtp_client_packets" lineno="36161"> +<summary> +Receive lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="36180"> +<summary> +Do not audit attempts to receive lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lmtp_client_packets" lineno="36199"> +<summary> +Send and receive lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="36215"> +<summary> +Do not audit attempts to send and receive lmtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lmtp_client_packets" lineno="36230"> +<summary> +Relabel packets to lmtp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lmtp_server_packets" lineno="36250"> +<summary> +Send lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="36269"> +<summary> +Do not audit attempts to send lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lmtp_server_packets" lineno="36288"> +<summary> +Receive lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="36307"> +<summary> +Do not audit attempts to receive lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lmtp_server_packets" lineno="36326"> +<summary> +Send and receive lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="36342"> +<summary> +Do not audit attempts to send and receive lmtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lmtp_server_packets" lineno="36357"> +<summary> +Relabel packets to lmtp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="36379"> +<summary> +Send and receive TCP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_lrrd_port" lineno="36398"> +<summary> +Send UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="36417"> +<summary> +Do not audit attempts to send UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_lrrd_port" lineno="36436"> +<summary> +Receive UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="36455"> +<summary> +Do not audit attempts to receive UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_lrrd_port" lineno="36474"> +<summary> +Send and receive UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="36491"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_lrrd_port" lineno="36507"> +<summary> +Bind TCP sockets to the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_lrrd_port" lineno="36527"> +<summary> +Bind UDP sockets to the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_lrrd_port" lineno="36546"> +<summary> +Make a TCP connection to the lrrd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lrrd_client_packets" lineno="36566"> +<summary> +Send lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="36585"> +<summary> +Do not audit attempts to send lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lrrd_client_packets" lineno="36604"> +<summary> +Receive lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="36623"> +<summary> +Do not audit attempts to receive lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lrrd_client_packets" lineno="36642"> +<summary> +Send and receive lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="36658"> +<summary> +Do not audit attempts to send and receive lrrd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lrrd_client_packets" lineno="36673"> +<summary> +Relabel packets to lrrd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_lrrd_server_packets" lineno="36693"> +<summary> +Send lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="36712"> +<summary> +Do not audit attempts to send lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_lrrd_server_packets" lineno="36731"> +<summary> +Receive lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="36750"> +<summary> +Do not audit attempts to receive lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_lrrd_server_packets" lineno="36769"> +<summary> +Send and receive lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="36785"> +<summary> +Do not audit attempts to send and receive lrrd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_lrrd_server_packets" lineno="36800"> +<summary> +Relabel packets to lrrd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mail_port" lineno="36822"> +<summary> +Send and receive TCP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mail_port" lineno="36841"> +<summary> +Send UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mail_port" lineno="36860"> +<summary> +Do not audit attempts to send UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mail_port" lineno="36879"> +<summary> +Receive UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="36898"> +<summary> +Do not audit attempts to receive UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mail_port" lineno="36917"> +<summary> +Send and receive UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="36934"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mail port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mail_port" lineno="36950"> +<summary> +Bind TCP sockets to the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mail_port" lineno="36970"> +<summary> +Bind UDP sockets to the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mail_port" lineno="36989"> +<summary> +Make a TCP connection to the mail port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mail_client_packets" lineno="37009"> +<summary> +Send mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mail_client_packets" lineno="37028"> +<summary> +Do not audit attempts to send mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mail_client_packets" lineno="37047"> +<summary> +Receive mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="37066"> +<summary> +Do not audit attempts to receive mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mail_client_packets" lineno="37085"> +<summary> +Send and receive mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="37101"> +<summary> +Do not audit attempts to send and receive mail_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mail_client_packets" lineno="37116"> +<summary> +Relabel packets to mail_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mail_server_packets" lineno="37136"> +<summary> +Send mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mail_server_packets" lineno="37155"> +<summary> +Do not audit attempts to send mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mail_server_packets" lineno="37174"> +<summary> +Receive mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="37193"> +<summary> +Do not audit attempts to receive mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mail_server_packets" lineno="37212"> +<summary> +Send and receive mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="37228"> +<summary> +Do not audit attempts to send and receive mail_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mail_server_packets" lineno="37243"> +<summary> +Relabel packets to mail_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_matahari_port" lineno="37265"> +<summary> +Send and receive TCP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_matahari_port" lineno="37284"> +<summary> +Send UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="37303"> +<summary> +Do not audit attempts to send UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_matahari_port" lineno="37322"> +<summary> +Receive UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="37341"> +<summary> +Do not audit attempts to receive UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_matahari_port" lineno="37360"> +<summary> +Send and receive UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="37377"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the matahari port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_matahari_port" lineno="37393"> +<summary> +Bind TCP sockets to the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_matahari_port" lineno="37413"> +<summary> +Bind UDP sockets to the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_matahari_port" lineno="37432"> +<summary> +Make a TCP connection to the matahari port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_matahari_client_packets" lineno="37452"> +<summary> +Send matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="37471"> +<summary> +Do not audit attempts to send matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_matahari_client_packets" lineno="37490"> +<summary> +Receive matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="37509"> +<summary> +Do not audit attempts to receive matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_matahari_client_packets" lineno="37528"> +<summary> +Send and receive matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="37544"> +<summary> +Do not audit attempts to send and receive matahari_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_matahari_client_packets" lineno="37559"> +<summary> +Relabel packets to matahari_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_matahari_server_packets" lineno="37579"> +<summary> +Send matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="37598"> +<summary> +Do not audit attempts to send matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_matahari_server_packets" lineno="37617"> +<summary> +Receive matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="37636"> +<summary> +Do not audit attempts to receive matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_matahari_server_packets" lineno="37655"> +<summary> +Send and receive matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="37671"> +<summary> +Do not audit attempts to send and receive matahari_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_matahari_server_packets" lineno="37686"> +<summary> +Relabel packets to matahari_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_memcache_port" lineno="37708"> +<summary> +Send and receive TCP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_memcache_port" lineno="37727"> +<summary> +Send UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="37746"> +<summary> +Do not audit attempts to send UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_memcache_port" lineno="37765"> +<summary> +Receive UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="37784"> +<summary> +Do not audit attempts to receive UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_memcache_port" lineno="37803"> +<summary> +Send and receive UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="37820"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the memcache port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_memcache_port" lineno="37836"> +<summary> +Bind TCP sockets to the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_memcache_port" lineno="37856"> +<summary> +Bind UDP sockets to the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_memcache_port" lineno="37875"> +<summary> +Make a TCP connection to the memcache port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_memcache_client_packets" lineno="37895"> +<summary> +Send memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="37914"> +<summary> +Do not audit attempts to send memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_memcache_client_packets" lineno="37933"> +<summary> +Receive memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="37952"> +<summary> +Do not audit attempts to receive memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_memcache_client_packets" lineno="37971"> +<summary> +Send and receive memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="37987"> +<summary> +Do not audit attempts to send and receive memcache_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_memcache_client_packets" lineno="38002"> +<summary> +Relabel packets to memcache_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_memcache_server_packets" lineno="38022"> +<summary> +Send memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="38041"> +<summary> +Do not audit attempts to send memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_memcache_server_packets" lineno="38060"> +<summary> +Receive memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="38079"> +<summary> +Do not audit attempts to receive memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_memcache_server_packets" lineno="38098"> +<summary> +Send and receive memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="38114"> +<summary> +Do not audit attempts to send and receive memcache_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_memcache_server_packets" lineno="38129"> +<summary> +Relabel packets to memcache_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_milter_port" lineno="38151"> +<summary> +Send and receive TCP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_milter_port" lineno="38170"> +<summary> +Send UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_milter_port" lineno="38189"> +<summary> +Do not audit attempts to send UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_milter_port" lineno="38208"> +<summary> +Receive UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="38227"> +<summary> +Do not audit attempts to receive UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_milter_port" lineno="38246"> +<summary> +Send and receive UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="38263"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the milter port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_milter_port" lineno="38279"> +<summary> +Bind TCP sockets to the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_milter_port" lineno="38299"> +<summary> +Bind UDP sockets to the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_milter_port" lineno="38318"> +<summary> +Make a TCP connection to the milter port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_milter_client_packets" lineno="38338"> +<summary> +Send milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_milter_client_packets" lineno="38357"> +<summary> +Do not audit attempts to send milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_milter_client_packets" lineno="38376"> +<summary> +Receive milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="38395"> +<summary> +Do not audit attempts to receive milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_milter_client_packets" lineno="38414"> +<summary> +Send and receive milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="38430"> +<summary> +Do not audit attempts to send and receive milter_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_milter_client_packets" lineno="38445"> +<summary> +Relabel packets to milter_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_milter_server_packets" lineno="38465"> +<summary> +Send milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_milter_server_packets" lineno="38484"> +<summary> +Do not audit attempts to send milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_milter_server_packets" lineno="38503"> +<summary> +Receive milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="38522"> +<summary> +Do not audit attempts to receive milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_milter_server_packets" lineno="38541"> +<summary> +Send and receive milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="38557"> +<summary> +Do not audit attempts to send and receive milter_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_milter_server_packets" lineno="38572"> +<summary> +Relabel packets to milter_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="38594"> +<summary> +Send and receive TCP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mmcc_port" lineno="38613"> +<summary> +Send UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="38632"> +<summary> +Do not audit attempts to send UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mmcc_port" lineno="38651"> +<summary> +Receive UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="38670"> +<summary> +Do not audit attempts to receive UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mmcc_port" lineno="38689"> +<summary> +Send and receive UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="38706"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mmcc_port" lineno="38722"> +<summary> +Bind TCP sockets to the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mmcc_port" lineno="38742"> +<summary> +Bind UDP sockets to the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mmcc_port" lineno="38761"> +<summary> +Make a TCP connection to the mmcc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mmcc_client_packets" lineno="38781"> +<summary> +Send mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="38800"> +<summary> +Do not audit attempts to send mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mmcc_client_packets" lineno="38819"> +<summary> +Receive mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="38838"> +<summary> +Do not audit attempts to receive mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mmcc_client_packets" lineno="38857"> +<summary> +Send and receive mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="38873"> +<summary> +Do not audit attempts to send and receive mmcc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mmcc_client_packets" lineno="38888"> +<summary> +Relabel packets to mmcc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mmcc_server_packets" lineno="38908"> +<summary> +Send mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="38927"> +<summary> +Do not audit attempts to send mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mmcc_server_packets" lineno="38946"> +<summary> +Receive mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="38965"> +<summary> +Do not audit attempts to receive mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mmcc_server_packets" lineno="38984"> +<summary> +Send and receive mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="39000"> +<summary> +Do not audit attempts to send and receive mmcc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mmcc_server_packets" lineno="39015"> +<summary> +Relabel packets to mmcc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_monopd_port" lineno="39037"> +<summary> +Send and receive TCP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_monopd_port" lineno="39056"> +<summary> +Send UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="39075"> +<summary> +Do not audit attempts to send UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_monopd_port" lineno="39094"> +<summary> +Receive UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="39113"> +<summary> +Do not audit attempts to receive UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_monopd_port" lineno="39132"> +<summary> +Send and receive UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="39149"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the monopd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_monopd_port" lineno="39165"> +<summary> +Bind TCP sockets to the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_monopd_port" lineno="39185"> +<summary> +Bind UDP sockets to the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_monopd_port" lineno="39204"> +<summary> +Make a TCP connection to the monopd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_monopd_client_packets" lineno="39224"> +<summary> +Send monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="39243"> +<summary> +Do not audit attempts to send monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_monopd_client_packets" lineno="39262"> +<summary> +Receive monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="39281"> +<summary> +Do not audit attempts to receive monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_monopd_client_packets" lineno="39300"> +<summary> +Send and receive monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="39316"> +<summary> +Do not audit attempts to send and receive monopd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_monopd_client_packets" lineno="39331"> +<summary> +Relabel packets to monopd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_monopd_server_packets" lineno="39351"> +<summary> +Send monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="39370"> +<summary> +Do not audit attempts to send monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_monopd_server_packets" lineno="39389"> +<summary> +Receive monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="39408"> +<summary> +Do not audit attempts to receive monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_monopd_server_packets" lineno="39427"> +<summary> +Send and receive monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="39443"> +<summary> +Do not audit attempts to send and receive monopd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_monopd_server_packets" lineno="39458"> +<summary> +Relabel packets to monopd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mpd_port" lineno="39480"> +<summary> +Send and receive TCP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mpd_port" lineno="39499"> +<summary> +Send UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="39518"> +<summary> +Do not audit attempts to send UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mpd_port" lineno="39537"> +<summary> +Receive UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="39556"> +<summary> +Do not audit attempts to receive UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mpd_port" lineno="39575"> +<summary> +Send and receive UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="39592"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mpd_port" lineno="39608"> +<summary> +Bind TCP sockets to the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mpd_port" lineno="39628"> +<summary> +Bind UDP sockets to the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mpd_port" lineno="39647"> +<summary> +Make a TCP connection to the mpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mpd_client_packets" lineno="39667"> +<summary> +Send mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="39686"> +<summary> +Do not audit attempts to send mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mpd_client_packets" lineno="39705"> +<summary> +Receive mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="39724"> +<summary> +Do not audit attempts to receive mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mpd_client_packets" lineno="39743"> +<summary> +Send and receive mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="39759"> +<summary> +Do not audit attempts to send and receive mpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mpd_client_packets" lineno="39774"> +<summary> +Relabel packets to mpd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mpd_server_packets" lineno="39794"> +<summary> +Send mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="39813"> +<summary> +Do not audit attempts to send mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mpd_server_packets" lineno="39832"> +<summary> +Receive mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="39851"> +<summary> +Do not audit attempts to receive mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mpd_server_packets" lineno="39870"> +<summary> +Send and receive mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="39886"> +<summary> +Do not audit attempts to send and receive mpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mpd_server_packets" lineno="39901"> +<summary> +Relabel packets to mpd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_msnp_port" lineno="39923"> +<summary> +Send and receive TCP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_msnp_port" lineno="39942"> +<summary> +Send UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="39961"> +<summary> +Do not audit attempts to send UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_msnp_port" lineno="39980"> +<summary> +Receive UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="39999"> +<summary> +Do not audit attempts to receive UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_msnp_port" lineno="40018"> +<summary> +Send and receive UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="40035"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the msnp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_msnp_port" lineno="40051"> +<summary> +Bind TCP sockets to the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_msnp_port" lineno="40071"> +<summary> +Bind UDP sockets to the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_msnp_port" lineno="40090"> +<summary> +Make a TCP connection to the msnp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_msnp_client_packets" lineno="40110"> +<summary> +Send msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="40129"> +<summary> +Do not audit attempts to send msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_msnp_client_packets" lineno="40148"> +<summary> +Receive msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="40167"> +<summary> +Do not audit attempts to receive msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_msnp_client_packets" lineno="40186"> +<summary> +Send and receive msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="40202"> +<summary> +Do not audit attempts to send and receive msnp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_msnp_client_packets" lineno="40217"> +<summary> +Relabel packets to msnp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_msnp_server_packets" lineno="40237"> +<summary> +Send msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="40256"> +<summary> +Do not audit attempts to send msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_msnp_server_packets" lineno="40275"> +<summary> +Receive msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="40294"> +<summary> +Do not audit attempts to receive msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_msnp_server_packets" lineno="40313"> +<summary> +Send and receive msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="40329"> +<summary> +Do not audit attempts to send and receive msnp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_msnp_server_packets" lineno="40344"> +<summary> +Relabel packets to msnp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mssql_port" lineno="40366"> +<summary> +Send and receive TCP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mssql_port" lineno="40385"> +<summary> +Send UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="40404"> +<summary> +Do not audit attempts to send UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mssql_port" lineno="40423"> +<summary> +Receive UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="40442"> +<summary> +Do not audit attempts to receive UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mssql_port" lineno="40461"> +<summary> +Send and receive UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="40478"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mssql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mssql_port" lineno="40494"> +<summary> +Bind TCP sockets to the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mssql_port" lineno="40514"> +<summary> +Bind UDP sockets to the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mssql_port" lineno="40533"> +<summary> +Make a TCP connection to the mssql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mssql_client_packets" lineno="40553"> +<summary> +Send mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="40572"> +<summary> +Do not audit attempts to send mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mssql_client_packets" lineno="40591"> +<summary> +Receive mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="40610"> +<summary> +Do not audit attempts to receive mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mssql_client_packets" lineno="40629"> +<summary> +Send and receive mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="40645"> +<summary> +Do not audit attempts to send and receive mssql_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mssql_client_packets" lineno="40660"> +<summary> +Relabel packets to mssql_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mssql_server_packets" lineno="40680"> +<summary> +Send mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="40699"> +<summary> +Do not audit attempts to send mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mssql_server_packets" lineno="40718"> +<summary> +Receive mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="40737"> +<summary> +Do not audit attempts to receive mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mssql_server_packets" lineno="40756"> +<summary> +Send and receive mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="40772"> +<summary> +Do not audit attempts to send and receive mssql_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mssql_server_packets" lineno="40787"> +<summary> +Relabel packets to mssql_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_munin_port" lineno="40809"> +<summary> +Send and receive TCP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_munin_port" lineno="40828"> +<summary> +Send UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_munin_port" lineno="40847"> +<summary> +Do not audit attempts to send UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_munin_port" lineno="40866"> +<summary> +Receive UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="40885"> +<summary> +Do not audit attempts to receive UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_munin_port" lineno="40904"> +<summary> +Send and receive UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="40921"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the munin port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_munin_port" lineno="40937"> +<summary> +Bind TCP sockets to the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_munin_port" lineno="40957"> +<summary> +Bind UDP sockets to the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_munin_port" lineno="40976"> +<summary> +Make a TCP connection to the munin port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_munin_client_packets" lineno="40996"> +<summary> +Send munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_munin_client_packets" lineno="41015"> +<summary> +Do not audit attempts to send munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_munin_client_packets" lineno="41034"> +<summary> +Receive munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="41053"> +<summary> +Do not audit attempts to receive munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_munin_client_packets" lineno="41072"> +<summary> +Send and receive munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="41088"> +<summary> +Do not audit attempts to send and receive munin_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_munin_client_packets" lineno="41103"> +<summary> +Relabel packets to munin_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_munin_server_packets" lineno="41123"> +<summary> +Send munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_munin_server_packets" lineno="41142"> +<summary> +Do not audit attempts to send munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_munin_server_packets" lineno="41161"> +<summary> +Receive munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="41180"> +<summary> +Do not audit attempts to receive munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_munin_server_packets" lineno="41199"> +<summary> +Send and receive munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="41215"> +<summary> +Do not audit attempts to send and receive munin_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_munin_server_packets" lineno="41230"> +<summary> +Relabel packets to munin_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="41252"> +<summary> +Send and receive TCP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mysqld_port" lineno="41271"> +<summary> +Send UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="41290"> +<summary> +Do not audit attempts to send UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mysqld_port" lineno="41309"> +<summary> +Receive UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="41328"> +<summary> +Do not audit attempts to receive UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mysqld_port" lineno="41347"> +<summary> +Send and receive UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="41364"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mysqld_port" lineno="41380"> +<summary> +Bind TCP sockets to the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mysqld_port" lineno="41400"> +<summary> +Bind UDP sockets to the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mysqld_port" lineno="41419"> +<summary> +Make a TCP connection to the mysqld port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mysqld_client_packets" lineno="41439"> +<summary> +Send mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="41458"> +<summary> +Do not audit attempts to send mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mysqld_client_packets" lineno="41477"> +<summary> +Receive mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="41496"> +<summary> +Do not audit attempts to receive mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mysqld_client_packets" lineno="41515"> +<summary> +Send and receive mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="41531"> +<summary> +Do not audit attempts to send and receive mysqld_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mysqld_client_packets" lineno="41546"> +<summary> +Relabel packets to mysqld_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mysqld_server_packets" lineno="41566"> +<summary> +Send mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="41585"> +<summary> +Do not audit attempts to send mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mysqld_server_packets" lineno="41604"> +<summary> +Receive mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="41623"> +<summary> +Do not audit attempts to receive mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mysqld_server_packets" lineno="41642"> +<summary> +Send and receive mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="41658"> +<summary> +Do not audit attempts to send and receive mysqld_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mysqld_server_packets" lineno="41673"> +<summary> +Relabel packets to mysqld_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="41695"> +<summary> +Send and receive TCP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="41714"> +<summary> +Send UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="41733"> +<summary> +Do not audit attempts to send UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="41752"> +<summary> +Receive UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="41771"> +<summary> +Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="41790"> +<summary> +Send and receive UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="41807"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="41823"> +<summary> +Bind TCP sockets to the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="41843"> +<summary> +Bind UDP sockets to the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="41862"> +<summary> +Make a TCP connection to the mysqlmanagerd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="41882"> +<summary> +Send mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="41901"> +<summary> +Do not audit attempts to send mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="41920"> +<summary> +Receive mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="41939"> +<summary> +Do not audit attempts to receive mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="41958"> +<summary> +Send and receive mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="41974"> +<summary> +Do not audit attempts to send and receive mysqlmanagerd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="41989"> +<summary> +Relabel packets to mysqlmanagerd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="42009"> +<summary> +Send mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="42028"> +<summary> +Do not audit attempts to send mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="42047"> +<summary> +Receive mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="42066"> +<summary> +Do not audit attempts to receive mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="42085"> +<summary> +Send and receive mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="42101"> +<summary> +Do not audit attempts to send and receive mysqlmanagerd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="42116"> +<summary> +Relabel packets to mysqlmanagerd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_nessus_port" lineno="42138"> +<summary> +Send and receive TCP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_nessus_port" lineno="42157"> +<summary> +Send UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="42176"> +<summary> +Do not audit attempts to send UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_nessus_port" lineno="42195"> +<summary> +Receive UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="42214"> +<summary> +Do not audit attempts to receive UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_nessus_port" lineno="42233"> +<summary> +Send and receive UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="42250"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the nessus port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_nessus_port" lineno="42266"> +<summary> +Bind TCP sockets to the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_nessus_port" lineno="42286"> +<summary> +Bind UDP sockets to the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_nessus_port" lineno="42305"> +<summary> +Make a TCP connection to the nessus port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_nessus_client_packets" lineno="42325"> +<summary> +Send nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="42344"> +<summary> +Do not audit attempts to send nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_nessus_client_packets" lineno="42363"> +<summary> +Receive nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="42382"> +<summary> +Do not audit attempts to receive nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_nessus_client_packets" lineno="42401"> +<summary> +Send and receive nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="42417"> +<summary> +Do not audit attempts to send and receive nessus_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_nessus_client_packets" lineno="42432"> +<summary> +Relabel packets to nessus_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_nessus_server_packets" lineno="42452"> +<summary> +Send nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="42471"> +<summary> +Do not audit attempts to send nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_nessus_server_packets" lineno="42490"> +<summary> +Receive nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="42509"> +<summary> +Do not audit attempts to receive nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_nessus_server_packets" lineno="42528"> +<summary> +Send and receive nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="42544"> +<summary> +Do not audit attempts to send and receive nessus_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_nessus_server_packets" lineno="42559"> +<summary> +Relabel packets to nessus_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_netport_port" lineno="42581"> +<summary> +Send and receive TCP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_netport_port" lineno="42600"> +<summary> +Send UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_netport_port" lineno="42619"> +<summary> +Do not audit attempts to send UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_netport_port" lineno="42638"> +<summary> +Receive UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="42657"> +<summary> +Do not audit attempts to receive UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_netport_port" lineno="42676"> +<summary> +Send and receive UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="42693"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the netport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_netport_port" lineno="42709"> +<summary> +Bind TCP sockets to the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_netport_port" lineno="42729"> +<summary> +Bind UDP sockets to the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_netport_port" lineno="42748"> +<summary> +Make a TCP connection to the netport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_netport_client_packets" lineno="42768"> +<summary> +Send netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_netport_client_packets" lineno="42787"> +<summary> +Do not audit attempts to send netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_netport_client_packets" lineno="42806"> +<summary> +Receive netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="42825"> +<summary> +Do not audit attempts to receive netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_netport_client_packets" lineno="42844"> +<summary> +Send and receive netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="42860"> +<summary> +Do not audit attempts to send and receive netport_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_netport_client_packets" lineno="42875"> +<summary> +Relabel packets to netport_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_netport_server_packets" lineno="42895"> +<summary> +Send netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_netport_server_packets" lineno="42914"> +<summary> +Do not audit attempts to send netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_netport_server_packets" lineno="42933"> +<summary> +Receive netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="42952"> +<summary> +Do not audit attempts to receive netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_netport_server_packets" lineno="42971"> +<summary> +Send and receive netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="42987"> +<summary> +Do not audit attempts to send and receive netport_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_netport_server_packets" lineno="43002"> +<summary> +Relabel packets to netport_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="43024"> +<summary> +Send and receive TCP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_netsupport_port" lineno="43043"> +<summary> +Send UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="43062"> +<summary> +Do not audit attempts to send UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_netsupport_port" lineno="43081"> +<summary> +Receive UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="43100"> +<summary> +Do not audit attempts to receive UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_netsupport_port" lineno="43119"> +<summary> +Send and receive UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="43136"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_netsupport_port" lineno="43152"> +<summary> +Bind TCP sockets to the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_netsupport_port" lineno="43172"> +<summary> +Bind UDP sockets to the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_netsupport_port" lineno="43191"> +<summary> +Make a TCP connection to the netsupport port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_netsupport_client_packets" lineno="43211"> +<summary> +Send netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="43230"> +<summary> +Do not audit attempts to send netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_netsupport_client_packets" lineno="43249"> +<summary> +Receive netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="43268"> +<summary> +Do not audit attempts to receive netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_netsupport_client_packets" lineno="43287"> +<summary> +Send and receive netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="43303"> +<summary> +Do not audit attempts to send and receive netsupport_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_netsupport_client_packets" lineno="43318"> +<summary> +Relabel packets to netsupport_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_netsupport_server_packets" lineno="43338"> +<summary> +Send netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="43357"> +<summary> +Do not audit attempts to send netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_netsupport_server_packets" lineno="43376"> +<summary> +Receive netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="43395"> +<summary> +Do not audit attempts to receive netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_netsupport_server_packets" lineno="43414"> +<summary> +Send and receive netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="43430"> +<summary> +Do not audit attempts to send and receive netsupport_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_netsupport_server_packets" lineno="43445"> +<summary> +Relabel packets to netsupport_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="43467"> +<summary> +Send and receive TCP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_nmbd_port" lineno="43486"> +<summary> +Send UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="43505"> +<summary> +Do not audit attempts to send UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_nmbd_port" lineno="43524"> +<summary> +Receive UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="43543"> +<summary> +Do not audit attempts to receive UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_nmbd_port" lineno="43562"> +<summary> +Send and receive UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="43579"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_nmbd_port" lineno="43595"> +<summary> +Bind TCP sockets to the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_nmbd_port" lineno="43615"> +<summary> +Bind UDP sockets to the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_nmbd_port" lineno="43634"> +<summary> +Make a TCP connection to the nmbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_nmbd_client_packets" lineno="43654"> +<summary> +Send nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="43673"> +<summary> +Do not audit attempts to send nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_nmbd_client_packets" lineno="43692"> +<summary> +Receive nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="43711"> +<summary> +Do not audit attempts to receive nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_nmbd_client_packets" lineno="43730"> +<summary> +Send and receive nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="43746"> +<summary> +Do not audit attempts to send and receive nmbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_nmbd_client_packets" lineno="43761"> +<summary> +Relabel packets to nmbd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_nmbd_server_packets" lineno="43781"> +<summary> +Send nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="43800"> +<summary> +Do not audit attempts to send nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_nmbd_server_packets" lineno="43819"> +<summary> +Receive nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="43838"> +<summary> +Do not audit attempts to receive nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_nmbd_server_packets" lineno="43857"> +<summary> +Send and receive nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="43873"> +<summary> +Do not audit attempts to send and receive nmbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_nmbd_server_packets" lineno="43888"> +<summary> +Relabel packets to nmbd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ntop_port" lineno="43910"> +<summary> +Send and receive TCP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ntop_port" lineno="43929"> +<summary> +Send UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="43948"> +<summary> +Do not audit attempts to send UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ntop_port" lineno="43967"> +<summary> +Receive UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="43986"> +<summary> +Do not audit attempts to receive UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ntop_port" lineno="44005"> +<summary> +Send and receive UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="44022"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ntop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ntop_port" lineno="44038"> +<summary> +Bind TCP sockets to the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ntop_port" lineno="44058"> +<summary> +Bind UDP sockets to the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ntop_port" lineno="44077"> +<summary> +Make a TCP connection to the ntop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ntop_client_packets" lineno="44097"> +<summary> +Send ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="44116"> +<summary> +Do not audit attempts to send ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ntop_client_packets" lineno="44135"> +<summary> +Receive ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="44154"> +<summary> +Do not audit attempts to receive ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ntop_client_packets" lineno="44173"> +<summary> +Send and receive ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="44189"> +<summary> +Do not audit attempts to send and receive ntop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ntop_client_packets" lineno="44204"> +<summary> +Relabel packets to ntop_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ntop_server_packets" lineno="44224"> +<summary> +Send ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="44243"> +<summary> +Do not audit attempts to send ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ntop_server_packets" lineno="44262"> +<summary> +Receive ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="44281"> +<summary> +Do not audit attempts to receive ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ntop_server_packets" lineno="44300"> +<summary> +Send and receive ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="44316"> +<summary> +Do not audit attempts to send and receive ntop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ntop_server_packets" lineno="44331"> +<summary> +Relabel packets to ntop_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ntp_port" lineno="44353"> +<summary> +Send and receive TCP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ntp_port" lineno="44372"> +<summary> +Send UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="44391"> +<summary> +Do not audit attempts to send UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ntp_port" lineno="44410"> +<summary> +Receive UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="44429"> +<summary> +Do not audit attempts to receive UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ntp_port" lineno="44448"> +<summary> +Send and receive UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="44465"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ntp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ntp_port" lineno="44481"> +<summary> +Bind TCP sockets to the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ntp_port" lineno="44501"> +<summary> +Bind UDP sockets to the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ntp_port" lineno="44520"> +<summary> +Make a TCP connection to the ntp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ntp_client_packets" lineno="44540"> +<summary> +Send ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="44559"> +<summary> +Do not audit attempts to send ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ntp_client_packets" lineno="44578"> +<summary> +Receive ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="44597"> +<summary> +Do not audit attempts to receive ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ntp_client_packets" lineno="44616"> +<summary> +Send and receive ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="44632"> +<summary> +Do not audit attempts to send and receive ntp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ntp_client_packets" lineno="44647"> +<summary> +Relabel packets to ntp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ntp_server_packets" lineno="44667"> +<summary> +Send ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="44686"> +<summary> +Do not audit attempts to send ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ntp_server_packets" lineno="44705"> +<summary> +Receive ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="44724"> +<summary> +Do not audit attempts to receive ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ntp_server_packets" lineno="44743"> +<summary> +Send and receive ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="44759"> +<summary> +Do not audit attempts to send and receive ntp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ntp_server_packets" lineno="44774"> +<summary> +Relabel packets to ntp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_oracledb_port" lineno="44796"> +<summary> +Send and receive TCP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_oracledb_port" lineno="44815"> +<summary> +Send UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_oracledb_port" lineno="44834"> +<summary> +Do not audit attempts to send UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_oracledb_port" lineno="44853"> +<summary> +Receive UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_oracledb_port" lineno="44872"> +<summary> +Do not audit attempts to receive UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_oracledb_port" lineno="44891"> +<summary> +Send and receive UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_oracledb_port" lineno="44908"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_oracledb_port" lineno="44924"> +<summary> +Bind TCP sockets to the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_oracledb_port" lineno="44944"> +<summary> +Bind UDP sockets to the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_oracledb_port" lineno="44963"> +<summary> +Make a TCP connection to the oracledb port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_oracledb_client_packets" lineno="44983"> +<summary> +Send oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_oracledb_client_packets" lineno="45002"> +<summary> +Do not audit attempts to send oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_oracledb_client_packets" lineno="45021"> +<summary> +Receive oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_oracledb_client_packets" lineno="45040"> +<summary> +Do not audit attempts to receive oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_oracledb_client_packets" lineno="45059"> +<summary> +Send and receive oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_oracledb_client_packets" lineno="45075"> +<summary> +Do not audit attempts to send and receive oracledb_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_oracledb_client_packets" lineno="45090"> +<summary> +Relabel packets to oracledb_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_oracledb_server_packets" lineno="45110"> +<summary> +Send oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_oracledb_server_packets" lineno="45129"> +<summary> +Do not audit attempts to send oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_oracledb_server_packets" lineno="45148"> +<summary> +Receive oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_oracledb_server_packets" lineno="45167"> +<summary> +Do not audit attempts to receive oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_oracledb_server_packets" lineno="45186"> +<summary> +Send and receive oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_oracledb_server_packets" lineno="45202"> +<summary> +Do not audit attempts to send and receive oracledb_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_oracledb_server_packets" lineno="45217"> +<summary> +Relabel packets to oracledb_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="45239"> +<summary> +Send and receive TCP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ocsp_port" lineno="45258"> +<summary> +Send UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="45277"> +<summary> +Do not audit attempts to send UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ocsp_port" lineno="45296"> +<summary> +Receive UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="45315"> +<summary> +Do not audit attempts to receive UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ocsp_port" lineno="45334"> +<summary> +Send and receive UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="45351"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ocsp_port" lineno="45367"> +<summary> +Bind TCP sockets to the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ocsp_port" lineno="45387"> +<summary> +Bind UDP sockets to the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ocsp_port" lineno="45406"> +<summary> +Make a TCP connection to the ocsp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ocsp_client_packets" lineno="45426"> +<summary> +Send ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="45445"> +<summary> +Do not audit attempts to send ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ocsp_client_packets" lineno="45464"> +<summary> +Receive ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="45483"> +<summary> +Do not audit attempts to receive ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ocsp_client_packets" lineno="45502"> +<summary> +Send and receive ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="45518"> +<summary> +Do not audit attempts to send and receive ocsp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ocsp_client_packets" lineno="45533"> +<summary> +Relabel packets to ocsp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ocsp_server_packets" lineno="45553"> +<summary> +Send ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="45572"> +<summary> +Do not audit attempts to send ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ocsp_server_packets" lineno="45591"> +<summary> +Receive ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="45610"> +<summary> +Do not audit attempts to receive ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ocsp_server_packets" lineno="45629"> +<summary> +Send and receive ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="45645"> +<summary> +Do not audit attempts to send and receive ocsp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ocsp_server_packets" lineno="45660"> +<summary> +Relabel packets to ocsp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="45682"> +<summary> +Send and receive TCP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_openvpn_port" lineno="45701"> +<summary> +Send UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="45720"> +<summary> +Do not audit attempts to send UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_openvpn_port" lineno="45739"> +<summary> +Receive UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="45758"> +<summary> +Do not audit attempts to receive UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_openvpn_port" lineno="45777"> +<summary> +Send and receive UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="45794"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_openvpn_port" lineno="45810"> +<summary> +Bind TCP sockets to the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_openvpn_port" lineno="45830"> +<summary> +Bind UDP sockets to the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_openvpn_port" lineno="45849"> +<summary> +Make a TCP connection to the openvpn port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_openvpn_client_packets" lineno="45869"> +<summary> +Send openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="45888"> +<summary> +Do not audit attempts to send openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_openvpn_client_packets" lineno="45907"> +<summary> +Receive openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="45926"> +<summary> +Do not audit attempts to receive openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_openvpn_client_packets" lineno="45945"> +<summary> +Send and receive openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="45961"> +<summary> +Do not audit attempts to send and receive openvpn_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_openvpn_client_packets" lineno="45976"> +<summary> +Relabel packets to openvpn_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_openvpn_server_packets" lineno="45996"> +<summary> +Send openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="46015"> +<summary> +Do not audit attempts to send openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_openvpn_server_packets" lineno="46034"> +<summary> +Receive openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="46053"> +<summary> +Do not audit attempts to receive openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_openvpn_server_packets" lineno="46072"> +<summary> +Send and receive openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="46088"> +<summary> +Do not audit attempts to send and receive openvpn_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_openvpn_server_packets" lineno="46103"> +<summary> +Relabel packets to openvpn_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="46125"> +<summary> +Send and receive TCP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pegasus_http_port" lineno="46144"> +<summary> +Send UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="46163"> +<summary> +Do not audit attempts to send UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pegasus_http_port" lineno="46182"> +<summary> +Receive UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="46201"> +<summary> +Do not audit attempts to receive UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="46220"> +<summary> +Send and receive UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="46237"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pegasus_http_port" lineno="46253"> +<summary> +Bind TCP sockets to the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pegasus_http_port" lineno="46273"> +<summary> +Bind UDP sockets to the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pegasus_http_port" lineno="46292"> +<summary> +Make a TCP connection to the pegasus_http port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pegasus_http_client_packets" lineno="46312"> +<summary> +Send pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="46331"> +<summary> +Do not audit attempts to send pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pegasus_http_client_packets" lineno="46350"> +<summary> +Receive pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="46369"> +<summary> +Do not audit attempts to receive pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="46388"> +<summary> +Send and receive pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="46404"> +<summary> +Do not audit attempts to send and receive pegasus_http_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="46419"> +<summary> +Relabel packets to pegasus_http_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pegasus_http_server_packets" lineno="46439"> +<summary> +Send pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="46458"> +<summary> +Do not audit attempts to send pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pegasus_http_server_packets" lineno="46477"> +<summary> +Receive pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="46496"> +<summary> +Do not audit attempts to receive pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="46515"> +<summary> +Send and receive pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="46531"> +<summary> +Do not audit attempts to send and receive pegasus_http_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="46546"> +<summary> +Relabel packets to pegasus_http_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="46568"> +<summary> +Send and receive TCP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pegasus_https_port" lineno="46587"> +<summary> +Send UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="46606"> +<summary> +Do not audit attempts to send UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pegasus_https_port" lineno="46625"> +<summary> +Receive UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="46644"> +<summary> +Do not audit attempts to receive UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="46663"> +<summary> +Send and receive UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="46680"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pegasus_https_port" lineno="46696"> +<summary> +Bind TCP sockets to the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pegasus_https_port" lineno="46716"> +<summary> +Bind UDP sockets to the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pegasus_https_port" lineno="46735"> +<summary> +Make a TCP connection to the pegasus_https port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pegasus_https_client_packets" lineno="46755"> +<summary> +Send pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="46774"> +<summary> +Do not audit attempts to send pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pegasus_https_client_packets" lineno="46793"> +<summary> +Receive pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="46812"> +<summary> +Do not audit attempts to receive pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="46831"> +<summary> +Send and receive pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="46847"> +<summary> +Do not audit attempts to send and receive pegasus_https_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="46862"> +<summary> +Relabel packets to pegasus_https_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pegasus_https_server_packets" lineno="46882"> +<summary> +Send pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="46901"> +<summary> +Do not audit attempts to send pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pegasus_https_server_packets" lineno="46920"> +<summary> +Receive pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="46939"> +<summary> +Do not audit attempts to receive pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="46958"> +<summary> +Send and receive pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="46974"> +<summary> +Do not audit attempts to send and receive pegasus_https_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="46989"> +<summary> +Relabel packets to pegasus_https_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="47011"> +<summary> +Send and receive TCP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pgpkeyserver_port" lineno="47030"> +<summary> +Send UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="47049"> +<summary> +Do not audit attempts to send UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="47068"> +<summary> +Receive UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="47087"> +<summary> +Do not audit attempts to receive UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="47106"> +<summary> +Send and receive UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="47123"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="47139"> +<summary> +Bind TCP sockets to the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="47159"> +<summary> +Bind UDP sockets to the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="47178"> +<summary> +Make a TCP connection to the pgpkeyserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pgpkeyserver_client_packets" lineno="47198"> +<summary> +Send pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="47217"> +<summary> +Do not audit attempts to send pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="47236"> +<summary> +Receive pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="47255"> +<summary> +Do not audit attempts to receive pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="47274"> +<summary> +Send and receive pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="47290"> +<summary> +Do not audit attempts to send and receive pgpkeyserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="47305"> +<summary> +Relabel packets to pgpkeyserver_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pgpkeyserver_server_packets" lineno="47325"> +<summary> +Send pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="47344"> +<summary> +Do not audit attempts to send pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="47363"> +<summary> +Receive pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="47382"> +<summary> +Do not audit attempts to receive pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="47401"> +<summary> +Send and receive pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="47417"> +<summary> +Do not audit attempts to send and receive pgpkeyserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="47432"> +<summary> +Relabel packets to pgpkeyserver_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pingd_port" lineno="47454"> +<summary> +Send and receive TCP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pingd_port" lineno="47473"> +<summary> +Send UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="47492"> +<summary> +Do not audit attempts to send UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pingd_port" lineno="47511"> +<summary> +Receive UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="47530"> +<summary> +Do not audit attempts to receive UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pingd_port" lineno="47549"> +<summary> +Send and receive UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="47566"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pingd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pingd_port" lineno="47582"> +<summary> +Bind TCP sockets to the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pingd_port" lineno="47602"> +<summary> +Bind UDP sockets to the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pingd_port" lineno="47621"> +<summary> +Make a TCP connection to the pingd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pingd_client_packets" lineno="47641"> +<summary> +Send pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="47660"> +<summary> +Do not audit attempts to send pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pingd_client_packets" lineno="47679"> +<summary> +Receive pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="47698"> +<summary> +Do not audit attempts to receive pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pingd_client_packets" lineno="47717"> +<summary> +Send and receive pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="47733"> +<summary> +Do not audit attempts to send and receive pingd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pingd_client_packets" lineno="47748"> +<summary> +Relabel packets to pingd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pingd_server_packets" lineno="47768"> +<summary> +Send pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="47787"> +<summary> +Do not audit attempts to send pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pingd_server_packets" lineno="47806"> +<summary> +Receive pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="47825"> +<summary> +Do not audit attempts to receive pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pingd_server_packets" lineno="47844"> +<summary> +Send and receive pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="47860"> +<summary> +Do not audit attempts to send and receive pingd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pingd_server_packets" lineno="47875"> +<summary> +Relabel packets to pingd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pop_port" lineno="47897"> +<summary> +Send and receive TCP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pop_port" lineno="47916"> +<summary> +Send UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pop_port" lineno="47935"> +<summary> +Do not audit attempts to send UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pop_port" lineno="47954"> +<summary> +Receive UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="47973"> +<summary> +Do not audit attempts to receive UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pop_port" lineno="47992"> +<summary> +Send and receive UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="48009"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pop port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pop_port" lineno="48025"> +<summary> +Bind TCP sockets to the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pop_port" lineno="48045"> +<summary> +Bind UDP sockets to the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pop_port" lineno="48064"> +<summary> +Make a TCP connection to the pop port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pop_client_packets" lineno="48084"> +<summary> +Send pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pop_client_packets" lineno="48103"> +<summary> +Do not audit attempts to send pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pop_client_packets" lineno="48122"> +<summary> +Receive pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="48141"> +<summary> +Do not audit attempts to receive pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pop_client_packets" lineno="48160"> +<summary> +Send and receive pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="48176"> +<summary> +Do not audit attempts to send and receive pop_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pop_client_packets" lineno="48191"> +<summary> +Relabel packets to pop_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pop_server_packets" lineno="48211"> +<summary> +Send pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pop_server_packets" lineno="48230"> +<summary> +Do not audit attempts to send pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pop_server_packets" lineno="48249"> +<summary> +Receive pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="48268"> +<summary> +Do not audit attempts to receive pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pop_server_packets" lineno="48287"> +<summary> +Send and receive pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="48303"> +<summary> +Do not audit attempts to send and receive pop_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pop_server_packets" lineno="48318"> +<summary> +Relabel packets to pop_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_portmap_port" lineno="48340"> +<summary> +Send and receive TCP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_portmap_port" lineno="48359"> +<summary> +Send UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="48378"> +<summary> +Do not audit attempts to send UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_portmap_port" lineno="48397"> +<summary> +Receive UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="48416"> +<summary> +Do not audit attempts to receive UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_portmap_port" lineno="48435"> +<summary> +Send and receive UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="48452"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the portmap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_portmap_port" lineno="48468"> +<summary> +Bind TCP sockets to the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_portmap_port" lineno="48488"> +<summary> +Bind UDP sockets to the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_portmap_port" lineno="48507"> +<summary> +Make a TCP connection to the portmap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_portmap_client_packets" lineno="48527"> +<summary> +Send portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="48546"> +<summary> +Do not audit attempts to send portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_portmap_client_packets" lineno="48565"> +<summary> +Receive portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="48584"> +<summary> +Do not audit attempts to receive portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_portmap_client_packets" lineno="48603"> +<summary> +Send and receive portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="48619"> +<summary> +Do not audit attempts to send and receive portmap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_portmap_client_packets" lineno="48634"> +<summary> +Relabel packets to portmap_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_portmap_server_packets" lineno="48654"> +<summary> +Send portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="48673"> +<summary> +Do not audit attempts to send portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_portmap_server_packets" lineno="48692"> +<summary> +Receive portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="48711"> +<summary> +Do not audit attempts to receive portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_portmap_server_packets" lineno="48730"> +<summary> +Send and receive portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="48746"> +<summary> +Do not audit attempts to send and receive portmap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_portmap_server_packets" lineno="48761"> +<summary> +Relabel packets to portmap_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="48783"> +<summary> +Send and receive TCP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_postfix_policyd_port" lineno="48802"> +<summary> +Send UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="48821"> +<summary> +Do not audit attempts to send UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_postfix_policyd_port" lineno="48840"> +<summary> +Receive UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="48859"> +<summary> +Do not audit attempts to receive UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="48878"> +<summary> +Send and receive UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="48895"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="48911"> +<summary> +Bind TCP sockets to the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_postfix_policyd_port" lineno="48931"> +<summary> +Bind UDP sockets to the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="48950"> +<summary> +Make a TCP connection to the postfix_policyd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postfix_policyd_client_packets" lineno="48970"> +<summary> +Send postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="48989"> +<summary> +Do not audit attempts to send postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postfix_policyd_client_packets" lineno="49008"> +<summary> +Receive postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="49027"> +<summary> +Do not audit attempts to receive postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="49046"> +<summary> +Send and receive postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="49062"> +<summary> +Do not audit attempts to send and receive postfix_policyd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="49077"> +<summary> +Relabel packets to postfix_policyd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postfix_policyd_server_packets" lineno="49097"> +<summary> +Send postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="49116"> +<summary> +Do not audit attempts to send postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postfix_policyd_server_packets" lineno="49135"> +<summary> +Receive postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="49154"> +<summary> +Do not audit attempts to receive postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="49173"> +<summary> +Send and receive postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="49189"> +<summary> +Do not audit attempts to send and receive postfix_policyd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="49204"> +<summary> +Relabel packets to postfix_policyd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="49226"> +<summary> +Send and receive TCP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_postgresql_port" lineno="49245"> +<summary> +Send UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="49264"> +<summary> +Do not audit attempts to send UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_postgresql_port" lineno="49283"> +<summary> +Receive UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="49302"> +<summary> +Do not audit attempts to receive UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_postgresql_port" lineno="49321"> +<summary> +Send and receive UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="49338"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_postgresql_port" lineno="49354"> +<summary> +Bind TCP sockets to the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_postgresql_port" lineno="49374"> +<summary> +Bind UDP sockets to the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_postgresql_port" lineno="49393"> +<summary> +Make a TCP connection to the postgresql port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postgresql_client_packets" lineno="49413"> +<summary> +Send postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="49432"> +<summary> +Do not audit attempts to send postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postgresql_client_packets" lineno="49451"> +<summary> +Receive postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="49470"> +<summary> +Do not audit attempts to receive postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postgresql_client_packets" lineno="49489"> +<summary> +Send and receive postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="49505"> +<summary> +Do not audit attempts to send and receive postgresql_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postgresql_client_packets" lineno="49520"> +<summary> +Relabel packets to postgresql_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postgresql_server_packets" lineno="49540"> +<summary> +Send postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="49559"> +<summary> +Do not audit attempts to send postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postgresql_server_packets" lineno="49578"> +<summary> +Receive postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="49597"> +<summary> +Do not audit attempts to receive postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postgresql_server_packets" lineno="49616"> +<summary> +Send and receive postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="49632"> +<summary> +Do not audit attempts to send and receive postgresql_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postgresql_server_packets" lineno="49647"> +<summary> +Relabel packets to postgresql_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="49669"> +<summary> +Send and receive TCP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_postgrey_port" lineno="49688"> +<summary> +Send UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="49707"> +<summary> +Do not audit attempts to send UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_postgrey_port" lineno="49726"> +<summary> +Receive UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="49745"> +<summary> +Do not audit attempts to receive UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_postgrey_port" lineno="49764"> +<summary> +Send and receive UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="49781"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_postgrey_port" lineno="49797"> +<summary> +Bind TCP sockets to the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_postgrey_port" lineno="49817"> +<summary> +Bind UDP sockets to the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_postgrey_port" lineno="49836"> +<summary> +Make a TCP connection to the postgrey port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postgrey_client_packets" lineno="49856"> +<summary> +Send postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="49875"> +<summary> +Do not audit attempts to send postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postgrey_client_packets" lineno="49894"> +<summary> +Receive postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="49913"> +<summary> +Do not audit attempts to receive postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postgrey_client_packets" lineno="49932"> +<summary> +Send and receive postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="49948"> +<summary> +Do not audit attempts to send and receive postgrey_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postgrey_client_packets" lineno="49963"> +<summary> +Relabel packets to postgrey_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_postgrey_server_packets" lineno="49983"> +<summary> +Send postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="50002"> +<summary> +Do not audit attempts to send postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_postgrey_server_packets" lineno="50021"> +<summary> +Receive postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="50040"> +<summary> +Do not audit attempts to receive postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_postgrey_server_packets" lineno="50059"> +<summary> +Send and receive postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="50075"> +<summary> +Do not audit attempts to send and receive postgrey_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_postgrey_server_packets" lineno="50090"> +<summary> +Relabel packets to postgrey_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_prelude_port" lineno="50112"> +<summary> +Send and receive TCP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_prelude_port" lineno="50131"> +<summary> +Send UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="50150"> +<summary> +Do not audit attempts to send UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_prelude_port" lineno="50169"> +<summary> +Receive UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="50188"> +<summary> +Do not audit attempts to receive UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_prelude_port" lineno="50207"> +<summary> +Send and receive UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="50224"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the prelude port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_prelude_port" lineno="50240"> +<summary> +Bind TCP sockets to the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_prelude_port" lineno="50260"> +<summary> +Bind UDP sockets to the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_prelude_port" lineno="50279"> +<summary> +Make a TCP connection to the prelude port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_prelude_client_packets" lineno="50299"> +<summary> +Send prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="50318"> +<summary> +Do not audit attempts to send prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_prelude_client_packets" lineno="50337"> +<summary> +Receive prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="50356"> +<summary> +Do not audit attempts to receive prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_prelude_client_packets" lineno="50375"> +<summary> +Send and receive prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="50391"> +<summary> +Do not audit attempts to send and receive prelude_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_prelude_client_packets" lineno="50406"> +<summary> +Relabel packets to prelude_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_prelude_server_packets" lineno="50426"> +<summary> +Send prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="50445"> +<summary> +Do not audit attempts to send prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_prelude_server_packets" lineno="50464"> +<summary> +Receive prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="50483"> +<summary> +Do not audit attempts to receive prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_prelude_server_packets" lineno="50502"> +<summary> +Send and receive prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="50518"> +<summary> +Do not audit attempts to send and receive prelude_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_prelude_server_packets" lineno="50533"> +<summary> +Relabel packets to prelude_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_presence_port" lineno="50555"> +<summary> +Send and receive TCP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_presence_port" lineno="50574"> +<summary> +Send UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_presence_port" lineno="50593"> +<summary> +Do not audit attempts to send UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_presence_port" lineno="50612"> +<summary> +Receive UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="50631"> +<summary> +Do not audit attempts to receive UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_presence_port" lineno="50650"> +<summary> +Send and receive UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="50667"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the presence port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_presence_port" lineno="50683"> +<summary> +Bind TCP sockets to the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_presence_port" lineno="50703"> +<summary> +Bind UDP sockets to the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_presence_port" lineno="50722"> +<summary> +Make a TCP connection to the presence port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_presence_client_packets" lineno="50742"> +<summary> +Send presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_presence_client_packets" lineno="50761"> +<summary> +Do not audit attempts to send presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_presence_client_packets" lineno="50780"> +<summary> +Receive presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="50799"> +<summary> +Do not audit attempts to receive presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_presence_client_packets" lineno="50818"> +<summary> +Send and receive presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="50834"> +<summary> +Do not audit attempts to send and receive presence_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_presence_client_packets" lineno="50849"> +<summary> +Relabel packets to presence_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_presence_server_packets" lineno="50869"> +<summary> +Send presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_presence_server_packets" lineno="50888"> +<summary> +Do not audit attempts to send presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_presence_server_packets" lineno="50907"> +<summary> +Receive presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="50926"> +<summary> +Do not audit attempts to receive presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_presence_server_packets" lineno="50945"> +<summary> +Send and receive presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="50961"> +<summary> +Do not audit attempts to send and receive presence_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_presence_server_packets" lineno="50976"> +<summary> +Relabel packets to presence_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_printer_port" lineno="50998"> +<summary> +Send and receive TCP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_printer_port" lineno="51017"> +<summary> +Send UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_printer_port" lineno="51036"> +<summary> +Do not audit attempts to send UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_printer_port" lineno="51055"> +<summary> +Receive UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="51074"> +<summary> +Do not audit attempts to receive UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_printer_port" lineno="51093"> +<summary> +Send and receive UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="51110"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the printer port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_printer_port" lineno="51126"> +<summary> +Bind TCP sockets to the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_printer_port" lineno="51146"> +<summary> +Bind UDP sockets to the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_printer_port" lineno="51165"> +<summary> +Make a TCP connection to the printer port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_printer_client_packets" lineno="51185"> +<summary> +Send printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_printer_client_packets" lineno="51204"> +<summary> +Do not audit attempts to send printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_printer_client_packets" lineno="51223"> +<summary> +Receive printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="51242"> +<summary> +Do not audit attempts to receive printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_printer_client_packets" lineno="51261"> +<summary> +Send and receive printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="51277"> +<summary> +Do not audit attempts to send and receive printer_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_printer_client_packets" lineno="51292"> +<summary> +Relabel packets to printer_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_printer_server_packets" lineno="51312"> +<summary> +Send printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_printer_server_packets" lineno="51331"> +<summary> +Do not audit attempts to send printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_printer_server_packets" lineno="51350"> +<summary> +Receive printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="51369"> +<summary> +Do not audit attempts to receive printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_printer_server_packets" lineno="51388"> +<summary> +Send and receive printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="51404"> +<summary> +Do not audit attempts to send and receive printer_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_printer_server_packets" lineno="51419"> +<summary> +Relabel packets to printer_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ptal_port" lineno="51441"> +<summary> +Send and receive TCP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ptal_port" lineno="51460"> +<summary> +Send UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="51479"> +<summary> +Do not audit attempts to send UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ptal_port" lineno="51498"> +<summary> +Receive UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="51517"> +<summary> +Do not audit attempts to receive UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ptal_port" lineno="51536"> +<summary> +Send and receive UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="51553"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ptal port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ptal_port" lineno="51569"> +<summary> +Bind TCP sockets to the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ptal_port" lineno="51589"> +<summary> +Bind UDP sockets to the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ptal_port" lineno="51608"> +<summary> +Make a TCP connection to the ptal port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ptal_client_packets" lineno="51628"> +<summary> +Send ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="51647"> +<summary> +Do not audit attempts to send ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ptal_client_packets" lineno="51666"> +<summary> +Receive ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="51685"> +<summary> +Do not audit attempts to receive ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ptal_client_packets" lineno="51704"> +<summary> +Send and receive ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="51720"> +<summary> +Do not audit attempts to send and receive ptal_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ptal_client_packets" lineno="51735"> +<summary> +Relabel packets to ptal_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ptal_server_packets" lineno="51755"> +<summary> +Send ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="51774"> +<summary> +Do not audit attempts to send ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ptal_server_packets" lineno="51793"> +<summary> +Receive ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="51812"> +<summary> +Do not audit attempts to receive ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ptal_server_packets" lineno="51831"> +<summary> +Send and receive ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="51847"> +<summary> +Do not audit attempts to send and receive ptal_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ptal_server_packets" lineno="51862"> +<summary> +Relabel packets to ptal_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="51884"> +<summary> +Send and receive TCP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pulseaudio_port" lineno="51903"> +<summary> +Send UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="51922"> +<summary> +Do not audit attempts to send UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pulseaudio_port" lineno="51941"> +<summary> +Receive UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="51960"> +<summary> +Do not audit attempts to receive UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="51979"> +<summary> +Send and receive UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="51996"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pulseaudio_port" lineno="52012"> +<summary> +Bind TCP sockets to the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pulseaudio_port" lineno="52032"> +<summary> +Bind UDP sockets to the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pulseaudio_port" lineno="52051"> +<summary> +Make a TCP connection to the pulseaudio port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pulseaudio_client_packets" lineno="52071"> +<summary> +Send pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="52090"> +<summary> +Do not audit attempts to send pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pulseaudio_client_packets" lineno="52109"> +<summary> +Receive pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="52128"> +<summary> +Do not audit attempts to receive pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="52147"> +<summary> +Send and receive pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="52163"> +<summary> +Do not audit attempts to send and receive pulseaudio_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="52178"> +<summary> +Relabel packets to pulseaudio_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pulseaudio_server_packets" lineno="52198"> +<summary> +Send pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="52217"> +<summary> +Do not audit attempts to send pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pulseaudio_server_packets" lineno="52236"> +<summary> +Receive pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="52255"> +<summary> +Do not audit attempts to receive pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="52274"> +<summary> +Send and receive pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="52290"> +<summary> +Do not audit attempts to send and receive pulseaudio_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="52305"> +<summary> +Relabel packets to pulseaudio_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_puppet_port" lineno="52327"> +<summary> +Send and receive TCP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_puppet_port" lineno="52346"> +<summary> +Send UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="52365"> +<summary> +Do not audit attempts to send UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_puppet_port" lineno="52384"> +<summary> +Receive UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="52403"> +<summary> +Do not audit attempts to receive UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_puppet_port" lineno="52422"> +<summary> +Send and receive UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="52439"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the puppet port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_puppet_port" lineno="52455"> +<summary> +Bind TCP sockets to the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_puppet_port" lineno="52475"> +<summary> +Bind UDP sockets to the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_puppet_port" lineno="52494"> +<summary> +Make a TCP connection to the puppet port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_puppet_client_packets" lineno="52514"> +<summary> +Send puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="52533"> +<summary> +Do not audit attempts to send puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_puppet_client_packets" lineno="52552"> +<summary> +Receive puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="52571"> +<summary> +Do not audit attempts to receive puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_puppet_client_packets" lineno="52590"> +<summary> +Send and receive puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="52606"> +<summary> +Do not audit attempts to send and receive puppet_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_puppet_client_packets" lineno="52621"> +<summary> +Relabel packets to puppet_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_puppet_server_packets" lineno="52641"> +<summary> +Send puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="52660"> +<summary> +Do not audit attempts to send puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_puppet_server_packets" lineno="52679"> +<summary> +Receive puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="52698"> +<summary> +Do not audit attempts to receive puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_puppet_server_packets" lineno="52717"> +<summary> +Send and receive puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="52733"> +<summary> +Do not audit attempts to send and receive puppet_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_puppet_server_packets" lineno="52748"> +<summary> +Relabel packets to puppet_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pxe_port" lineno="52770"> +<summary> +Send and receive TCP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pxe_port" lineno="52789"> +<summary> +Send UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="52808"> +<summary> +Do not audit attempts to send UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pxe_port" lineno="52827"> +<summary> +Receive UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="52846"> +<summary> +Do not audit attempts to receive UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pxe_port" lineno="52865"> +<summary> +Send and receive UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="52882"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pxe port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pxe_port" lineno="52898"> +<summary> +Bind TCP sockets to the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pxe_port" lineno="52918"> +<summary> +Bind UDP sockets to the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pxe_port" lineno="52937"> +<summary> +Make a TCP connection to the pxe port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pxe_client_packets" lineno="52957"> +<summary> +Send pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="52976"> +<summary> +Do not audit attempts to send pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pxe_client_packets" lineno="52995"> +<summary> +Receive pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="53014"> +<summary> +Do not audit attempts to receive pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pxe_client_packets" lineno="53033"> +<summary> +Send and receive pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="53049"> +<summary> +Do not audit attempts to send and receive pxe_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pxe_client_packets" lineno="53064"> +<summary> +Relabel packets to pxe_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pxe_server_packets" lineno="53084"> +<summary> +Send pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="53103"> +<summary> +Do not audit attempts to send pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pxe_server_packets" lineno="53122"> +<summary> +Receive pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="53141"> +<summary> +Do not audit attempts to receive pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pxe_server_packets" lineno="53160"> +<summary> +Send and receive pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="53176"> +<summary> +Do not audit attempts to send and receive pxe_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pxe_server_packets" lineno="53191"> +<summary> +Relabel packets to pxe_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="53213"> +<summary> +Send and receive TCP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_pyzor_port" lineno="53232"> +<summary> +Send UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="53251"> +<summary> +Do not audit attempts to send UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_pyzor_port" lineno="53270"> +<summary> +Receive UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="53289"> +<summary> +Do not audit attempts to receive UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_pyzor_port" lineno="53308"> +<summary> +Send and receive UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="53325"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_pyzor_port" lineno="53341"> +<summary> +Bind TCP sockets to the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_pyzor_port" lineno="53361"> +<summary> +Bind UDP sockets to the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_pyzor_port" lineno="53380"> +<summary> +Make a TCP connection to the pyzor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pyzor_client_packets" lineno="53400"> +<summary> +Send pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="53419"> +<summary> +Do not audit attempts to send pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pyzor_client_packets" lineno="53438"> +<summary> +Receive pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="53457"> +<summary> +Do not audit attempts to receive pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pyzor_client_packets" lineno="53476"> +<summary> +Send and receive pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="53492"> +<summary> +Do not audit attempts to send and receive pyzor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pyzor_client_packets" lineno="53507"> +<summary> +Relabel packets to pyzor_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_pyzor_server_packets" lineno="53527"> +<summary> +Send pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="53546"> +<summary> +Do not audit attempts to send pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_pyzor_server_packets" lineno="53565"> +<summary> +Receive pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="53584"> +<summary> +Do not audit attempts to receive pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_pyzor_server_packets" lineno="53603"> +<summary> +Send and receive pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="53619"> +<summary> +Do not audit attempts to send and receive pyzor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_pyzor_server_packets" lineno="53634"> +<summary> +Relabel packets to pyzor_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_radacct_port" lineno="53656"> +<summary> +Send and receive TCP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_radacct_port" lineno="53675"> +<summary> +Send UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="53694"> +<summary> +Do not audit attempts to send UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_radacct_port" lineno="53713"> +<summary> +Receive UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="53732"> +<summary> +Do not audit attempts to receive UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_radacct_port" lineno="53751"> +<summary> +Send and receive UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="53768"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the radacct port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_radacct_port" lineno="53784"> +<summary> +Bind TCP sockets to the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_radacct_port" lineno="53804"> +<summary> +Bind UDP sockets to the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_radacct_port" lineno="53823"> +<summary> +Make a TCP connection to the radacct port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radacct_client_packets" lineno="53843"> +<summary> +Send radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="53862"> +<summary> +Do not audit attempts to send radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radacct_client_packets" lineno="53881"> +<summary> +Receive radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="53900"> +<summary> +Do not audit attempts to receive radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radacct_client_packets" lineno="53919"> +<summary> +Send and receive radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="53935"> +<summary> +Do not audit attempts to send and receive radacct_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radacct_client_packets" lineno="53950"> +<summary> +Relabel packets to radacct_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radacct_server_packets" lineno="53970"> +<summary> +Send radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="53989"> +<summary> +Do not audit attempts to send radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radacct_server_packets" lineno="54008"> +<summary> +Receive radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="54027"> +<summary> +Do not audit attempts to receive radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radacct_server_packets" lineno="54046"> +<summary> +Send and receive radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="54062"> +<summary> +Do not audit attempts to send and receive radacct_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radacct_server_packets" lineno="54077"> +<summary> +Relabel packets to radacct_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_radius_port" lineno="54099"> +<summary> +Send and receive TCP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_radius_port" lineno="54118"> +<summary> +Send UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_radius_port" lineno="54137"> +<summary> +Do not audit attempts to send UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_radius_port" lineno="54156"> +<summary> +Receive UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="54175"> +<summary> +Do not audit attempts to receive UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_radius_port" lineno="54194"> +<summary> +Send and receive UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="54211"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the radius port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_radius_port" lineno="54227"> +<summary> +Bind TCP sockets to the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_radius_port" lineno="54247"> +<summary> +Bind UDP sockets to the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_radius_port" lineno="54266"> +<summary> +Make a TCP connection to the radius port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radius_client_packets" lineno="54286"> +<summary> +Send radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radius_client_packets" lineno="54305"> +<summary> +Do not audit attempts to send radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radius_client_packets" lineno="54324"> +<summary> +Receive radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="54343"> +<summary> +Do not audit attempts to receive radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radius_client_packets" lineno="54362"> +<summary> +Send and receive radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="54378"> +<summary> +Do not audit attempts to send and receive radius_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radius_client_packets" lineno="54393"> +<summary> +Relabel packets to radius_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radius_server_packets" lineno="54413"> +<summary> +Send radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radius_server_packets" lineno="54432"> +<summary> +Do not audit attempts to send radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radius_server_packets" lineno="54451"> +<summary> +Receive radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="54470"> +<summary> +Do not audit attempts to receive radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radius_server_packets" lineno="54489"> +<summary> +Send and receive radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="54505"> +<summary> +Do not audit attempts to send and receive radius_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radius_server_packets" lineno="54520"> +<summary> +Relabel packets to radius_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_radsec_port" lineno="54542"> +<summary> +Send and receive TCP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_radsec_port" lineno="54561"> +<summary> +Send UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="54580"> +<summary> +Do not audit attempts to send UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_radsec_port" lineno="54599"> +<summary> +Receive UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="54618"> +<summary> +Do not audit attempts to receive UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_radsec_port" lineno="54637"> +<summary> +Send and receive UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="54654"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the radsec port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_radsec_port" lineno="54670"> +<summary> +Bind TCP sockets to the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_radsec_port" lineno="54690"> +<summary> +Bind UDP sockets to the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_radsec_port" lineno="54709"> +<summary> +Make a TCP connection to the radsec port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radsec_client_packets" lineno="54729"> +<summary> +Send radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="54748"> +<summary> +Do not audit attempts to send radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radsec_client_packets" lineno="54767"> +<summary> +Receive radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="54786"> +<summary> +Do not audit attempts to receive radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radsec_client_packets" lineno="54805"> +<summary> +Send and receive radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="54821"> +<summary> +Do not audit attempts to send and receive radsec_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radsec_client_packets" lineno="54836"> +<summary> +Relabel packets to radsec_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_radsec_server_packets" lineno="54856"> +<summary> +Send radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="54875"> +<summary> +Do not audit attempts to send radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_radsec_server_packets" lineno="54894"> +<summary> +Receive radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="54913"> +<summary> +Do not audit attempts to receive radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_radsec_server_packets" lineno="54932"> +<summary> +Send and receive radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="54948"> +<summary> +Do not audit attempts to send and receive radsec_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_radsec_server_packets" lineno="54963"> +<summary> +Relabel packets to radsec_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_razor_port" lineno="54985"> +<summary> +Send and receive TCP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_razor_port" lineno="55004"> +<summary> +Send UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_razor_port" lineno="55023"> +<summary> +Do not audit attempts to send UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_razor_port" lineno="55042"> +<summary> +Receive UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="55061"> +<summary> +Do not audit attempts to receive UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_razor_port" lineno="55080"> +<summary> +Send and receive UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="55097"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the razor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_razor_port" lineno="55113"> +<summary> +Bind TCP sockets to the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_razor_port" lineno="55133"> +<summary> +Bind UDP sockets to the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_razor_port" lineno="55152"> +<summary> +Make a TCP connection to the razor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_razor_client_packets" lineno="55172"> +<summary> +Send razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_razor_client_packets" lineno="55191"> +<summary> +Do not audit attempts to send razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_razor_client_packets" lineno="55210"> +<summary> +Receive razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="55229"> +<summary> +Do not audit attempts to receive razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_razor_client_packets" lineno="55248"> +<summary> +Send and receive razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="55264"> +<summary> +Do not audit attempts to send and receive razor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_razor_client_packets" lineno="55279"> +<summary> +Relabel packets to razor_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_razor_server_packets" lineno="55299"> +<summary> +Send razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_razor_server_packets" lineno="55318"> +<summary> +Do not audit attempts to send razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_razor_server_packets" lineno="55337"> +<summary> +Receive razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="55356"> +<summary> +Do not audit attempts to receive razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_razor_server_packets" lineno="55375"> +<summary> +Send and receive razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="55391"> +<summary> +Do not audit attempts to send and receive razor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_razor_server_packets" lineno="55406"> +<summary> +Relabel packets to razor_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_repository_port" lineno="55428"> +<summary> +Send and receive TCP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_repository_port" lineno="55447"> +<summary> +Send UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_repository_port" lineno="55466"> +<summary> +Do not audit attempts to send UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_repository_port" lineno="55485"> +<summary> +Receive UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="55504"> +<summary> +Do not audit attempts to receive UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_repository_port" lineno="55523"> +<summary> +Send and receive UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="55540"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the repository port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_repository_port" lineno="55556"> +<summary> +Bind TCP sockets to the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_repository_port" lineno="55576"> +<summary> +Bind UDP sockets to the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_repository_port" lineno="55595"> +<summary> +Make a TCP connection to the repository port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_repository_client_packets" lineno="55615"> +<summary> +Send repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_repository_client_packets" lineno="55634"> +<summary> +Do not audit attempts to send repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_repository_client_packets" lineno="55653"> +<summary> +Receive repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="55672"> +<summary> +Do not audit attempts to receive repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_repository_client_packets" lineno="55691"> +<summary> +Send and receive repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="55707"> +<summary> +Do not audit attempts to send and receive repository_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_repository_client_packets" lineno="55722"> +<summary> +Relabel packets to repository_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_repository_server_packets" lineno="55742"> +<summary> +Send repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_repository_server_packets" lineno="55761"> +<summary> +Do not audit attempts to send repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_repository_server_packets" lineno="55780"> +<summary> +Receive repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="55799"> +<summary> +Do not audit attempts to receive repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_repository_server_packets" lineno="55818"> +<summary> +Send and receive repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="55834"> +<summary> +Do not audit attempts to send and receive repository_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_repository_server_packets" lineno="55849"> +<summary> +Relabel packets to repository_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ricci_port" lineno="55871"> +<summary> +Send and receive TCP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ricci_port" lineno="55890"> +<summary> +Send UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="55909"> +<summary> +Do not audit attempts to send UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ricci_port" lineno="55928"> +<summary> +Receive UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="55947"> +<summary> +Do not audit attempts to receive UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ricci_port" lineno="55966"> +<summary> +Send and receive UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="55983"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ricci port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ricci_port" lineno="55999"> +<summary> +Bind TCP sockets to the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ricci_port" lineno="56019"> +<summary> +Bind UDP sockets to the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ricci_port" lineno="56038"> +<summary> +Make a TCP connection to the ricci port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ricci_client_packets" lineno="56058"> +<summary> +Send ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="56077"> +<summary> +Do not audit attempts to send ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ricci_client_packets" lineno="56096"> +<summary> +Receive ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="56115"> +<summary> +Do not audit attempts to receive ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ricci_client_packets" lineno="56134"> +<summary> +Send and receive ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="56150"> +<summary> +Do not audit attempts to send and receive ricci_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ricci_client_packets" lineno="56165"> +<summary> +Relabel packets to ricci_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ricci_server_packets" lineno="56185"> +<summary> +Send ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="56204"> +<summary> +Do not audit attempts to send ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ricci_server_packets" lineno="56223"> +<summary> +Receive ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="56242"> +<summary> +Do not audit attempts to receive ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ricci_server_packets" lineno="56261"> +<summary> +Send and receive ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="56277"> +<summary> +Do not audit attempts to send and receive ricci_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ricci_server_packets" lineno="56292"> +<summary> +Relabel packets to ricci_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="56314"> +<summary> +Send and receive TCP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ricci_modcluster_port" lineno="56333"> +<summary> +Send UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="56352"> +<summary> +Do not audit attempts to send UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="56371"> +<summary> +Receive UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="56390"> +<summary> +Do not audit attempts to receive UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="56409"> +<summary> +Send and receive UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="56426"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="56442"> +<summary> +Bind TCP sockets to the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="56462"> +<summary> +Bind UDP sockets to the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="56481"> +<summary> +Make a TCP connection to the ricci_modcluster port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ricci_modcluster_client_packets" lineno="56501"> +<summary> +Send ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="56520"> +<summary> +Do not audit attempts to send ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="56539"> +<summary> +Receive ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="56558"> +<summary> +Do not audit attempts to receive ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="56577"> +<summary> +Send and receive ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="56593"> +<summary> +Do not audit attempts to send and receive ricci_modcluster_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="56608"> +<summary> +Relabel packets to ricci_modcluster_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ricci_modcluster_server_packets" lineno="56628"> +<summary> +Send ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="56647"> +<summary> +Do not audit attempts to send ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="56666"> +<summary> +Receive ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="56685"> +<summary> +Do not audit attempts to receive ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="56704"> +<summary> +Send and receive ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="56720"> +<summary> +Do not audit attempts to send and receive ricci_modcluster_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="56735"> +<summary> +Relabel packets to ricci_modcluster_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="56757"> +<summary> +Send and receive TCP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_rlogind_port" lineno="56776"> +<summary> +Send UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="56795"> +<summary> +Do not audit attempts to send UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_rlogind_port" lineno="56814"> +<summary> +Receive UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="56833"> +<summary> +Do not audit attempts to receive UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_rlogind_port" lineno="56852"> +<summary> +Send and receive UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="56869"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_rlogind_port" lineno="56885"> +<summary> +Bind TCP sockets to the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_rlogind_port" lineno="56905"> +<summary> +Bind UDP sockets to the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_rlogind_port" lineno="56924"> +<summary> +Make a TCP connection to the rlogind port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rlogind_client_packets" lineno="56944"> +<summary> +Send rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="56963"> +<summary> +Do not audit attempts to send rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rlogind_client_packets" lineno="56982"> +<summary> +Receive rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="57001"> +<summary> +Do not audit attempts to receive rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rlogind_client_packets" lineno="57020"> +<summary> +Send and receive rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="57036"> +<summary> +Do not audit attempts to send and receive rlogind_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rlogind_client_packets" lineno="57051"> +<summary> +Relabel packets to rlogind_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rlogind_server_packets" lineno="57071"> +<summary> +Send rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="57090"> +<summary> +Do not audit attempts to send rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rlogind_server_packets" lineno="57109"> +<summary> +Receive rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="57128"> +<summary> +Do not audit attempts to receive rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rlogind_server_packets" lineno="57147"> +<summary> +Send and receive rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="57163"> +<summary> +Do not audit attempts to send and receive rlogind_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rlogind_server_packets" lineno="57178"> +<summary> +Relabel packets to rlogind_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_rndc_port" lineno="57200"> +<summary> +Send and receive TCP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_rndc_port" lineno="57219"> +<summary> +Send UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="57238"> +<summary> +Do not audit attempts to send UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_rndc_port" lineno="57257"> +<summary> +Receive UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="57276"> +<summary> +Do not audit attempts to receive UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_rndc_port" lineno="57295"> +<summary> +Send and receive UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="57312"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the rndc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_rndc_port" lineno="57328"> +<summary> +Bind TCP sockets to the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_rndc_port" lineno="57348"> +<summary> +Bind UDP sockets to the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_rndc_port" lineno="57367"> +<summary> +Make a TCP connection to the rndc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rndc_client_packets" lineno="57387"> +<summary> +Send rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="57406"> +<summary> +Do not audit attempts to send rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rndc_client_packets" lineno="57425"> +<summary> +Receive rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="57444"> +<summary> +Do not audit attempts to receive rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rndc_client_packets" lineno="57463"> +<summary> +Send and receive rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="57479"> +<summary> +Do not audit attempts to send and receive rndc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rndc_client_packets" lineno="57494"> +<summary> +Relabel packets to rndc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rndc_server_packets" lineno="57514"> +<summary> +Send rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="57533"> +<summary> +Do not audit attempts to send rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rndc_server_packets" lineno="57552"> +<summary> +Receive rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="57571"> +<summary> +Do not audit attempts to receive rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rndc_server_packets" lineno="57590"> +<summary> +Send and receive rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="57606"> +<summary> +Do not audit attempts to send and receive rndc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rndc_server_packets" lineno="57621"> +<summary> +Relabel packets to rndc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_router_port" lineno="57643"> +<summary> +Send and receive TCP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_router_port" lineno="57662"> +<summary> +Send UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_router_port" lineno="57681"> +<summary> +Do not audit attempts to send UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_router_port" lineno="57700"> +<summary> +Receive UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_router_port" lineno="57719"> +<summary> +Do not audit attempts to receive UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_router_port" lineno="57738"> +<summary> +Send and receive UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="57755"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the router port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_router_port" lineno="57771"> +<summary> +Bind TCP sockets to the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_router_port" lineno="57791"> +<summary> +Bind UDP sockets to the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_router_port" lineno="57810"> +<summary> +Make a TCP connection to the router port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_router_client_packets" lineno="57830"> +<summary> +Send router_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_router_client_packets" lineno="57849"> +<summary> +Do not audit attempts to send router_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_router_client_packets" lineno="57868"> +<summary> +Receive router_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_router_client_packets" lineno="57887"> +<summary> +Do not audit attempts to receive router_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_router_client_packets" lineno="57906"> +<summary> +Send and receive router_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="57922"> +<summary> +Do not audit attempts to send and receive router_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_router_client_packets" lineno="57937"> +<summary> +Relabel packets to router_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_router_server_packets" lineno="57957"> +<summary> +Send router_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_router_server_packets" lineno="57976"> +<summary> +Do not audit attempts to send router_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_router_server_packets" lineno="57995"> +<summary> +Receive router_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_router_server_packets" lineno="58014"> +<summary> +Do not audit attempts to receive router_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_router_server_packets" lineno="58033"> +<summary> +Send and receive router_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="58049"> +<summary> +Do not audit attempts to send and receive router_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_router_server_packets" lineno="58064"> +<summary> +Relabel packets to router_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_rsh_port" lineno="58086"> +<summary> +Send and receive TCP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_rsh_port" lineno="58105"> +<summary> +Send UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="58124"> +<summary> +Do not audit attempts to send UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_rsh_port" lineno="58143"> +<summary> +Receive UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="58162"> +<summary> +Do not audit attempts to receive UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_rsh_port" lineno="58181"> +<summary> +Send and receive UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="58198"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the rsh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_rsh_port" lineno="58214"> +<summary> +Bind TCP sockets to the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_rsh_port" lineno="58234"> +<summary> +Bind UDP sockets to the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_rsh_port" lineno="58253"> +<summary> +Make a TCP connection to the rsh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rsh_client_packets" lineno="58273"> +<summary> +Send rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="58292"> +<summary> +Do not audit attempts to send rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rsh_client_packets" lineno="58311"> +<summary> +Receive rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="58330"> +<summary> +Do not audit attempts to receive rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rsh_client_packets" lineno="58349"> +<summary> +Send and receive rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="58365"> +<summary> +Do not audit attempts to send and receive rsh_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rsh_client_packets" lineno="58380"> +<summary> +Relabel packets to rsh_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rsh_server_packets" lineno="58400"> +<summary> +Send rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="58419"> +<summary> +Do not audit attempts to send rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rsh_server_packets" lineno="58438"> +<summary> +Receive rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="58457"> +<summary> +Do not audit attempts to receive rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rsh_server_packets" lineno="58476"> +<summary> +Send and receive rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="58492"> +<summary> +Do not audit attempts to send and receive rsh_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rsh_server_packets" lineno="58507"> +<summary> +Relabel packets to rsh_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_rsync_port" lineno="58529"> +<summary> +Send and receive TCP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_rsync_port" lineno="58548"> +<summary> +Send UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="58567"> +<summary> +Do not audit attempts to send UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_rsync_port" lineno="58586"> +<summary> +Receive UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="58605"> +<summary> +Do not audit attempts to receive UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_rsync_port" lineno="58624"> +<summary> +Send and receive UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="58641"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the rsync port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_rsync_port" lineno="58657"> +<summary> +Bind TCP sockets to the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_rsync_port" lineno="58677"> +<summary> +Bind UDP sockets to the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_rsync_port" lineno="58696"> +<summary> +Make a TCP connection to the rsync port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rsync_client_packets" lineno="58716"> +<summary> +Send rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="58735"> +<summary> +Do not audit attempts to send rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rsync_client_packets" lineno="58754"> +<summary> +Receive rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="58773"> +<summary> +Do not audit attempts to receive rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rsync_client_packets" lineno="58792"> +<summary> +Send and receive rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="58808"> +<summary> +Do not audit attempts to send and receive rsync_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rsync_client_packets" lineno="58823"> +<summary> +Relabel packets to rsync_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rsync_server_packets" lineno="58843"> +<summary> +Send rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="58862"> +<summary> +Do not audit attempts to send rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rsync_server_packets" lineno="58881"> +<summary> +Receive rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="58900"> +<summary> +Do not audit attempts to receive rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rsync_server_packets" lineno="58919"> +<summary> +Send and receive rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="58935"> +<summary> +Do not audit attempts to send and receive rsync_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rsync_server_packets" lineno="58950"> +<summary> +Relabel packets to rsync_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_rwho_port" lineno="58972"> +<summary> +Send and receive TCP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_rwho_port" lineno="58991"> +<summary> +Send UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="59010"> +<summary> +Do not audit attempts to send UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_rwho_port" lineno="59029"> +<summary> +Receive UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="59048"> +<summary> +Do not audit attempts to receive UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_rwho_port" lineno="59067"> +<summary> +Send and receive UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="59084"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the rwho port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_rwho_port" lineno="59100"> +<summary> +Bind TCP sockets to the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_rwho_port" lineno="59120"> +<summary> +Bind UDP sockets to the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_rwho_port" lineno="59139"> +<summary> +Make a TCP connection to the rwho port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rwho_client_packets" lineno="59159"> +<summary> +Send rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="59178"> +<summary> +Do not audit attempts to send rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rwho_client_packets" lineno="59197"> +<summary> +Receive rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="59216"> +<summary> +Do not audit attempts to receive rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rwho_client_packets" lineno="59235"> +<summary> +Send and receive rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="59251"> +<summary> +Do not audit attempts to send and receive rwho_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rwho_client_packets" lineno="59266"> +<summary> +Relabel packets to rwho_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_rwho_server_packets" lineno="59286"> +<summary> +Send rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="59305"> +<summary> +Do not audit attempts to send rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_rwho_server_packets" lineno="59324"> +<summary> +Receive rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="59343"> +<summary> +Do not audit attempts to receive rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_rwho_server_packets" lineno="59362"> +<summary> +Send and receive rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="59378"> +<summary> +Do not audit attempts to send and receive rwho_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_rwho_server_packets" lineno="59393"> +<summary> +Relabel packets to rwho_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_sap_port" lineno="59415"> +<summary> +Send and receive TCP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_sap_port" lineno="59434"> +<summary> +Send UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_sap_port" lineno="59453"> +<summary> +Do not audit attempts to send UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_sap_port" lineno="59472"> +<summary> +Receive UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="59491"> +<summary> +Do not audit attempts to receive UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_sap_port" lineno="59510"> +<summary> +Send and receive UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="59527"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the sap port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_sap_port" lineno="59543"> +<summary> +Bind TCP sockets to the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_sap_port" lineno="59563"> +<summary> +Bind UDP sockets to the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_sap_port" lineno="59582"> +<summary> +Make a TCP connection to the sap port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sap_client_packets" lineno="59602"> +<summary> +Send sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sap_client_packets" lineno="59621"> +<summary> +Do not audit attempts to send sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sap_client_packets" lineno="59640"> +<summary> +Receive sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="59659"> +<summary> +Do not audit attempts to receive sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sap_client_packets" lineno="59678"> +<summary> +Send and receive sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="59694"> +<summary> +Do not audit attempts to send and receive sap_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sap_client_packets" lineno="59709"> +<summary> +Relabel packets to sap_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sap_server_packets" lineno="59729"> +<summary> +Send sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sap_server_packets" lineno="59748"> +<summary> +Do not audit attempts to send sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sap_server_packets" lineno="59767"> +<summary> +Receive sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="59786"> +<summary> +Do not audit attempts to receive sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sap_server_packets" lineno="59805"> +<summary> +Send and receive sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="59821"> +<summary> +Do not audit attempts to send and receive sap_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sap_server_packets" lineno="59836"> +<summary> +Relabel packets to sap_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_sieve_port" lineno="59858"> +<summary> +Send and receive TCP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_sieve_port" lineno="59877"> +<summary> +Send UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="59896"> +<summary> +Do not audit attempts to send UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_sieve_port" lineno="59915"> +<summary> +Receive UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="59934"> +<summary> +Do not audit attempts to receive UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_sieve_port" lineno="59953"> +<summary> +Send and receive UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="59970"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the sieve port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_sieve_port" lineno="59986"> +<summary> +Bind TCP sockets to the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_sieve_port" lineno="60006"> +<summary> +Bind UDP sockets to the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_sieve_port" lineno="60025"> +<summary> +Make a TCP connection to the sieve port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sieve_client_packets" lineno="60045"> +<summary> +Send sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="60064"> +<summary> +Do not audit attempts to send sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sieve_client_packets" lineno="60083"> +<summary> +Receive sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="60102"> +<summary> +Do not audit attempts to receive sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sieve_client_packets" lineno="60121"> +<summary> +Send and receive sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="60137"> +<summary> +Do not audit attempts to send and receive sieve_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sieve_client_packets" lineno="60152"> +<summary> +Relabel packets to sieve_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sieve_server_packets" lineno="60172"> +<summary> +Send sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="60191"> +<summary> +Do not audit attempts to send sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sieve_server_packets" lineno="60210"> +<summary> +Receive sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="60229"> +<summary> +Do not audit attempts to receive sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sieve_server_packets" lineno="60248"> +<summary> +Send and receive sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="60264"> +<summary> +Do not audit attempts to send and receive sieve_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sieve_server_packets" lineno="60279"> +<summary> +Relabel packets to sieve_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_sip_port" lineno="60301"> +<summary> +Send and receive TCP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_sip_port" lineno="60320"> +<summary> +Send UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_sip_port" lineno="60339"> +<summary> +Do not audit attempts to send UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_sip_port" lineno="60358"> +<summary> +Receive UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="60377"> +<summary> +Do not audit attempts to receive UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_sip_port" lineno="60396"> +<summary> +Send and receive UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="60413"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the sip port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_sip_port" lineno="60429"> +<summary> +Bind TCP sockets to the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_sip_port" lineno="60449"> +<summary> +Bind UDP sockets to the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_sip_port" lineno="60468"> +<summary> +Make a TCP connection to the sip port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sip_client_packets" lineno="60488"> +<summary> +Send sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sip_client_packets" lineno="60507"> +<summary> +Do not audit attempts to send sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sip_client_packets" lineno="60526"> +<summary> +Receive sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="60545"> +<summary> +Do not audit attempts to receive sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sip_client_packets" lineno="60564"> +<summary> +Send and receive sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="60580"> +<summary> +Do not audit attempts to send and receive sip_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sip_client_packets" lineno="60595"> +<summary> +Relabel packets to sip_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sip_server_packets" lineno="60615"> +<summary> +Send sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sip_server_packets" lineno="60634"> +<summary> +Do not audit attempts to send sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sip_server_packets" lineno="60653"> +<summary> +Receive sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="60672"> +<summary> +Do not audit attempts to receive sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sip_server_packets" lineno="60691"> +<summary> +Send and receive sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="60707"> +<summary> +Do not audit attempts to send and receive sip_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sip_server_packets" lineno="60722"> +<summary> +Relabel packets to sip_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="60744"> +<summary> +Send and receive TCP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_sixxsconfig_port" lineno="60763"> +<summary> +Send UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="60782"> +<summary> +Do not audit attempts to send UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_sixxsconfig_port" lineno="60801"> +<summary> +Receive UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="60820"> +<summary> +Do not audit attempts to receive UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="60839"> +<summary> +Send and receive UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="60856"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="60872"> +<summary> +Bind TCP sockets to the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_sixxsconfig_port" lineno="60892"> +<summary> +Bind UDP sockets to the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="60911"> +<summary> +Make a TCP connection to the sixxsconfig port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sixxsconfig_client_packets" lineno="60931"> +<summary> +Send sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="60950"> +<summary> +Do not audit attempts to send sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sixxsconfig_client_packets" lineno="60969"> +<summary> +Receive sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="60988"> +<summary> +Do not audit attempts to receive sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="61007"> +<summary> +Send and receive sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="61023"> +<summary> +Do not audit attempts to send and receive sixxsconfig_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="61038"> +<summary> +Relabel packets to sixxsconfig_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_sixxsconfig_server_packets" lineno="61058"> +<summary> +Send sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="61077"> +<summary> +Do not audit attempts to send sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_sixxsconfig_server_packets" lineno="61096"> +<summary> +Receive sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="61115"> +<summary> +Do not audit attempts to receive sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="61134"> +<summary> +Send and receive sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="61150"> +<summary> +Do not audit attempts to send and receive sixxsconfig_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="61165"> +<summary> +Relabel packets to sixxsconfig_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_smbd_port" lineno="61187"> +<summary> +Send and receive TCP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_smbd_port" lineno="61206"> +<summary> +Send UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="61225"> +<summary> +Do not audit attempts to send UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_smbd_port" lineno="61244"> +<summary> +Receive UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="61263"> +<summary> +Do not audit attempts to receive UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_smbd_port" lineno="61282"> +<summary> +Send and receive UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="61299"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the smbd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_smbd_port" lineno="61315"> +<summary> +Bind TCP sockets to the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_smbd_port" lineno="61335"> +<summary> +Bind UDP sockets to the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_smbd_port" lineno="61354"> +<summary> +Make a TCP connection to the smbd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_smbd_client_packets" lineno="61374"> +<summary> +Send smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="61393"> +<summary> +Do not audit attempts to send smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_smbd_client_packets" lineno="61412"> +<summary> +Receive smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="61431"> +<summary> +Do not audit attempts to receive smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_smbd_client_packets" lineno="61450"> +<summary> +Send and receive smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="61466"> +<summary> +Do not audit attempts to send and receive smbd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_smbd_client_packets" lineno="61481"> +<summary> +Relabel packets to smbd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_smbd_server_packets" lineno="61501"> +<summary> +Send smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="61520"> +<summary> +Do not audit attempts to send smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_smbd_server_packets" lineno="61539"> +<summary> +Receive smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="61558"> +<summary> +Do not audit attempts to receive smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_smbd_server_packets" lineno="61577"> +<summary> +Send and receive smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="61593"> +<summary> +Do not audit attempts to send and receive smbd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_smbd_server_packets" lineno="61608"> +<summary> +Relabel packets to smbd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_smtp_port" lineno="61630"> +<summary> +Send and receive TCP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_smtp_port" lineno="61649"> +<summary> +Send UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="61668"> +<summary> +Do not audit attempts to send UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_smtp_port" lineno="61687"> +<summary> +Receive UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="61706"> +<summary> +Do not audit attempts to receive UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_smtp_port" lineno="61725"> +<summary> +Send and receive UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="61742"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the smtp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_smtp_port" lineno="61758"> +<summary> +Bind TCP sockets to the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_smtp_port" lineno="61778"> +<summary> +Bind UDP sockets to the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_smtp_port" lineno="61797"> +<summary> +Make a TCP connection to the smtp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_smtp_client_packets" lineno="61817"> +<summary> +Send smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="61836"> +<summary> +Do not audit attempts to send smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_smtp_client_packets" lineno="61855"> +<summary> +Receive smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="61874"> +<summary> +Do not audit attempts to receive smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_smtp_client_packets" lineno="61893"> +<summary> +Send and receive smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="61909"> +<summary> +Do not audit attempts to send and receive smtp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_smtp_client_packets" lineno="61924"> +<summary> +Relabel packets to smtp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_smtp_server_packets" lineno="61944"> +<summary> +Send smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="61963"> +<summary> +Do not audit attempts to send smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_smtp_server_packets" lineno="61982"> +<summary> +Receive smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="62001"> +<summary> +Do not audit attempts to receive smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_smtp_server_packets" lineno="62020"> +<summary> +Send and receive smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="62036"> +<summary> +Do not audit attempts to send and receive smtp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_smtp_server_packets" lineno="62051"> +<summary> +Relabel packets to smtp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_snmp_port" lineno="62073"> +<summary> +Send and receive TCP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_snmp_port" lineno="62092"> +<summary> +Send UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="62111"> +<summary> +Do not audit attempts to send UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_snmp_port" lineno="62130"> +<summary> +Receive UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="62149"> +<summary> +Do not audit attempts to receive UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_snmp_port" lineno="62168"> +<summary> +Send and receive UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="62185"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the snmp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_snmp_port" lineno="62201"> +<summary> +Bind TCP sockets to the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_snmp_port" lineno="62221"> +<summary> +Bind UDP sockets to the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_snmp_port" lineno="62240"> +<summary> +Make a TCP connection to the snmp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_snmp_client_packets" lineno="62260"> +<summary> +Send snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="62279"> +<summary> +Do not audit attempts to send snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_snmp_client_packets" lineno="62298"> +<summary> +Receive snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="62317"> +<summary> +Do not audit attempts to receive snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_snmp_client_packets" lineno="62336"> +<summary> +Send and receive snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="62352"> +<summary> +Do not audit attempts to send and receive snmp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_snmp_client_packets" lineno="62367"> +<summary> +Relabel packets to snmp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_snmp_server_packets" lineno="62387"> +<summary> +Send snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="62406"> +<summary> +Do not audit attempts to send snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_snmp_server_packets" lineno="62425"> +<summary> +Receive snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="62444"> +<summary> +Do not audit attempts to receive snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_snmp_server_packets" lineno="62463"> +<summary> +Send and receive snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="62479"> +<summary> +Do not audit attempts to send and receive snmp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_snmp_server_packets" lineno="62494"> +<summary> +Relabel packets to snmp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_socks_port" lineno="62516"> +<summary> +Send and receive TCP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_socks_port" lineno="62535"> +<summary> +Send UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_socks_port" lineno="62554"> +<summary> +Do not audit attempts to send UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_socks_port" lineno="62573"> +<summary> +Receive UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="62592"> +<summary> +Do not audit attempts to receive UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_socks_port" lineno="62611"> +<summary> +Send and receive UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="62628"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the socks port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_socks_port" lineno="62644"> +<summary> +Bind TCP sockets to the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_socks_port" lineno="62664"> +<summary> +Bind UDP sockets to the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_socks_port" lineno="62683"> +<summary> +Make a TCP connection to the socks port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_socks_client_packets" lineno="62703"> +<summary> +Send socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_socks_client_packets" lineno="62722"> +<summary> +Do not audit attempts to send socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_socks_client_packets" lineno="62741"> +<summary> +Receive socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="62760"> +<summary> +Do not audit attempts to receive socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_socks_client_packets" lineno="62779"> +<summary> +Send and receive socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="62795"> +<summary> +Do not audit attempts to send and receive socks_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_socks_client_packets" lineno="62810"> +<summary> +Relabel packets to socks_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_socks_server_packets" lineno="62830"> +<summary> +Send socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_socks_server_packets" lineno="62849"> +<summary> +Do not audit attempts to send socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_socks_server_packets" lineno="62868"> +<summary> +Receive socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="62887"> +<summary> +Do not audit attempts to receive socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_socks_server_packets" lineno="62906"> +<summary> +Send and receive socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="62922"> +<summary> +Do not audit attempts to send and receive socks_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_socks_server_packets" lineno="62937"> +<summary> +Relabel packets to socks_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_soundd_port" lineno="62959"> +<summary> +Send and receive TCP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_soundd_port" lineno="62978"> +<summary> +Send UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="62997"> +<summary> +Do not audit attempts to send UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_soundd_port" lineno="63016"> +<summary> +Receive UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="63035"> +<summary> +Do not audit attempts to receive UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_soundd_port" lineno="63054"> +<summary> +Send and receive UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="63071"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the soundd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_soundd_port" lineno="63087"> +<summary> +Bind TCP sockets to the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_soundd_port" lineno="63107"> +<summary> +Bind UDP sockets to the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_soundd_port" lineno="63126"> +<summary> +Make a TCP connection to the soundd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_soundd_client_packets" lineno="63146"> +<summary> +Send soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="63165"> +<summary> +Do not audit attempts to send soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_soundd_client_packets" lineno="63184"> +<summary> +Receive soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="63203"> +<summary> +Do not audit attempts to receive soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_soundd_client_packets" lineno="63222"> +<summary> +Send and receive soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="63238"> +<summary> +Do not audit attempts to send and receive soundd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_soundd_client_packets" lineno="63253"> +<summary> +Relabel packets to soundd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_soundd_server_packets" lineno="63273"> +<summary> +Send soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="63292"> +<summary> +Do not audit attempts to send soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_soundd_server_packets" lineno="63311"> +<summary> +Receive soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="63330"> +<summary> +Do not audit attempts to receive soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_soundd_server_packets" lineno="63349"> +<summary> +Send and receive soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="63365"> +<summary> +Do not audit attempts to send and receive soundd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_soundd_server_packets" lineno="63380"> +<summary> +Relabel packets to soundd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_spamd_port" lineno="63402"> +<summary> +Send and receive TCP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_spamd_port" lineno="63421"> +<summary> +Send UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="63440"> +<summary> +Do not audit attempts to send UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_spamd_port" lineno="63459"> +<summary> +Receive UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="63478"> +<summary> +Do not audit attempts to receive UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_spamd_port" lineno="63497"> +<summary> +Send and receive UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="63514"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the spamd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_spamd_port" lineno="63530"> +<summary> +Bind TCP sockets to the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_spamd_port" lineno="63550"> +<summary> +Bind UDP sockets to the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_spamd_port" lineno="63569"> +<summary> +Make a TCP connection to the spamd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_spamd_client_packets" lineno="63589"> +<summary> +Send spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="63608"> +<summary> +Do not audit attempts to send spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_spamd_client_packets" lineno="63627"> +<summary> +Receive spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="63646"> +<summary> +Do not audit attempts to receive spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_spamd_client_packets" lineno="63665"> +<summary> +Send and receive spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="63681"> +<summary> +Do not audit attempts to send and receive spamd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_spamd_client_packets" lineno="63696"> +<summary> +Relabel packets to spamd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_spamd_server_packets" lineno="63716"> +<summary> +Send spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="63735"> +<summary> +Do not audit attempts to send spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_spamd_server_packets" lineno="63754"> +<summary> +Receive spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="63773"> +<summary> +Do not audit attempts to receive spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_spamd_server_packets" lineno="63792"> +<summary> +Send and receive spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="63808"> +<summary> +Do not audit attempts to send and receive spamd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_spamd_server_packets" lineno="63823"> +<summary> +Relabel packets to spamd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_speech_port" lineno="63845"> +<summary> +Send and receive TCP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_speech_port" lineno="63864"> +<summary> +Send UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_speech_port" lineno="63883"> +<summary> +Do not audit attempts to send UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_speech_port" lineno="63902"> +<summary> +Receive UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="63921"> +<summary> +Do not audit attempts to receive UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_speech_port" lineno="63940"> +<summary> +Send and receive UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="63957"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the speech port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_speech_port" lineno="63973"> +<summary> +Bind TCP sockets to the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_speech_port" lineno="63993"> +<summary> +Bind UDP sockets to the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_speech_port" lineno="64012"> +<summary> +Make a TCP connection to the speech port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_speech_client_packets" lineno="64032"> +<summary> +Send speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_speech_client_packets" lineno="64051"> +<summary> +Do not audit attempts to send speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_speech_client_packets" lineno="64070"> +<summary> +Receive speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="64089"> +<summary> +Do not audit attempts to receive speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_speech_client_packets" lineno="64108"> +<summary> +Send and receive speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="64124"> +<summary> +Do not audit attempts to send and receive speech_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_speech_client_packets" lineno="64139"> +<summary> +Relabel packets to speech_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_speech_server_packets" lineno="64159"> +<summary> +Send speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_speech_server_packets" lineno="64178"> +<summary> +Do not audit attempts to send speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_speech_server_packets" lineno="64197"> +<summary> +Receive speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="64216"> +<summary> +Do not audit attempts to receive speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_speech_server_packets" lineno="64235"> +<summary> +Send and receive speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="64251"> +<summary> +Do not audit attempts to send and receive speech_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_speech_server_packets" lineno="64266"> +<summary> +Relabel packets to speech_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_squid_port" lineno="64288"> +<summary> +Send and receive TCP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_squid_port" lineno="64307"> +<summary> +Send UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_squid_port" lineno="64326"> +<summary> +Do not audit attempts to send UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_squid_port" lineno="64345"> +<summary> +Receive UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="64364"> +<summary> +Do not audit attempts to receive UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_squid_port" lineno="64383"> +<summary> +Send and receive UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="64400"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the squid port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_squid_port" lineno="64416"> +<summary> +Bind TCP sockets to the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_squid_port" lineno="64436"> +<summary> +Bind UDP sockets to the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_squid_port" lineno="64455"> +<summary> +Make a TCP connection to the squid port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_squid_client_packets" lineno="64475"> +<summary> +Send squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_squid_client_packets" lineno="64494"> +<summary> +Do not audit attempts to send squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_squid_client_packets" lineno="64513"> +<summary> +Receive squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="64532"> +<summary> +Do not audit attempts to receive squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_squid_client_packets" lineno="64551"> +<summary> +Send and receive squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="64567"> +<summary> +Do not audit attempts to send and receive squid_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_squid_client_packets" lineno="64582"> +<summary> +Relabel packets to squid_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_squid_server_packets" lineno="64602"> +<summary> +Send squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_squid_server_packets" lineno="64621"> +<summary> +Do not audit attempts to send squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_squid_server_packets" lineno="64640"> +<summary> +Receive squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="64659"> +<summary> +Do not audit attempts to receive squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_squid_server_packets" lineno="64678"> +<summary> +Send and receive squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="64694"> +<summary> +Do not audit attempts to send and receive squid_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_squid_server_packets" lineno="64709"> +<summary> +Relabel packets to squid_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ssh_port" lineno="64731"> +<summary> +Send and receive TCP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ssh_port" lineno="64750"> +<summary> +Send UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="64769"> +<summary> +Do not audit attempts to send UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ssh_port" lineno="64788"> +<summary> +Receive UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="64807"> +<summary> +Do not audit attempts to receive UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ssh_port" lineno="64826"> +<summary> +Send and receive UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="64843"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ssh port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ssh_port" lineno="64859"> +<summary> +Bind TCP sockets to the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ssh_port" lineno="64879"> +<summary> +Bind UDP sockets to the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ssh_port" lineno="64898"> +<summary> +Make a TCP connection to the ssh port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ssh_client_packets" lineno="64918"> +<summary> +Send ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="64937"> +<summary> +Do not audit attempts to send ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ssh_client_packets" lineno="64956"> +<summary> +Receive ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="64975"> +<summary> +Do not audit attempts to receive ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ssh_client_packets" lineno="64994"> +<summary> +Send and receive ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="65010"> +<summary> +Do not audit attempts to send and receive ssh_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ssh_client_packets" lineno="65025"> +<summary> +Relabel packets to ssh_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ssh_server_packets" lineno="65045"> +<summary> +Send ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="65064"> +<summary> +Do not audit attempts to send ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ssh_server_packets" lineno="65083"> +<summary> +Receive ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="65102"> +<summary> +Do not audit attempts to receive ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ssh_server_packets" lineno="65121"> +<summary> +Send and receive ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="65137"> +<summary> +Do not audit attempts to send and receive ssh_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ssh_server_packets" lineno="65152"> +<summary> +Relabel packets to ssh_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="65174"> +<summary> +Send and receive TCP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_stunnel_port" lineno="65193"> +<summary> +Send UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="65212"> +<summary> +Do not audit attempts to send UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_stunnel_port" lineno="65231"> +<summary> +Receive UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="65250"> +<summary> +Do not audit attempts to receive UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_stunnel_port" lineno="65269"> +<summary> +Send and receive UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="65286"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_stunnel_port" lineno="65302"> +<summary> +Bind TCP sockets to the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_stunnel_port" lineno="65322"> +<summary> +Bind UDP sockets to the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_stunnel_port" lineno="65341"> +<summary> +Make a TCP connection to the stunnel port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_stunnel_client_packets" lineno="65361"> +<summary> +Send stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="65380"> +<summary> +Do not audit attempts to send stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_stunnel_client_packets" lineno="65399"> +<summary> +Receive stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="65418"> +<summary> +Do not audit attempts to receive stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_stunnel_client_packets" lineno="65437"> +<summary> +Send and receive stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="65453"> +<summary> +Do not audit attempts to send and receive stunnel_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_stunnel_client_packets" lineno="65468"> +<summary> +Relabel packets to stunnel_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_stunnel_server_packets" lineno="65488"> +<summary> +Send stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="65507"> +<summary> +Do not audit attempts to send stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_stunnel_server_packets" lineno="65526"> +<summary> +Receive stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="65545"> +<summary> +Do not audit attempts to receive stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_stunnel_server_packets" lineno="65564"> +<summary> +Send and receive stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="65580"> +<summary> +Do not audit attempts to send and receive stunnel_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_stunnel_server_packets" lineno="65595"> +<summary> +Relabel packets to stunnel_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_swat_port" lineno="65617"> +<summary> +Send and receive TCP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_swat_port" lineno="65636"> +<summary> +Send UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_swat_port" lineno="65655"> +<summary> +Do not audit attempts to send UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_swat_port" lineno="65674"> +<summary> +Receive UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="65693"> +<summary> +Do not audit attempts to receive UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_swat_port" lineno="65712"> +<summary> +Send and receive UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="65729"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the swat port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_swat_port" lineno="65745"> +<summary> +Bind TCP sockets to the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_swat_port" lineno="65765"> +<summary> +Bind UDP sockets to the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_swat_port" lineno="65784"> +<summary> +Make a TCP connection to the swat port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_swat_client_packets" lineno="65804"> +<summary> +Send swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_swat_client_packets" lineno="65823"> +<summary> +Do not audit attempts to send swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_swat_client_packets" lineno="65842"> +<summary> +Receive swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="65861"> +<summary> +Do not audit attempts to receive swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_swat_client_packets" lineno="65880"> +<summary> +Send and receive swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="65896"> +<summary> +Do not audit attempts to send and receive swat_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_swat_client_packets" lineno="65911"> +<summary> +Relabel packets to swat_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_swat_server_packets" lineno="65931"> +<summary> +Send swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_swat_server_packets" lineno="65950"> +<summary> +Do not audit attempts to send swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_swat_server_packets" lineno="65969"> +<summary> +Receive swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="65988"> +<summary> +Do not audit attempts to receive swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_swat_server_packets" lineno="66007"> +<summary> +Send and receive swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="66023"> +<summary> +Do not audit attempts to send and receive swat_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_swat_server_packets" lineno="66038"> +<summary> +Relabel packets to swat_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="66060"> +<summary> +Send and receive TCP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_syslogd_port" lineno="66079"> +<summary> +Send UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="66098"> +<summary> +Do not audit attempts to send UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_syslogd_port" lineno="66117"> +<summary> +Receive UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="66136"> +<summary> +Do not audit attempts to receive UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_syslogd_port" lineno="66155"> +<summary> +Send and receive UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="66172"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_syslogd_port" lineno="66188"> +<summary> +Bind TCP sockets to the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_syslogd_port" lineno="66208"> +<summary> +Bind UDP sockets to the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_syslogd_port" lineno="66227"> +<summary> +Make a TCP connection to the syslogd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_syslogd_client_packets" lineno="66247"> +<summary> +Send syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="66266"> +<summary> +Do not audit attempts to send syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_syslogd_client_packets" lineno="66285"> +<summary> +Receive syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="66304"> +<summary> +Do not audit attempts to receive syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_syslogd_client_packets" lineno="66323"> +<summary> +Send and receive syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="66339"> +<summary> +Do not audit attempts to send and receive syslogd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_syslogd_client_packets" lineno="66354"> +<summary> +Relabel packets to syslogd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_syslogd_server_packets" lineno="66374"> +<summary> +Send syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="66393"> +<summary> +Do not audit attempts to send syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_syslogd_server_packets" lineno="66412"> +<summary> +Receive syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="66431"> +<summary> +Do not audit attempts to receive syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_syslogd_server_packets" lineno="66450"> +<summary> +Send and receive syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="66466"> +<summary> +Do not audit attempts to send and receive syslogd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_syslogd_server_packets" lineno="66481"> +<summary> +Relabel packets to syslogd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_tcs_port" lineno="66503"> +<summary> +Send and receive TCP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_tcs_port" lineno="66522"> +<summary> +Send UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="66541"> +<summary> +Do not audit attempts to send UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_tcs_port" lineno="66560"> +<summary> +Receive UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="66579"> +<summary> +Do not audit attempts to receive UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_tcs_port" lineno="66598"> +<summary> +Send and receive UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="66615"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the tcs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_tcs_port" lineno="66631"> +<summary> +Bind TCP sockets to the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_tcs_port" lineno="66651"> +<summary> +Bind UDP sockets to the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_tcs_port" lineno="66670"> +<summary> +Make a TCP connection to the tcs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tcs_client_packets" lineno="66690"> +<summary> +Send tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="66709"> +<summary> +Do not audit attempts to send tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tcs_client_packets" lineno="66728"> +<summary> +Receive tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="66747"> +<summary> +Do not audit attempts to receive tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tcs_client_packets" lineno="66766"> +<summary> +Send and receive tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="66782"> +<summary> +Do not audit attempts to send and receive tcs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tcs_client_packets" lineno="66797"> +<summary> +Relabel packets to tcs_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tcs_server_packets" lineno="66817"> +<summary> +Send tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="66836"> +<summary> +Do not audit attempts to send tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tcs_server_packets" lineno="66855"> +<summary> +Receive tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="66874"> +<summary> +Do not audit attempts to receive tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tcs_server_packets" lineno="66893"> +<summary> +Send and receive tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="66909"> +<summary> +Do not audit attempts to send and receive tcs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tcs_server_packets" lineno="66924"> +<summary> +Relabel packets to tcs_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="66946"> +<summary> +Send and receive TCP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_telnetd_port" lineno="66965"> +<summary> +Send UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="66984"> +<summary> +Do not audit attempts to send UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_telnetd_port" lineno="67003"> +<summary> +Receive UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="67022"> +<summary> +Do not audit attempts to receive UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_telnetd_port" lineno="67041"> +<summary> +Send and receive UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="67058"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_telnetd_port" lineno="67074"> +<summary> +Bind TCP sockets to the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_telnetd_port" lineno="67094"> +<summary> +Bind UDP sockets to the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_telnetd_port" lineno="67113"> +<summary> +Make a TCP connection to the telnetd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_telnetd_client_packets" lineno="67133"> +<summary> +Send telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="67152"> +<summary> +Do not audit attempts to send telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_telnetd_client_packets" lineno="67171"> +<summary> +Receive telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="67190"> +<summary> +Do not audit attempts to receive telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_telnetd_client_packets" lineno="67209"> +<summary> +Send and receive telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="67225"> +<summary> +Do not audit attempts to send and receive telnetd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_telnetd_client_packets" lineno="67240"> +<summary> +Relabel packets to telnetd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_telnetd_server_packets" lineno="67260"> +<summary> +Send telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="67279"> +<summary> +Do not audit attempts to send telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_telnetd_server_packets" lineno="67298"> +<summary> +Receive telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="67317"> +<summary> +Do not audit attempts to receive telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_telnetd_server_packets" lineno="67336"> +<summary> +Send and receive telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="67352"> +<summary> +Do not audit attempts to send and receive telnetd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_telnetd_server_packets" lineno="67367"> +<summary> +Relabel packets to telnetd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_tftp_port" lineno="67389"> +<summary> +Send and receive TCP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_tftp_port" lineno="67408"> +<summary> +Send UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="67427"> +<summary> +Do not audit attempts to send UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_tftp_port" lineno="67446"> +<summary> +Receive UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="67465"> +<summary> +Do not audit attempts to receive UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_tftp_port" lineno="67484"> +<summary> +Send and receive UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="67501"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the tftp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_tftp_port" lineno="67517"> +<summary> +Bind TCP sockets to the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_tftp_port" lineno="67537"> +<summary> +Bind UDP sockets to the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_tftp_port" lineno="67556"> +<summary> +Make a TCP connection to the tftp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tftp_client_packets" lineno="67576"> +<summary> +Send tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="67595"> +<summary> +Do not audit attempts to send tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tftp_client_packets" lineno="67614"> +<summary> +Receive tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="67633"> +<summary> +Do not audit attempts to receive tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tftp_client_packets" lineno="67652"> +<summary> +Send and receive tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="67668"> +<summary> +Do not audit attempts to send and receive tftp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tftp_client_packets" lineno="67683"> +<summary> +Relabel packets to tftp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tftp_server_packets" lineno="67703"> +<summary> +Send tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="67722"> +<summary> +Do not audit attempts to send tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tftp_server_packets" lineno="67741"> +<summary> +Receive tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="67760"> +<summary> +Do not audit attempts to receive tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tftp_server_packets" lineno="67779"> +<summary> +Send and receive tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="67795"> +<summary> +Do not audit attempts to send and receive tftp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tftp_server_packets" lineno="67810"> +<summary> +Relabel packets to tftp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_tor_port" lineno="67832"> +<summary> +Send and receive TCP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_tor_port" lineno="67851"> +<summary> +Send UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_tor_port" lineno="67870"> +<summary> +Do not audit attempts to send UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_tor_port" lineno="67889"> +<summary> +Receive UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="67908"> +<summary> +Do not audit attempts to receive UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_tor_port" lineno="67927"> +<summary> +Send and receive UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="67944"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the tor port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_tor_port" lineno="67960"> +<summary> +Bind TCP sockets to the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_tor_port" lineno="67980"> +<summary> +Bind UDP sockets to the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_tor_port" lineno="67999"> +<summary> +Make a TCP connection to the tor port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tor_client_packets" lineno="68019"> +<summary> +Send tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tor_client_packets" lineno="68038"> +<summary> +Do not audit attempts to send tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tor_client_packets" lineno="68057"> +<summary> +Receive tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="68076"> +<summary> +Do not audit attempts to receive tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tor_client_packets" lineno="68095"> +<summary> +Send and receive tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="68111"> +<summary> +Do not audit attempts to send and receive tor_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tor_client_packets" lineno="68126"> +<summary> +Relabel packets to tor_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_tor_server_packets" lineno="68146"> +<summary> +Send tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_tor_server_packets" lineno="68165"> +<summary> +Do not audit attempts to send tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_tor_server_packets" lineno="68184"> +<summary> +Receive tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="68203"> +<summary> +Do not audit attempts to receive tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_tor_server_packets" lineno="68222"> +<summary> +Send and receive tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="68238"> +<summary> +Do not audit attempts to send and receive tor_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_tor_server_packets" lineno="68253"> +<summary> +Relabel packets to tor_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="68275"> +<summary> +Send and receive TCP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_traceroute_port" lineno="68294"> +<summary> +Send UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="68313"> +<summary> +Do not audit attempts to send UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_traceroute_port" lineno="68332"> +<summary> +Receive UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="68351"> +<summary> +Do not audit attempts to receive UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_traceroute_port" lineno="68370"> +<summary> +Send and receive UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="68387"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_traceroute_port" lineno="68403"> +<summary> +Bind TCP sockets to the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_traceroute_port" lineno="68423"> +<summary> +Bind UDP sockets to the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_traceroute_port" lineno="68442"> +<summary> +Make a TCP connection to the traceroute port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_traceroute_client_packets" lineno="68462"> +<summary> +Send traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="68481"> +<summary> +Do not audit attempts to send traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_traceroute_client_packets" lineno="68500"> +<summary> +Receive traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="68519"> +<summary> +Do not audit attempts to receive traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_traceroute_client_packets" lineno="68538"> +<summary> +Send and receive traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="68554"> +<summary> +Do not audit attempts to send and receive traceroute_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_traceroute_client_packets" lineno="68569"> +<summary> +Relabel packets to traceroute_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_traceroute_server_packets" lineno="68589"> +<summary> +Send traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="68608"> +<summary> +Do not audit attempts to send traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_traceroute_server_packets" lineno="68627"> +<summary> +Receive traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="68646"> +<summary> +Do not audit attempts to receive traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_traceroute_server_packets" lineno="68665"> +<summary> +Send and receive traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="68681"> +<summary> +Do not audit attempts to send and receive traceroute_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_traceroute_server_packets" lineno="68696"> +<summary> +Relabel packets to traceroute_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="68718"> +<summary> +Send and receive TCP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_transproxy_port" lineno="68737"> +<summary> +Send UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="68756"> +<summary> +Do not audit attempts to send UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_transproxy_port" lineno="68775"> +<summary> +Receive UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="68794"> +<summary> +Do not audit attempts to receive UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_transproxy_port" lineno="68813"> +<summary> +Send and receive UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="68830"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_transproxy_port" lineno="68846"> +<summary> +Bind TCP sockets to the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_transproxy_port" lineno="68866"> +<summary> +Bind UDP sockets to the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_transproxy_port" lineno="68885"> +<summary> +Make a TCP connection to the transproxy port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_transproxy_client_packets" lineno="68905"> +<summary> +Send transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="68924"> +<summary> +Do not audit attempts to send transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_transproxy_client_packets" lineno="68943"> +<summary> +Receive transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="68962"> +<summary> +Do not audit attempts to receive transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_transproxy_client_packets" lineno="68981"> +<summary> +Send and receive transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="68997"> +<summary> +Do not audit attempts to send and receive transproxy_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_transproxy_client_packets" lineno="69012"> +<summary> +Relabel packets to transproxy_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_transproxy_server_packets" lineno="69032"> +<summary> +Send transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="69051"> +<summary> +Do not audit attempts to send transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_transproxy_server_packets" lineno="69070"> +<summary> +Receive transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="69089"> +<summary> +Do not audit attempts to receive transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_transproxy_server_packets" lineno="69108"> +<summary> +Send and receive transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="69124"> +<summary> +Do not audit attempts to send and receive transproxy_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_transproxy_server_packets" lineno="69139"> +<summary> +Relabel packets to transproxy_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_ups_port" lineno="69161"> +<summary> +Send and receive TCP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_ups_port" lineno="69180"> +<summary> +Send UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_ups_port" lineno="69199"> +<summary> +Do not audit attempts to send UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_ups_port" lineno="69218"> +<summary> +Receive UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="69237"> +<summary> +Do not audit attempts to receive UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_ups_port" lineno="69256"> +<summary> +Send and receive UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="69273"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the ups port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_ups_port" lineno="69289"> +<summary> +Bind TCP sockets to the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_ups_port" lineno="69309"> +<summary> +Bind UDP sockets to the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_ups_port" lineno="69328"> +<summary> +Make a TCP connection to the ups port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ups_client_packets" lineno="69348"> +<summary> +Send ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ups_client_packets" lineno="69367"> +<summary> +Do not audit attempts to send ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ups_client_packets" lineno="69386"> +<summary> +Receive ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="69405"> +<summary> +Do not audit attempts to receive ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ups_client_packets" lineno="69424"> +<summary> +Send and receive ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="69440"> +<summary> +Do not audit attempts to send and receive ups_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ups_client_packets" lineno="69455"> +<summary> +Relabel packets to ups_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_ups_server_packets" lineno="69475"> +<summary> +Send ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_ups_server_packets" lineno="69494"> +<summary> +Do not audit attempts to send ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_ups_server_packets" lineno="69513"> +<summary> +Receive ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="69532"> +<summary> +Do not audit attempts to receive ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_ups_server_packets" lineno="69551"> +<summary> +Send and receive ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="69567"> +<summary> +Do not audit attempts to send and receive ups_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_ups_server_packets" lineno="69582"> +<summary> +Relabel packets to ups_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="69604"> +<summary> +Send and receive TCP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_utcpserver_port" lineno="69623"> +<summary> +Send UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="69642"> +<summary> +Do not audit attempts to send UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_utcpserver_port" lineno="69661"> +<summary> +Receive UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="69680"> +<summary> +Do not audit attempts to receive UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="69699"> +<summary> +Send and receive UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="69716"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_utcpserver_port" lineno="69732"> +<summary> +Bind TCP sockets to the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_utcpserver_port" lineno="69752"> +<summary> +Bind UDP sockets to the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_utcpserver_port" lineno="69771"> +<summary> +Make a TCP connection to the utcpserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_utcpserver_client_packets" lineno="69791"> +<summary> +Send utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="69810"> +<summary> +Do not audit attempts to send utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_utcpserver_client_packets" lineno="69829"> +<summary> +Receive utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="69848"> +<summary> +Do not audit attempts to receive utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="69867"> +<summary> +Send and receive utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="69883"> +<summary> +Do not audit attempts to send and receive utcpserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_utcpserver_client_packets" lineno="69898"> +<summary> +Relabel packets to utcpserver_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_utcpserver_server_packets" lineno="69918"> +<summary> +Send utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="69937"> +<summary> +Do not audit attempts to send utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_utcpserver_server_packets" lineno="69956"> +<summary> +Receive utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="69975"> +<summary> +Do not audit attempts to receive utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="69994"> +<summary> +Send and receive utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="70010"> +<summary> +Do not audit attempts to send and receive utcpserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_utcpserver_server_packets" lineno="70025"> +<summary> +Relabel packets to utcpserver_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="70047"> +<summary> +Send and receive TCP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_uucpd_port" lineno="70066"> +<summary> +Send UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="70085"> +<summary> +Do not audit attempts to send UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_uucpd_port" lineno="70104"> +<summary> +Receive UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="70123"> +<summary> +Do not audit attempts to receive UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_uucpd_port" lineno="70142"> +<summary> +Send and receive UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="70159"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_uucpd_port" lineno="70175"> +<summary> +Bind TCP sockets to the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_uucpd_port" lineno="70195"> +<summary> +Bind UDP sockets to the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_uucpd_port" lineno="70214"> +<summary> +Make a TCP connection to the uucpd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_uucpd_client_packets" lineno="70234"> +<summary> +Send uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="70253"> +<summary> +Do not audit attempts to send uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_uucpd_client_packets" lineno="70272"> +<summary> +Receive uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="70291"> +<summary> +Do not audit attempts to receive uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_uucpd_client_packets" lineno="70310"> +<summary> +Send and receive uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="70326"> +<summary> +Do not audit attempts to send and receive uucpd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_uucpd_client_packets" lineno="70341"> +<summary> +Relabel packets to uucpd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_uucpd_server_packets" lineno="70361"> +<summary> +Send uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="70380"> +<summary> +Do not audit attempts to send uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_uucpd_server_packets" lineno="70399"> +<summary> +Receive uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="70418"> +<summary> +Do not audit attempts to receive uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_uucpd_server_packets" lineno="70437"> +<summary> +Send and receive uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="70453"> +<summary> +Do not audit attempts to send and receive uucpd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_uucpd_server_packets" lineno="70468"> +<summary> +Relabel packets to uucpd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="70490"> +<summary> +Send and receive TCP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_varnishd_port" lineno="70509"> +<summary> +Send UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="70528"> +<summary> +Do not audit attempts to send UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_varnishd_port" lineno="70547"> +<summary> +Receive UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="70566"> +<summary> +Do not audit attempts to receive UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_varnishd_port" lineno="70585"> +<summary> +Send and receive UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="70602"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_varnishd_port" lineno="70618"> +<summary> +Bind TCP sockets to the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_varnishd_port" lineno="70638"> +<summary> +Bind UDP sockets to the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_varnishd_port" lineno="70657"> +<summary> +Make a TCP connection to the varnishd port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_varnishd_client_packets" lineno="70677"> +<summary> +Send varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="70696"> +<summary> +Do not audit attempts to send varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_varnishd_client_packets" lineno="70715"> +<summary> +Receive varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="70734"> +<summary> +Do not audit attempts to receive varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_varnishd_client_packets" lineno="70753"> +<summary> +Send and receive varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="70769"> +<summary> +Do not audit attempts to send and receive varnishd_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_varnishd_client_packets" lineno="70784"> +<summary> +Relabel packets to varnishd_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_varnishd_server_packets" lineno="70804"> +<summary> +Send varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="70823"> +<summary> +Do not audit attempts to send varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_varnishd_server_packets" lineno="70842"> +<summary> +Receive varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="70861"> +<summary> +Do not audit attempts to receive varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_varnishd_server_packets" lineno="70880"> +<summary> +Send and receive varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="70896"> +<summary> +Do not audit attempts to send and receive varnishd_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_varnishd_server_packets" lineno="70911"> +<summary> +Relabel packets to varnishd_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_virt_port" lineno="70933"> +<summary> +Send and receive TCP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_virt_port" lineno="70952"> +<summary> +Send UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_virt_port" lineno="70971"> +<summary> +Do not audit attempts to send UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_virt_port" lineno="70990"> +<summary> +Receive UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="71009"> +<summary> +Do not audit attempts to receive UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_virt_port" lineno="71028"> +<summary> +Send and receive UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="71045"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the virt port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_virt_port" lineno="71061"> +<summary> +Bind TCP sockets to the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_virt_port" lineno="71081"> +<summary> +Bind UDP sockets to the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_virt_port" lineno="71100"> +<summary> +Make a TCP connection to the virt port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_virt_client_packets" lineno="71120"> +<summary> +Send virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_virt_client_packets" lineno="71139"> +<summary> +Do not audit attempts to send virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_virt_client_packets" lineno="71158"> +<summary> +Receive virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="71177"> +<summary> +Do not audit attempts to receive virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_virt_client_packets" lineno="71196"> +<summary> +Send and receive virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="71212"> +<summary> +Do not audit attempts to send and receive virt_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_virt_client_packets" lineno="71227"> +<summary> +Relabel packets to virt_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_virt_server_packets" lineno="71247"> +<summary> +Send virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_virt_server_packets" lineno="71266"> +<summary> +Do not audit attempts to send virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_virt_server_packets" lineno="71285"> +<summary> +Receive virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="71304"> +<summary> +Do not audit attempts to receive virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_virt_server_packets" lineno="71323"> +<summary> +Send and receive virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="71339"> +<summary> +Do not audit attempts to send and receive virt_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_virt_server_packets" lineno="71354"> +<summary> +Relabel packets to virt_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="71376"> +<summary> +Send and receive TCP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_virt_migration_port" lineno="71395"> +<summary> +Send UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="71414"> +<summary> +Do not audit attempts to send UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_virt_migration_port" lineno="71433"> +<summary> +Receive UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="71452"> +<summary> +Do not audit attempts to receive UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="71471"> +<summary> +Send and receive UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="71488"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_virt_migration_port" lineno="71504"> +<summary> +Bind TCP sockets to the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_virt_migration_port" lineno="71524"> +<summary> +Bind UDP sockets to the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_virt_migration_port" lineno="71543"> +<summary> +Make a TCP connection to the virt_migration port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_virt_migration_client_packets" lineno="71563"> +<summary> +Send virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="71582"> +<summary> +Do not audit attempts to send virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_virt_migration_client_packets" lineno="71601"> +<summary> +Receive virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="71620"> +<summary> +Do not audit attempts to receive virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="71639"> +<summary> +Send and receive virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="71655"> +<summary> +Do not audit attempts to send and receive virt_migration_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_virt_migration_client_packets" lineno="71670"> +<summary> +Relabel packets to virt_migration_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_virt_migration_server_packets" lineno="71690"> +<summary> +Send virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="71709"> +<summary> +Do not audit attempts to send virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_virt_migration_server_packets" lineno="71728"> +<summary> +Receive virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="71747"> +<summary> +Do not audit attempts to receive virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="71766"> +<summary> +Send and receive virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="71782"> +<summary> +Do not audit attempts to send and receive virt_migration_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_virt_migration_server_packets" lineno="71797"> +<summary> +Relabel packets to virt_migration_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_vnc_port" lineno="71819"> +<summary> +Send and receive TCP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_vnc_port" lineno="71838"> +<summary> +Send UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="71857"> +<summary> +Do not audit attempts to send UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_vnc_port" lineno="71876"> +<summary> +Receive UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="71895"> +<summary> +Do not audit attempts to receive UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_vnc_port" lineno="71914"> +<summary> +Send and receive UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="71931"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the vnc port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_vnc_port" lineno="71947"> +<summary> +Bind TCP sockets to the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_vnc_port" lineno="71967"> +<summary> +Bind UDP sockets to the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_vnc_port" lineno="71986"> +<summary> +Make a TCP connection to the vnc port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_vnc_client_packets" lineno="72006"> +<summary> +Send vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="72025"> +<summary> +Do not audit attempts to send vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_vnc_client_packets" lineno="72044"> +<summary> +Receive vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="72063"> +<summary> +Do not audit attempts to receive vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_vnc_client_packets" lineno="72082"> +<summary> +Send and receive vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="72098"> +<summary> +Do not audit attempts to send and receive vnc_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_vnc_client_packets" lineno="72113"> +<summary> +Relabel packets to vnc_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_vnc_server_packets" lineno="72133"> +<summary> +Send vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="72152"> +<summary> +Do not audit attempts to send vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_vnc_server_packets" lineno="72171"> +<summary> +Receive vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="72190"> +<summary> +Do not audit attempts to receive vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_vnc_server_packets" lineno="72209"> +<summary> +Send and receive vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="72225"> +<summary> +Do not audit attempts to send and receive vnc_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_vnc_server_packets" lineno="72240"> +<summary> +Relabel packets to vnc_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_wccp_port" lineno="72262"> +<summary> +Send and receive TCP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_wccp_port" lineno="72281"> +<summary> +Send UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="72300"> +<summary> +Do not audit attempts to send UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_wccp_port" lineno="72319"> +<summary> +Receive UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="72338"> +<summary> +Do not audit attempts to receive UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_wccp_port" lineno="72357"> +<summary> +Send and receive UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="72374"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the wccp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_wccp_port" lineno="72390"> +<summary> +Bind TCP sockets to the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_wccp_port" lineno="72410"> +<summary> +Bind UDP sockets to the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_wccp_port" lineno="72429"> +<summary> +Make a TCP connection to the wccp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_wccp_client_packets" lineno="72449"> +<summary> +Send wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="72468"> +<summary> +Do not audit attempts to send wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_wccp_client_packets" lineno="72487"> +<summary> +Receive wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="72506"> +<summary> +Do not audit attempts to receive wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_wccp_client_packets" lineno="72525"> +<summary> +Send and receive wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="72541"> +<summary> +Do not audit attempts to send and receive wccp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_wccp_client_packets" lineno="72556"> +<summary> +Relabel packets to wccp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_wccp_server_packets" lineno="72576"> +<summary> +Send wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="72595"> +<summary> +Do not audit attempts to send wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_wccp_server_packets" lineno="72614"> +<summary> +Receive wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="72633"> +<summary> +Do not audit attempts to receive wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_wccp_server_packets" lineno="72652"> +<summary> +Send and receive wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="72668"> +<summary> +Do not audit attempts to send and receive wccp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_wccp_server_packets" lineno="72683"> +<summary> +Relabel packets to wccp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_whois_port" lineno="72705"> +<summary> +Send and receive TCP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_whois_port" lineno="72724"> +<summary> +Send UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_whois_port" lineno="72743"> +<summary> +Do not audit attempts to send UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_whois_port" lineno="72762"> +<summary> +Receive UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="72781"> +<summary> +Do not audit attempts to receive UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_whois_port" lineno="72800"> +<summary> +Send and receive UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="72817"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the whois port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_whois_port" lineno="72833"> +<summary> +Bind TCP sockets to the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_whois_port" lineno="72853"> +<summary> +Bind UDP sockets to the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_whois_port" lineno="72872"> +<summary> +Make a TCP connection to the whois port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_whois_client_packets" lineno="72892"> +<summary> +Send whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_whois_client_packets" lineno="72911"> +<summary> +Do not audit attempts to send whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_whois_client_packets" lineno="72930"> +<summary> +Receive whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="72949"> +<summary> +Do not audit attempts to receive whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_whois_client_packets" lineno="72968"> +<summary> +Send and receive whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="72984"> +<summary> +Do not audit attempts to send and receive whois_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_whois_client_packets" lineno="72999"> +<summary> +Relabel packets to whois_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_whois_server_packets" lineno="73019"> +<summary> +Send whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_whois_server_packets" lineno="73038"> +<summary> +Do not audit attempts to send whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_whois_server_packets" lineno="73057"> +<summary> +Receive whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="73076"> +<summary> +Do not audit attempts to receive whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_whois_server_packets" lineno="73095"> +<summary> +Send and receive whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="73111"> +<summary> +Do not audit attempts to send and receive whois_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_whois_server_packets" lineno="73126"> +<summary> +Relabel packets to whois_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="73148"> +<summary> +Send and receive TCP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_xdmcp_port" lineno="73167"> +<summary> +Send UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="73186"> +<summary> +Do not audit attempts to send UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_xdmcp_port" lineno="73205"> +<summary> +Receive UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="73224"> +<summary> +Do not audit attempts to receive UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="73243"> +<summary> +Send and receive UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="73260"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_xdmcp_port" lineno="73276"> +<summary> +Bind TCP sockets to the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_xdmcp_port" lineno="73296"> +<summary> +Bind UDP sockets to the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_xdmcp_port" lineno="73315"> +<summary> +Make a TCP connection to the xdmcp port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xdmcp_client_packets" lineno="73335"> +<summary> +Send xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="73354"> +<summary> +Do not audit attempts to send xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xdmcp_client_packets" lineno="73373"> +<summary> +Receive xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="73392"> +<summary> +Do not audit attempts to receive xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="73411"> +<summary> +Send and receive xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="73427"> +<summary> +Do not audit attempts to send and receive xdmcp_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xdmcp_client_packets" lineno="73442"> +<summary> +Relabel packets to xdmcp_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xdmcp_server_packets" lineno="73462"> +<summary> +Send xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="73481"> +<summary> +Do not audit attempts to send xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xdmcp_server_packets" lineno="73500"> +<summary> +Receive xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="73519"> +<summary> +Do not audit attempts to receive xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="73538"> +<summary> +Send and receive xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="73554"> +<summary> +Do not audit attempts to send and receive xdmcp_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xdmcp_server_packets" lineno="73569"> +<summary> +Relabel packets to xdmcp_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_xen_port" lineno="73591"> +<summary> +Send and receive TCP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_xen_port" lineno="73610"> +<summary> +Send UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_xen_port" lineno="73629"> +<summary> +Do not audit attempts to send UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_xen_port" lineno="73648"> +<summary> +Receive UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="73667"> +<summary> +Do not audit attempts to receive UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_xen_port" lineno="73686"> +<summary> +Send and receive UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="73703"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the xen port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_xen_port" lineno="73719"> +<summary> +Bind TCP sockets to the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_xen_port" lineno="73739"> +<summary> +Bind UDP sockets to the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_xen_port" lineno="73758"> +<summary> +Make a TCP connection to the xen port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xen_client_packets" lineno="73778"> +<summary> +Send xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xen_client_packets" lineno="73797"> +<summary> +Do not audit attempts to send xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xen_client_packets" lineno="73816"> +<summary> +Receive xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="73835"> +<summary> +Do not audit attempts to receive xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xen_client_packets" lineno="73854"> +<summary> +Send and receive xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="73870"> +<summary> +Do not audit attempts to send and receive xen_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xen_client_packets" lineno="73885"> +<summary> +Relabel packets to xen_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xen_server_packets" lineno="73905"> +<summary> +Send xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xen_server_packets" lineno="73924"> +<summary> +Do not audit attempts to send xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xen_server_packets" lineno="73943"> +<summary> +Receive xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="73962"> +<summary> +Do not audit attempts to receive xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xen_server_packets" lineno="73981"> +<summary> +Send and receive xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="73997"> +<summary> +Do not audit attempts to send and receive xen_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xen_server_packets" lineno="74012"> +<summary> +Relabel packets to xen_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_xfs_port" lineno="74034"> +<summary> +Send and receive TCP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_xfs_port" lineno="74053"> +<summary> +Send UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="74072"> +<summary> +Do not audit attempts to send UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_xfs_port" lineno="74091"> +<summary> +Receive UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="74110"> +<summary> +Do not audit attempts to receive UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_xfs_port" lineno="74129"> +<summary> +Send and receive UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="74146"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the xfs port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_xfs_port" lineno="74162"> +<summary> +Bind TCP sockets to the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_xfs_port" lineno="74182"> +<summary> +Bind UDP sockets to the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_xfs_port" lineno="74201"> +<summary> +Make a TCP connection to the xfs port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xfs_client_packets" lineno="74221"> +<summary> +Send xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="74240"> +<summary> +Do not audit attempts to send xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xfs_client_packets" lineno="74259"> +<summary> +Receive xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="74278"> +<summary> +Do not audit attempts to receive xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xfs_client_packets" lineno="74297"> +<summary> +Send and receive xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="74313"> +<summary> +Do not audit attempts to send and receive xfs_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xfs_client_packets" lineno="74328"> +<summary> +Relabel packets to xfs_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xfs_server_packets" lineno="74348"> +<summary> +Send xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="74367"> +<summary> +Do not audit attempts to send xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xfs_server_packets" lineno="74386"> +<summary> +Receive xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="74405"> +<summary> +Do not audit attempts to receive xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xfs_server_packets" lineno="74424"> +<summary> +Send and receive xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="74440"> +<summary> +Do not audit attempts to send and receive xfs_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xfs_server_packets" lineno="74455"> +<summary> +Relabel packets to xfs_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_xserver_port" lineno="74477"> +<summary> +Send and receive TCP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_xserver_port" lineno="74496"> +<summary> +Send UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="74515"> +<summary> +Do not audit attempts to send UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_xserver_port" lineno="74534"> +<summary> +Receive UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="74553"> +<summary> +Do not audit attempts to receive UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_xserver_port" lineno="74572"> +<summary> +Send and receive UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="74589"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the xserver port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_xserver_port" lineno="74605"> +<summary> +Bind TCP sockets to the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_xserver_port" lineno="74625"> +<summary> +Bind UDP sockets to the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_xserver_port" lineno="74644"> +<summary> +Make a TCP connection to the xserver port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xserver_client_packets" lineno="74664"> +<summary> +Send xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="74683"> +<summary> +Do not audit attempts to send xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xserver_client_packets" lineno="74702"> +<summary> +Receive xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="74721"> +<summary> +Do not audit attempts to receive xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xserver_client_packets" lineno="74740"> +<summary> +Send and receive xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="74756"> +<summary> +Do not audit attempts to send and receive xserver_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xserver_client_packets" lineno="74771"> +<summary> +Relabel packets to xserver_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_xserver_server_packets" lineno="74791"> +<summary> +Send xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="74810"> +<summary> +Do not audit attempts to send xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_xserver_server_packets" lineno="74829"> +<summary> +Receive xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="74848"> +<summary> +Do not audit attempts to receive xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_xserver_server_packets" lineno="74867"> +<summary> +Send and receive xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="74883"> +<summary> +Do not audit attempts to send and receive xserver_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_xserver_server_packets" lineno="74898"> +<summary> +Relabel packets to xserver_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="74920"> +<summary> +Send and receive TCP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zarafa_port" lineno="74939"> +<summary> +Send UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="74958"> +<summary> +Do not audit attempts to send UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zarafa_port" lineno="74977"> +<summary> +Receive UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="74996"> +<summary> +Do not audit attempts to receive UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zarafa_port" lineno="75015"> +<summary> +Send and receive UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="75032"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zarafa_port" lineno="75048"> +<summary> +Bind TCP sockets to the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zarafa_port" lineno="75068"> +<summary> +Bind UDP sockets to the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zarafa_port" lineno="75087"> +<summary> +Make a TCP connection to the zarafa port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zarafa_client_packets" lineno="75107"> +<summary> +Send zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="75126"> +<summary> +Do not audit attempts to send zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zarafa_client_packets" lineno="75145"> +<summary> +Receive zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="75164"> +<summary> +Do not audit attempts to receive zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zarafa_client_packets" lineno="75183"> +<summary> +Send and receive zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="75199"> +<summary> +Do not audit attempts to send and receive zarafa_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zarafa_client_packets" lineno="75214"> +<summary> +Relabel packets to zarafa_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zarafa_server_packets" lineno="75234"> +<summary> +Send zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="75253"> +<summary> +Do not audit attempts to send zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zarafa_server_packets" lineno="75272"> +<summary> +Receive zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="75291"> +<summary> +Do not audit attempts to receive zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zarafa_server_packets" lineno="75310"> +<summary> +Send and receive zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="75326"> +<summary> +Do not audit attempts to send and receive zarafa_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zarafa_server_packets" lineno="75341"> +<summary> +Relabel packets to zarafa_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="75363"> +<summary> +Send and receive TCP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zabbix_port" lineno="75382"> +<summary> +Send UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="75401"> +<summary> +Do not audit attempts to send UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zabbix_port" lineno="75420"> +<summary> +Receive UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="75439"> +<summary> +Do not audit attempts to receive UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zabbix_port" lineno="75458"> +<summary> +Send and receive UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="75475"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zabbix_port" lineno="75491"> +<summary> +Bind TCP sockets to the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zabbix_port" lineno="75511"> +<summary> +Bind UDP sockets to the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zabbix_port" lineno="75530"> +<summary> +Make a TCP connection to the zabbix port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zabbix_client_packets" lineno="75550"> +<summary> +Send zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="75569"> +<summary> +Do not audit attempts to send zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zabbix_client_packets" lineno="75588"> +<summary> +Receive zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="75607"> +<summary> +Do not audit attempts to receive zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zabbix_client_packets" lineno="75626"> +<summary> +Send and receive zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="75642"> +<summary> +Do not audit attempts to send and receive zabbix_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zabbix_client_packets" lineno="75657"> +<summary> +Relabel packets to zabbix_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zabbix_server_packets" lineno="75677"> +<summary> +Send zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="75696"> +<summary> +Do not audit attempts to send zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zabbix_server_packets" lineno="75715"> +<summary> +Receive zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="75734"> +<summary> +Do not audit attempts to receive zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zabbix_server_packets" lineno="75753"> +<summary> +Send and receive zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="75769"> +<summary> +Do not audit attempts to send and receive zabbix_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zabbix_server_packets" lineno="75784"> +<summary> +Relabel packets to zabbix_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="75806"> +<summary> +Send and receive TCP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zabbix_agent_port" lineno="75825"> +<summary> +Send UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="75844"> +<summary> +Do not audit attempts to send UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zabbix_agent_port" lineno="75863"> +<summary> +Receive UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="75882"> +<summary> +Do not audit attempts to receive UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="75901"> +<summary> +Send and receive UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="75918"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="75934"> +<summary> +Bind TCP sockets to the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zabbix_agent_port" lineno="75954"> +<summary> +Bind UDP sockets to the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="75973"> +<summary> +Make a TCP connection to the zabbix_agent port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zabbix_agent_client_packets" lineno="75993"> +<summary> +Send zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="76012"> +<summary> +Do not audit attempts to send zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zabbix_agent_client_packets" lineno="76031"> +<summary> +Receive zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="76050"> +<summary> +Do not audit attempts to receive zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="76069"> +<summary> +Send and receive zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="76085"> +<summary> +Do not audit attempts to send and receive zabbix_agent_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="76100"> +<summary> +Relabel packets to zabbix_agent_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zabbix_agent_server_packets" lineno="76120"> +<summary> +Send zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="76139"> +<summary> +Do not audit attempts to send zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zabbix_agent_server_packets" lineno="76158"> +<summary> +Receive zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="76177"> +<summary> +Do not audit attempts to receive zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="76196"> +<summary> +Send and receive zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="76212"> +<summary> +Do not audit attempts to send and receive zabbix_agent_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="76227"> +<summary> +Relabel packets to zabbix_agent_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="76249"> +<summary> +Send and receive TCP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zookeeper_client_port" lineno="76268"> +<summary> +Send UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="76287"> +<summary> +Do not audit attempts to send UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zookeeper_client_port" lineno="76306"> +<summary> +Receive UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="76325"> +<summary> +Do not audit attempts to receive UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="76344"> +<summary> +Send and receive UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="76361"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="76377"> +<summary> +Bind TCP sockets to the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zookeeper_client_port" lineno="76397"> +<summary> +Bind UDP sockets to the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="76416"> +<summary> +Make a TCP connection to the zookeeper_client port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_client_client_packets" lineno="76436"> +<summary> +Send zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="76455"> +<summary> +Do not audit attempts to send zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_client_client_packets" lineno="76474"> +<summary> +Receive zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="76493"> +<summary> +Do not audit attempts to receive zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="76512"> +<summary> +Send and receive zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="76528"> +<summary> +Do not audit attempts to send and receive zookeeper_client_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="76543"> +<summary> +Relabel packets to zookeeper_client_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_client_server_packets" lineno="76563"> +<summary> +Send zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="76582"> +<summary> +Do not audit attempts to send zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_client_server_packets" lineno="76601"> +<summary> +Receive zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="76620"> +<summary> +Do not audit attempts to receive zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="76639"> +<summary> +Send and receive zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="76655"> +<summary> +Do not audit attempts to send and receive zookeeper_client_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="76670"> +<summary> +Relabel packets to zookeeper_client_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="76692"> +<summary> +Send and receive TCP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zookeeper_election_port" lineno="76711"> +<summary> +Send UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="76730"> +<summary> +Do not audit attempts to send UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zookeeper_election_port" lineno="76749"> +<summary> +Receive UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="76768"> +<summary> +Do not audit attempts to receive UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="76787"> +<summary> +Send and receive UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="76804"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="76820"> +<summary> +Bind TCP sockets to the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zookeeper_election_port" lineno="76840"> +<summary> +Bind UDP sockets to the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="76859"> +<summary> +Make a TCP connection to the zookeeper_election port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_election_client_packets" lineno="76879"> +<summary> +Send zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="76898"> +<summary> +Do not audit attempts to send zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_election_client_packets" lineno="76917"> +<summary> +Receive zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="76936"> +<summary> +Do not audit attempts to receive zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="76955"> +<summary> +Send and receive zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="76971"> +<summary> +Do not audit attempts to send and receive zookeeper_election_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="76986"> +<summary> +Relabel packets to zookeeper_election_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_election_server_packets" lineno="77006"> +<summary> +Send zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="77025"> +<summary> +Do not audit attempts to send zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_election_server_packets" lineno="77044"> +<summary> +Receive zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="77063"> +<summary> +Do not audit attempts to receive zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="77082"> +<summary> +Send and receive zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="77098"> +<summary> +Do not audit attempts to send and receive zookeeper_election_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="77113"> +<summary> +Relabel packets to zookeeper_election_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="77135"> +<summary> +Send and receive TCP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zookeeper_leader_port" lineno="77154"> +<summary> +Send UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="77173"> +<summary> +Do not audit attempts to send UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="77192"> +<summary> +Receive UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="77211"> +<summary> +Do not audit attempts to receive UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="77230"> +<summary> +Send and receive UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="77247"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="77263"> +<summary> +Bind TCP sockets to the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="77283"> +<summary> +Bind UDP sockets to the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="77302"> +<summary> +Make a TCP connection to the zookeeper_leader port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_leader_client_packets" lineno="77322"> +<summary> +Send zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="77341"> +<summary> +Do not audit attempts to send zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="77360"> +<summary> +Receive zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="77379"> +<summary> +Do not audit attempts to receive zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="77398"> +<summary> +Send and receive zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="77414"> +<summary> +Do not audit attempts to send and receive zookeeper_leader_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="77429"> +<summary> +Relabel packets to zookeeper_leader_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zookeeper_leader_server_packets" lineno="77449"> +<summary> +Send zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="77468"> +<summary> +Do not audit attempts to send zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="77487"> +<summary> +Receive zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="77506"> +<summary> +Do not audit attempts to receive zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="77525"> +<summary> +Send and receive zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="77541"> +<summary> +Do not audit attempts to send and receive zookeeper_leader_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="77556"> +<summary> +Relabel packets to zookeeper_leader_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zebra_port" lineno="77578"> +<summary> +Send and receive TCP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zebra_port" lineno="77597"> +<summary> +Send UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="77616"> +<summary> +Do not audit attempts to send UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zebra_port" lineno="77635"> +<summary> +Receive UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="77654"> +<summary> +Do not audit attempts to receive UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zebra_port" lineno="77673"> +<summary> +Send and receive UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="77690"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zebra port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zebra_port" lineno="77706"> +<summary> +Bind TCP sockets to the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zebra_port" lineno="77726"> +<summary> +Bind UDP sockets to the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zebra_port" lineno="77745"> +<summary> +Make a TCP connection to the zebra port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zebra_client_packets" lineno="77765"> +<summary> +Send zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="77784"> +<summary> +Do not audit attempts to send zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zebra_client_packets" lineno="77803"> +<summary> +Receive zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="77822"> +<summary> +Do not audit attempts to receive zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zebra_client_packets" lineno="77841"> +<summary> +Send and receive zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="77857"> +<summary> +Do not audit attempts to send and receive zebra_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zebra_client_packets" lineno="77872"> +<summary> +Relabel packets to zebra_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zebra_server_packets" lineno="77892"> +<summary> +Send zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="77911"> +<summary> +Do not audit attempts to send zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zebra_server_packets" lineno="77930"> +<summary> +Receive zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="77949"> +<summary> +Do not audit attempts to receive zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zebra_server_packets" lineno="77968"> +<summary> +Send and receive zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="77984"> +<summary> +Do not audit attempts to send and receive zebra_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zebra_server_packets" lineno="77999"> +<summary> +Relabel packets to zebra_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_zope_port" lineno="78021"> +<summary> +Send and receive TCP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_zope_port" lineno="78040"> +<summary> +Send UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_send_zope_port" lineno="78059"> +<summary> +Do not audit attempts to send UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_receive_zope_port" lineno="78078"> +<summary> +Receive UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="78097"> +<summary> +Do not audit attempts to receive UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_sendrecv_zope_port" lineno="78116"> +<summary> +Send and receive UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="78133"> +<summary> +Do not audit attempts to send and receive +UDP traffic on the zope port. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_bind_zope_port" lineno="78149"> +<summary> +Bind TCP sockets to the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_udp_bind_zope_port" lineno="78169"> +<summary> +Bind UDP sockets to the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_tcp_connect_zope_port" lineno="78188"> +<summary> +Make a TCP connection to the zope port. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zope_client_packets" lineno="78208"> +<summary> +Send zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zope_client_packets" lineno="78227"> +<summary> +Do not audit attempts to send zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zope_client_packets" lineno="78246"> +<summary> +Receive zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="78265"> +<summary> +Do not audit attempts to receive zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zope_client_packets" lineno="78284"> +<summary> +Send and receive zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="78300"> +<summary> +Do not audit attempts to send and receive zope_client packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zope_client_packets" lineno="78315"> +<summary> +Relabel packets to zope_client the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_send_zope_server_packets" lineno="78335"> +<summary> +Send zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_dontaudit_send_zope_server_packets" lineno="78354"> +<summary> +Do not audit attempts to send zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_receive_zope_server_packets" lineno="78373"> +<summary> +Receive zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="78392"> +<summary> +Do not audit attempts to receive zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_sendrecv_zope_server_packets" lineno="78411"> +<summary> +Send and receive zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="78427"> +<summary> +Do not audit attempts to send and receive zope_server packets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="corenet_relabelto_zope_server_packets" lineno="78442"> +<summary> +Relabel packets to zope_server the packet type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="corenet_tcp_sendrecv_lo_if" lineno="78465"> +<summary> +Send and receive TCP network traffic on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_udp_send_lo_if" lineno="78484"> +<summary> +Send UDP network traffic on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_udp_receive_lo_if" lineno="78503"> +<summary> +Receive UDP network traffic on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_udp_sendrecv_lo_if" lineno="78522"> +<summary> +Send and receive UDP network traffic on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="corenet_raw_send_lo_if" lineno="78538"> +<summary> +Send raw IP packets on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="corenet_raw_receive_lo_if" lineno="78557"> +<summary> +Receive raw IP packets on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="corenet_raw_sendrecv_lo_if" lineno="78576"> +<summary> +Send and receive raw IP packets on the lo interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +</module> +<module name="devices" filename="policy/modules/kernel/devices.if"> +<summary> +Device nodes and interfaces for many basic system devices. +</summary> +<desc> +<p> +This module creates the device node concept and provides +the policy for many of the device files. Notable exceptions are +the mass storage and terminal devices that are covered by other +modules. +</p> +<p> +This module creates the concept of a device node. That is a +char or block device file, usually in /dev. All types that +are used to label device nodes should use the dev_node macro. +</p> +<p> +Additionally, this module controls access to three things: +<ul> +<li>the device directories containing device nodes</li> +<li>device nodes as a group</li> +<li>individual access to specific device nodes covered by +this module.</li> +</ul> +</p> +</desc> +<required val="true"> +Depended on by other required modules. +</required> +<interface name="dev_node" lineno="66"> +<summary> +Make the specified type usable for device +nodes in a filesystem. +</summary> +<desc> +<p> +Make the specified type usable for device nodes +in a filesystem. Types used for device nodes that +do not use this interface, or an interface that +calls this one, will have unexpected behaviors +while the system is running. +</p> +<p> +Example: +</p> +<p> +type mydev_t; +dev_node(mydev_t) +allow mydomain_t mydev_t:chr_file read_chr_file_perms; +</p> +<p> +Related interfaces: +</p> +<ul> +<li>term_tty()</li> +<li>term_pty()</li> +</ul> +</desc> +<param name="type"> +<summary> +Type to be used for device nodes. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="dev_associate" lineno="84"> +<summary> +Associate the specified file type with device filesystem. +</summary> +<param name="file_type"> +<summary> +The type of the file to be associated. +</summary> +</param> +</interface> +<interface name="dev_getattr_fs" lineno="103"> +<summary> +Get attributes of device filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_mounton" lineno="121"> +<summary> +Mount a filesystem on /dev +</summary> +<param name="domain"> +<summary> +Domain allow access. +</summary> +</param> +</interface> +<interface name="dev_relabel_all_dev_nodes" lineno="140"> +<summary> +Allow full relabeling (to and from) of all device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dev_list_all_dev_nodes" lineno="165"> +<summary> +List all of the device nodes in a device directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_generic_dirs" lineno="184"> +<summary> +Set the attributes of /dev directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_list_all_dev_nodes" lineno="202"> +<summary> +Dontaudit attempts to list all device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_add_entry_generic_dirs" lineno="220"> +<summary> +Add entries to directories in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_remove_entry_generic_dirs" lineno="238"> +<summary> +Add entries to directories in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_create_generic_dirs" lineno="256"> +<summary> +Create a directory in the device directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_generic_dirs" lineno="275"> +<summary> +Delete a directory in the device directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_generic_dirs" lineno="293"> +<summary> +Manage of directories in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_relabel_generic_dev_dirs" lineno="311"> +<summary> +Allow full relabeling (to and from) of directories in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_generic_files" lineno="329"> +<summary> +dontaudit getattr generic files in /dev. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_generic_files" lineno="347"> +<summary> +Read generic files in /dev. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_generic_files" lineno="365"> +<summary> +Read and write generic files in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_generic_files" lineno="383"> +<summary> +Delete generic files in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_generic_files" lineno="401"> +<summary> +Create a file in the device directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_generic_pipes" lineno="419"> +<summary> +Dontaudit getattr on generic pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_generic_sockets" lineno="437"> +<summary> +Write generic socket files in /dev. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_getattr_generic_blk_files" lineno="455"> +<summary> +Allow getattr on generic block devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="473"> +<summary> +Dontaudit getattr on generic block devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="491"> +<summary> +Dontaudit setattr on generic block devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_create_generic_blk_files" lineno="509"> +<summary> +Create generic block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_generic_blk_files" lineno="527"> +<summary> +Delete generic block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_generic_chr_files" lineno="545"> +<summary> +Allow getattr for generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="563"> +<summary> +Dontaudit getattr for generic character device files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="581"> +<summary> +Dontaudit setattr for generic character device files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_generic_chr_files" lineno="599"> +<summary> +Read generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_generic_chr_files" lineno="617"> +<summary> +Read and write generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_generic_blk_files" lineno="635"> +<summary> +Read and write generic block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_generic_chr_files" lineno="653"> +<summary> +Dontaudit attempts to read/write generic character device files. +</summary> +<param name="domain"> +<summary> +Domain to dontaudit access. +</summary> +</param> +</interface> +<interface name="dev_create_generic_chr_files" lineno="671"> +<summary> +Create generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_generic_chr_files" lineno="689"> +<summary> +Delete generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_relabelfrom_generic_chr_files" lineno="707"> +<summary> +Relabel from generic character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="726"> +<summary> +Do not audit attempts to set the attributes +of symbolic links in device directories (/dev). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_generic_symlinks" lineno="744"> +<summary> +Read symbolic links in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_create_generic_symlinks" lineno="762"> +<summary> +Create symbolic links in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_generic_symlinks" lineno="780"> +<summary> +Delete symbolic links in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_generic_symlinks" lineno="798"> +<summary> +Create, delete, read, and write symbolic links in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_relabel_generic_symlinks" lineno="816"> +<summary> +Relabel symbolic links in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_all_dev_nodes" lineno="834"> +<summary> +Create, delete, read, and write device nodes in device directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="870"> +<summary> +Dontaudit getattr for generic device files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_manage_generic_blk_files" lineno="888"> +<summary> +Create, delete, read, and write block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_generic_chr_files" lineno="906"> +<summary> +Create, delete, read, and write character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_filetrans" lineno="936"> +<summary> +Create, read, and write device nodes. The node +will be transitioned to the type provided. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file"> +<summary> +Type to which the created node will be transitioned. +</summary> +</param> +<param name="objectclass(es)"> +<summary> +Object class(es) (single or set including {}) for which this +the transition will occur. +</summary> +</param> +</interface> +<interface name="dev_tmpfs_filetrans_dev" lineno="966"> +<summary> +Create, read, and write device nodes. The node +will be transitioned to the type provided. This is +a temporary interface until devtmpfs functionality +fixed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="objectclass(es)"> +<summary> +Object class(es) (single or set including {}) for which this +the transition will occur. +</summary> +</param> +</interface> +<interface name="dev_getattr_all_blk_files" lineno="985"> +<summary> +Getattr on all block file device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1004"> +<summary> +Dontaudit getattr on all block file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_getattr_all_chr_files" lineno="1024"> +<summary> +Getattr on all character file device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1042"> +<summary> +Dontaudit getattr on all character file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_all_blk_files" lineno="1062"> +<summary> +Setattr on all block file device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dev_setattr_all_chr_files" lineno="1081"> +<summary> +Setattr on all character file device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="dev_dontaudit_read_all_blk_files" lineno="1099"> +<summary> +Dontaudit read on all block file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_write_all_blk_files" lineno="1117"> +<summary> +Dontaudit write on all block file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_read_all_chr_files" lineno="1135"> +<summary> +Dontaudit read on all character file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_write_all_chr_files" lineno="1153"> +<summary> +Dontaudit write on all character file device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_create_all_blk_files" lineno="1171"> +<summary> +Create all block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_create_all_chr_files" lineno="1189"> +<summary> +Create all character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_all_blk_files" lineno="1207"> +<summary> +Delete all block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_all_chr_files" lineno="1225"> +<summary> +Delete all character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rename_all_blk_files" lineno="1243"> +<summary> +Rename all block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rename_all_chr_files" lineno="1261"> +<summary> +Rename all character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_all_blk_files" lineno="1279"> +<summary> +Read, write, create, and delete all block device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_all_chr_files" lineno="1303"> +<summary> +Read, write, create, and delete all character device files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_agp_dev" lineno="1323"> +<summary> +Getattr the agp devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_agp" lineno="1341"> +<summary> +Read and write the agp devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_apm_bios_dev" lineno="1359"> +<summary> +Get the attributes of the apm bios device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_apm_bios_dev" lineno="1378"> +<summary> +Do not audit attempts to get the attributes of +the apm bios device node. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_apm_bios_dev" lineno="1396"> +<summary> +Set the attributes of the apm bios device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_apm_bios_dev" lineno="1415"> +<summary> +Do not audit attempts to set the attributes of +the apm bios device node. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_apm_bios" lineno="1433"> +<summary> +Read and write the apm bios. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_autofs_dev" lineno="1451"> +<summary> +Get the attributes of the autofs device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1470"> +<summary> +Do not audit attempts to get the attributes of +the autofs device node. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_autofs_dev" lineno="1488"> +<summary> +Set the attributes of the autofs device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1507"> +<summary> +Do not audit attempts to set the attributes of +the autofs device node. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_autofs" lineno="1525"> +<summary> +Read and write the autofs device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_relabel_autofs_dev" lineno="1543"> +<summary> +Relabel the autofs device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_cardmgr" lineno="1561"> +<summary> +Read and write the PCMCIA card manager device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_cardmgr" lineno="1580"> +<summary> +Do not audit attempts to read and +write the PCMCIA card manager device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_create_cardmgr_dev" lineno="1600"> +<summary> +Create, read, write, and delete +the PCMCIA card manager device +with the correct type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_cardmgr_dev" lineno="1620"> +<summary> +Create, read, write, and delete +the PCMCIA card manager device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_filetrans_cardmgr" lineno="1641"> +<summary> +Automatic type transition to the type +for PCMCIA card manager device nodes when +created in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_cpu_dev" lineno="1660"> +<summary> +Get the attributes of the CPU +microcode and id interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_cpu_dev" lineno="1679"> +<summary> +Set the attributes of the CPU +microcode and id interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_cpuid" lineno="1697"> +<summary> +Read the CPU identity. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_cpu_microcode" lineno="1716"> +<summary> +Read and write the the CPU microcode device. This +is required to load CPU microcode. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_crash" lineno="1734"> +<summary> +Read the kernel crash device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_crypto" lineno="1752"> +<summary> +Read and write the the hardware SSL accelerator. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_dlm_control" lineno="1770"> +<summary> +Set the attributes of the dlm control devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_dlm_control" lineno="1788"> +<summary> +Read and write the the dlm control device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_dri_dev" lineno="1806"> +<summary> +getattr the dri devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_dri_dev" lineno="1824"> +<summary> +Setattr the dri devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_dri" lineno="1842"> +<summary> +Read and write the dri devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_dri" lineno="1860"> +<summary> +Dontaudit read and write on the dri devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_manage_dri_dev" lineno="1878"> +<summary> +Create, read, write, and delete the dri devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_filetrans_dri" lineno="1897"> +<summary> +Automatic type transition to the type +for DRI device nodes when created in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_input_dev" lineno="1915"> +<summary> +Get the attributes of the event devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_input_dev" lineno="1934"> +<summary> +Set the attributes of the event devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_input" lineno="1953"> +<summary> +Read input event devices (/dev/input). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_input_dev" lineno="1971"> +<summary> +Read input event devices (/dev/input). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_framebuffer_dev" lineno="1989"> +<summary> +Get the attributes of the framebuffer device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_framebuffer_dev" lineno="2007"> +<summary> +Set the attributes of the framebuffer device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2026"> +<summary> +Dot not audit attempts to set the attributes +of the framebuffer device node. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_framebuffer" lineno="2044"> +<summary> +Read the framebuffer. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_read_framebuffer" lineno="2062"> +<summary> +Do not audit attempts to read the framebuffer. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_framebuffer" lineno="2080"> +<summary> +Write the framebuffer. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_framebuffer" lineno="2098"> +<summary> +Read and write the framebuffer. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_kmsg" lineno="2116"> +<summary> +Read the kernel messages +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_read_kmsg" lineno="2134"> +<summary> +Do not audit attempts to read the kernel messages +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_kmsg" lineno="2152"> +<summary> +Write to the kernel messages device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_ksm_dev" lineno="2170"> +<summary> +Get the attributes of the ksm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_ksm_dev" lineno="2188"> +<summary> +Set the attributes of the ksm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_ksm" lineno="2206"> +<summary> +Read the ksm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_ksm" lineno="2224"> +<summary> +Read and write to ksm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_kvm_dev" lineno="2242"> +<summary> +Get the attributes of the kvm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_kvm_dev" lineno="2260"> +<summary> +Set the attributes of the kvm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_kvm" lineno="2278"> +<summary> +Read the kvm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_kvm" lineno="2296"> +<summary> +Read and write to kvm devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_lirc" lineno="2314"> +<summary> +Read the lirc device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_lirc" lineno="2332"> +<summary> +Read and write the lirc device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_filetrans_lirc" lineno="2351"> +<summary> +Automatic type transition to the type +for lirc device nodes when created in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_lvm_control" lineno="2369"> +<summary> +Get the attributes of the lvm comtrol device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_lvm_control" lineno="2387"> +<summary> +Read the lvm comtrol device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_lvm_control" lineno="2405"> +<summary> +Read and write the lvm control device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_lvm_control" lineno="2423"> +<summary> +Do not audit attempts to read and write lvm control device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_delete_lvm_control_dev" lineno="2441"> +<summary> +Delete the lvm control device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_memory_dev" lineno="2459"> +<summary> +dontaudit getattr raw memory devices (e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_raw_memory" lineno="2477"> +<summary> +Read raw memory devices (e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_read_raw_memory" lineno="2500"> +<summary> +Do not audit attempts to read raw memory devices +(e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_raw_memory" lineno="2518"> +<summary> +Write raw memory devices (e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rx_raw_memory" lineno="2540"> +<summary> +Read and execute raw memory devices (e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_wx_raw_memory" lineno="2559"> +<summary> +Write and execute raw memory devices (e.g. /dev/mem). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_misc_dev" lineno="2578"> +<summary> +Get the attributes of miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_misc_dev" lineno="2597"> +<summary> +Do not audit attempts to get the attributes +of miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_misc_dev" lineno="2615"> +<summary> +Set the attributes of miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_misc_dev" lineno="2634"> +<summary> +Do not audit attempts to set the attributes +of miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_misc" lineno="2652"> +<summary> +Read miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_misc" lineno="2670"> +<summary> +Write miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_rw_misc" lineno="2688"> +<summary> +Do not audit attempts to read and write miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_modem_dev" lineno="2706"> +<summary> +Get the attributes of the modem devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_modem_dev" lineno="2724"> +<summary> +Set the attributes of the modem devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_modem" lineno="2742"> +<summary> +Read the modem devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_modem" lineno="2760"> +<summary> +Read and write to modem devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_mouse_dev" lineno="2778"> +<summary> +Get the attributes of the mouse devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_mouse_dev" lineno="2796"> +<summary> +Set the attributes of the mouse devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_mouse" lineno="2814"> +<summary> +Read the mouse devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_mouse" lineno="2832"> +<summary> +Read and write to mouse devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_mtrr_dev" lineno="2851"> +<summary> +Get the attributes of the memory type range +registers (MTRR) device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_mtrr" lineno="2884"> +<summary> +Read the memory type range +registers (MTRR). (Deprecated) +</summary> +<desc> +<p> +Read the memory type range +registers (MTRR). This interface has +been deprecated, dev_rw_mtrr() should be +used instead. +</p> +<p> +The MTRR device ioctls can be used for +reading and writing; thus, read access to the +device cannot be separated from write access. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_mtrr" lineno="2913"> +<summary> +Write the memory type range +registers (MTRR). (Deprecated) +</summary> +<desc> +<p> +Write the memory type range +registers (MTRR). This interface has +been deprecated, dev_rw_mtrr() should be +used instead. +</p> +<p> +The MTRR device ioctls can be used for +reading and writing; thus, write access to the +device cannot be separated from read access. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_write_mtrr" lineno="2929"> +<summary> +Do not audit attempts to write the memory type +range registers (MTRR). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_mtrr" lineno="2948"> +<summary> +Read and write the memory type range registers (MTRR). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_netcontrol_dev" lineno="2967"> +<summary> +Get the attributes of the network control device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_netcontrol" lineno="2985"> +<summary> +Read the network control identity. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_netcontrol" lineno="3003"> +<summary> +Read and write the the network control device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_null_dev" lineno="3021"> +<summary> +Get the attributes of the null device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_null_dev" lineno="3039"> +<summary> +Set the attributes of the null device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_delete_null" lineno="3057"> +<summary> +Delete the null device (/dev/null). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_null" lineno="3075"> +<summary> +Read and write to the null device (/dev/null). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_create_null_dev" lineno="3093"> +<summary> +Create the null device (/dev/null). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_nvram_dev" lineno="3112"> +<summary> +Do not audit attempts to get the attributes +of the BIOS non-volatile RAM device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_nvram" lineno="3130"> +<summary> +Read and write BIOS non-volatile RAM. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_printer_dev" lineno="3148"> +<summary> +Get the attributes of the printer device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_printer_dev" lineno="3166"> +<summary> +Set the attributes of the printer device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_append_printer" lineno="3185"> +<summary> +Append the printer device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_printer" lineno="3203"> +<summary> +Read and write the printer device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_printk" lineno="3221"> +<summary> +Read printk devices (e.g., /dev/kmsg /dev/mcelog) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_qemu_dev" lineno="3240"> +<summary> +Get the attributes of the QEMU +microcode and id interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_qemu_dev" lineno="3259"> +<summary> +Set the attributes of the QEMU +microcode and id interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_qemu" lineno="3277"> +<summary> +Read the QEMU device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_qemu" lineno="3295"> +<summary> +Read and write the the QEMU device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_rand" lineno="3329"> +<summary> +Read from random number generator +devices (e.g., /dev/random). +</summary> +<desc> +<p> +Allow the specified domain to read from random number +generator devices (e.g., /dev/random). Typically this is +used in situations when a cryptographically secure random +number is needed. +</p> +<p> +Related interface: +</p> +<ul> +<li>dev_read_urand()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="dev_dontaudit_read_rand" lineno="3348"> +<summary> +Do not audit attempts to read from random +number generator devices (e.g., /dev/random) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_append_rand" lineno="3367"> +<summary> +Do not audit attempts to append to random +number generator devices (e.g., /dev/random) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_rand" lineno="3387"> +<summary> +Write to the random device (e.g., /dev/random). This adds +entropy used to generate the random data read from the +random device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_realtime_clock" lineno="3405"> +<summary> +Read the realtime clock (/dev/rtc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_realtime_clock" lineno="3423"> +<summary> +Set the realtime clock (/dev/rtc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_realtime_clock" lineno="3443"> +<summary> +Read and set the realtime clock (/dev/rtc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_scanner_dev" lineno="3458"> +<summary> +Get the attributes of the scanner device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_scanner_dev" lineno="3477"> +<summary> +Do not audit attempts to get the attributes of +the scanner device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_scanner_dev" lineno="3495"> +<summary> +Set the attributes of the scanner device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_scanner_dev" lineno="3514"> +<summary> +Do not audit attempts to set the attributes of +the scanner device. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_scanner" lineno="3532"> +<summary> +Read and write the scanner device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_sound_dev" lineno="3550"> +<summary> +Get the attributes of the sound devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_sound_dev" lineno="3568"> +<summary> +Set the attributes of the sound devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_sound" lineno="3586"> +<summary> +Read the sound devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_sound" lineno="3604"> +<summary> +Write the sound devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_sound_mixer" lineno="3622"> +<summary> +Read the sound mixer devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_sound_mixer" lineno="3640"> +<summary> +Write the sound mixer devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_power_mgmt_dev" lineno="3658"> +<summary> +Get the attributes of the the power management device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_power_mgmt_dev" lineno="3676"> +<summary> +Set the attributes of the the power management device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_power_management" lineno="3694"> +<summary> +Read and write the the power management device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_smartcard_dev" lineno="3712"> +<summary> +Getattr on smartcard devices +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="3731"> +<summary> +dontaudit getattr on smartcard devices +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_rw_smartcard" lineno="3750"> +<summary> +Read and write smartcard devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_smartcard" lineno="3768"> +<summary> +Create, read, write, and delete smartcard devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_associate_sysfs" lineno="3786"> +<summary> +Associate a file to a sysfs filesystem. +</summary> +<param name="file_type"> +<summary> +The type of the file to be associated to sysfs. +</summary> +</param> +</interface> +<interface name="dev_getattr_sysfs_dirs" lineno="3804"> +<summary> +Get the attributes of sysfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_search_sysfs" lineno="3822"> +<summary> +Search the sysfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_search_sysfs" lineno="3840"> +<summary> +Do not audit attempts to search sysfs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_list_sysfs" lineno="3858"> +<summary> +List the contents of the sysfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_sysfs_dirs" lineno="3877"> +<summary> +Write in a sysfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_write_sysfs_dirs" lineno="3895"> +<summary> +Do not audit attempts to write in a sysfs directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_manage_sysfs_dirs" lineno="3914"> +<summary> +Create, read, write, and delete sysfs +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_sysfs" lineno="3941"> +<summary> +Read hardware state information. +</summary> +<desc> +<p> +Allow the specified domain to read the contents of +the sysfs filesystem. This filesystem contains +information, parameters, and other settings on the +hardware installed on the system. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="dev_rw_sysfs" lineno="3962"> +<summary> +Allow caller to modify hardware state information. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_tpm" lineno="3983"> +<summary> +Read and write the TPM device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_urand" lineno="4024"> +<summary> +Read from pseudo random number generator devices (e.g., /dev/urandom). +</summary> +<desc> +<p> +Allow the specified domain to read from pseudo random number +generator devices (e.g., /dev/urandom). Typically this is +used in situations when a cryptographically secure random +number is not necessarily needed. One example is the Stack +Smashing Protector (SSP, formerly known as ProPolice) support +that may be compiled into programs. +</p> +<p> +Related interface: +</p> +<ul> +<li>dev_read_rand()</li> +</ul> +<p> +Related tunable: +</p> +<ul> +<li>global_ssp</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="dev_dontaudit_read_urand" lineno="4043"> +<summary> +Do not audit attempts to read from pseudo +random devices (e.g., /dev/urandom) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_write_urand" lineno="4062"> +<summary> +Write to the pseudo random device (e.g., /dev/urandom). This +sets the random number generator seed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_generic_usb_dev" lineno="4080"> +<summary> +Getattr generic the USB devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_generic_usb_dev" lineno="4098"> +<summary> +Setattr generic the USB devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_generic_usb_dev" lineno="4116"> +<summary> +Read generic the USB devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_generic_usb_dev" lineno="4134"> +<summary> +Read and write generic the USB devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_usbmon_dev" lineno="4152"> +<summary> +Read USB monitor devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_usbmon_dev" lineno="4170"> +<summary> +Write USB monitor devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_mount_usbfs" lineno="4188"> +<summary> +Mount a usbfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_associate_usbfs" lineno="4206"> +<summary> +Associate a file to a usbfs filesystem. +</summary> +<param name="file_type"> +<summary> +The type of the file to be associated to usbfs. +</summary> +</param> +</interface> +<interface name="dev_getattr_usbfs_dirs" lineno="4224"> +<summary> +Get the attributes of a directory in the usb filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4243"> +<summary> +Do not audit attempts to get the attributes +of a directory in the usb filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_search_usbfs" lineno="4261"> +<summary> +Search the directory containing USB hardware information. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_list_usbfs" lineno="4279"> +<summary> +Allow caller to get a list of usb hardware. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_usbfs_files" lineno="4300"> +<summary> +Set the attributes of usbfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_usbfs" lineno="4320"> +<summary> +Read USB hardware information using +the usbfs filesystem interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_usbfs" lineno="4340"> +<summary> +Allow caller to modify usb hardware configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_video_dev" lineno="4360"> +<summary> +Get the attributes of video4linux devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_userio_dev" lineno="4378"> +<summary> +Read and write userio device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_getattr_video_dev" lineno="4397"> +<summary> +Do not audit attempts to get the attributes +of video4linux device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_setattr_video_dev" lineno="4415"> +<summary> +Set the attributes of video4linux device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_dontaudit_setattr_video_dev" lineno="4434"> +<summary> +Do not audit attempts to set the attributes +of video4linux device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="dev_read_video_dev" lineno="4452"> +<summary> +Read the video4linux devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_video_dev" lineno="4470"> +<summary> +Write the video4linux devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_vhost" lineno="4488"> +<summary> +Allow read/write the vhost net device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_vmware" lineno="4506"> +<summary> +Read and write VMWare devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rwx_vmware" lineno="4524"> +<summary> +Read, write, and mmap VMWare devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_read_watchdog" lineno="4543"> +<summary> +Read from watchdog devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_write_watchdog" lineno="4561"> +<summary> +Write to watchdog devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_wireless" lineno="4579"> +<summary> +Read and write the the wireless device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_xen" lineno="4597"> +<summary> +Read and write Xen devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_manage_xen" lineno="4615"> +<summary> +Create, read, write, and delete Xen devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_filetrans_xen" lineno="4634"> +<summary> +Automatic type transition to the type +for xen device nodes when created in /dev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_getattr_xserver_misc_dev" lineno="4652"> +<summary> +Get the attributes of X server miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_setattr_xserver_misc_dev" lineno="4670"> +<summary> +Set the attributes of X server miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_xserver_misc" lineno="4688"> +<summary> +Read and write X server miscellaneous devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rw_zero" lineno="4706"> +<summary> +Read and write to the zero device (/dev/zero). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_rwx_zero" lineno="4724"> +<summary> +Read, write, and execute the zero device (/dev/zero). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_execmod_zero" lineno="4743"> +<summary> +Execmod the zero device (/dev/zero). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_create_zero_dev" lineno="4762"> +<summary> +Create the zero device (/dev/zero). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="dev_unconfined" lineno="4780"> +<summary> +Unconfined access to devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="domain" filename="policy/modules/kernel/domain.if"> +<summary>Core policy for domains.</summary> +<required val="true"> +Contains the concept of a domain. +</required> +<interface name="domain_base_type" lineno="26"> +<summary> +Make the specified type usable as a basic domain. +</summary> +<desc> +<p> +Make the specified type usable as a basic domain. +</p> +<p> +This is primarily used for kernel threads; +generally the domain_type() interface is +more appropriate for userland processes. +</p> +</desc> +<param name="type"> +<summary> +Type to be used as a basic domain type. +</summary> +</param> +</interface> +<interface name="domain_type" lineno="75"> +<summary> +Make the specified type usable as a domain. +</summary> +<desc> +<p> +Make the specified type usable as a domain. This, +or an interface that calls this interface, must be +used on all types that are used as domains. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>application_domain()</li> +<li>init_daemon_domain()</li> +<li>init_domaion()</li> +<li>init_ranged_daemon_domain()</li> +<li>init_ranged_domain()</li> +<li>init_ranged_system_domain()</li> +<li>init_script_domain()</li> +<li>init_system_domain()</li> +</ul> +<p> +Example: +</p> +<p> +type mydomain_t; +domain_type(mydomain_t) +type myfile_t; +files_type(myfile_t) +allow mydomain_t myfile_t:file read_file_perms; +</p> +</desc> +<param name="type"> +<summary> +Type to be used as a domain type. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="domain_entry_file" lineno="125"> +<summary> +Make the specified type usable as +an entry point for the domain. +</summary> +<param name="domain"> +<summary> +Domain to be entered. +</summary> +</param> +<param name="type"> +<summary> +Type of program used for entering +the domain. +</summary> +</param> +</interface> +<interface name="domain_interactive_fd" lineno="149"> +<summary> +Make the file descriptors of the specified +domain for interactive use (widely inheritable) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dyntrans_type" lineno="178"> +<summary> +Allow the specified domain to perform +dynamic transitions. +</summary> +<desc> +<p> +Allow the specified domain to perform +dynamic transitions. +</p> +<p> +This violates process tranquility, and it +is strongly suggested that this not be used. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_system_change_exemption" lineno="198"> +<summary> +Makes caller and execption to the constraint +preventing changing to the system user +identity and system role. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_subj_id_change_exemption" lineno="217"> +<summary> +Makes caller an exception to the constraint preventing +changing of user identity. +</summary> +<param name="domain"> +<summary> +The process type to make an exception to the constraint. +</summary> +</param> +</interface> +<interface name="domain_role_change_exemption" lineno="236"> +<summary> +Makes caller an exception to the constraint preventing +changing of role. +</summary> +<param name="domain"> +<summary> +The process type to make an exception to the constraint. +</summary> +</param> +</interface> +<interface name="domain_obj_id_change_exemption" lineno="256"> +<summary> +Makes caller an exception to the constraint preventing +changing the user identity in object contexts. +</summary> +<param name="domain"> +<summary> +The process type to make an exception to the constraint. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_user_exemption_target" lineno="291"> +<summary> +Make the specified domain the target of +the user domain exception of the +SELinux role and identity change +constraints. +</summary> +<desc> +<p> +Make the specified domain the target of +the user domain exception of the +SELinux role and identity change +constraints. +</p> +<p> +This interface is needed to decouple +the user domains from the base module. +It should not be used other than on +user domains. +</p> +</desc> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +</interface> +<interface name="domain_cron_exemption_source" lineno="326"> +<summary> +Make the specified domain the source of +the cron domain exception of the +SELinux role and identity change +constraints. +</summary> +<desc> +<p> +Make the specified domain the source of +the cron domain exception of the +SELinux role and identity change +constraints. +</p> +<p> +This interface is needed to decouple +the cron domains from the base module. +It should not be used other than on +cron domains. +</p> +</desc> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +</interface> +<interface name="domain_cron_exemption_target" lineno="361"> +<summary> +Make the specified domain the target of +the cron domain exception of the +SELinux role and identity change +constraints. +</summary> +<desc> +<p> +Make the specified domain the target of +the cron domain exception of the +SELinux role and identity change +constraints. +</p> +<p> +This interface is needed to decouple +the cron domains from the base module. +It should not be used other than on +user cron jobs. +</p> +</desc> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +</interface> +<interface name="domain_use_interactive_fds" lineno="389"> +<summary> +Inherit and use file descriptors from +domains with interactive programs. +</summary> +<desc> +<p> +Allow the specified domain to inherit and use file +descriptors from domains with interactive programs. +This does not allow access to the objects being referenced +by the file descriptors. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="1"/> +</interface> +<interface name="domain_dontaudit_use_interactive_fds" lineno="409"> +<summary> +Do not audit attempts to inherit file +descriptors from domains with interactive +programs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_sigchld_interactive_fds" lineno="429"> +<summary> +Send a SIGCHLD signal to domains whose file +discriptors are widely inheritable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_setpriority_all_domains" lineno="448"> +<summary> +Set the nice level of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_signal_all_domains" lineno="467"> +<summary> +Send general signals to all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_dontaudit_signal_all_domains" lineno="487"> +<summary> +Do not audit attempts to send general +signals to all domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_signull_all_domains" lineno="506"> +<summary> +Send a null signal to all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_sigstop_all_domains" lineno="525"> +<summary> +Send a stop signal to all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_sigchld_all_domains" lineno="544"> +<summary> +Send a child terminated signal to all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_kill_all_domains" lineno="563"> +<summary> +Send a kill signal to all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_search_all_domains_state" lineno="582"> +<summary> +Search the process state directory (/proc/pid) of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_search_all_domains_state" lineno="602"> +<summary> +Do not audit attempts to search the process +state directory (/proc/pid) of all domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_read_all_domains_state" lineno="621"> +<summary> +Read the process state (/proc/pid) of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_getattr_all_domains" lineno="643"> +<summary> +Get the attributes of all domains of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_dontaudit_getattr_all_domains" lineno="662"> +<summary> +Do not audit attempts to get the attributes +of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_read_confined_domains_state" lineno="681"> +<summary> +Read the process state (/proc/pid) of all confined domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_getattr_confined_domains" lineno="707"> +<summary> +Get the attributes of all confined domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_ptrace_all_domains" lineno="726"> +<summary> +Ptrace all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_dontaudit_ptrace_all_domains" lineno="755"> +<summary> +Do not audit attempts to ptrace all domains. +</summary> +<desc> +<p> +Do not audit attempts to ptrace all domains. +</p> +<p> +Generally this needs to be suppressed because procps tries to access +/proc/pid/environ and this now triggers a ptrace check in recent kernels +(2.4 and 2.6). +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_ptrace_confined_domains" lineno="783"> +<summary> +Do not audit attempts to ptrace confined domains. +</summary> +<desc> +<p> +Do not audit attempts to ptrace confined domains. +</p> +<p> +Generally this needs to be suppressed because procps tries to access +/proc/pid/environ and this now triggers a ptrace check in recent kernels +(2.4 and 2.6). +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_read_all_domains_state" lineno="802"> +<summary> +Do not audit attempts to read the process +state (/proc/pid) of all domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_list_all_domains_state" lineno="827"> +<summary> +Do not audit attempts to read the process state +directories of all domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_getsession_all_domains" lineno="845"> +<summary> +Get the session ID of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getsession_all_domains" lineno="864"> +<summary> +Do not audit attempts to get the +session ID of all domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_getpgid_all_domains" lineno="882"> +<summary> +Get the process group ID of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_getsched_all_domains" lineno="900"> +<summary> +Get the scheduler information of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_getcap_all_domains" lineno="918"> +<summary> +Get the capability information of all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_getattr_all_sockets" lineno="947"> +<summary> +Get the attributes of all domains +sockets, for all socket types. +</summary> +<desc> +<p> +Get the attributes of all domains +sockets, for all socket types. +</p> +<p> +This is commonly used for domains +that can use lsof on all domains. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_sockets" lineno="976"> +<summary> +Do not audit attempts to get the attributes +of all domains sockets, for all socket types. +</summary> +<desc> +<p> +Do not audit attempts to get the attributes +of all domains sockets, for all socket types. +</p> +<p> +This interface was added for PCMCIA cardmgr +and is probably excessive. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_tcp_sockets" lineno="995"> +<summary> +Do not audit attempts to get the attributes +of all domains TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_udp_sockets" lineno="1014"> +<summary> +Do not audit attempts to get the attributes +of all domains UDP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_rw_all_udp_sockets" lineno="1033"> +<summary> +Do not audit attempts to read or write +all domains UDP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1052"> +<summary> +Do not audit attempts to get attribues of +all domains IPSEC key management sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1071"> +<summary> +Do not audit attempts to get attribues of +all domains packet sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1090"> +<summary> +Do not audit attempts to get attribues of +all domains raw sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_rw_all_key_sockets" lineno="1109"> +<summary> +Do not audit attempts to read or write +all domains key sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_dgram_sockets" lineno="1128"> +<summary> +Do not audit attempts to get the attributes +of all domains unix datagram sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_getattr_all_stream_sockets" lineno="1147"> +<summary> +Get the attributes +of all domains unix datagram sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_stream_sockets" lineno="1166"> +<summary> +Do not audit attempts to get the attributes +of all domains unix datagram sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_getattr_all_pipes" lineno="1195"> +<summary> +Get the attributes of all domains +unnamed pipes. +</summary> +<desc> +<p> +Get the attributes of all domains +unnamed pipes. +</p> +<p> +This is commonly used for domains +that can use lsof on all domains. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_pipes" lineno="1214"> +<summary> +Do not audit attempts to get the attributes +of all domains unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_ipsec_setcontext_all_domains" lineno="1233"> +<summary> +Allow specified type to set context of all +domains IPSEC associations. +</summary> +<param name="type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_getattr_all_entry_files" lineno="1252"> +<summary> +Get the attributes of entry point +files for all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_dontaudit_getattr_all_entry_files" lineno="1272"> +<summary> +Do not audit attempts to get the attributes +of all entry point files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_read_all_entry_files" lineno="1290"> +<summary> +Read the entry point files for all domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_exec_all_entry_files" lineno="1311"> +<summary> +Execute the entry point files for all +domains in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="domain_dontaudit_exec_all_entry_files" lineno="1329"> +<summary> +dontaudit checking for execute on all entry point files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="domain_manage_all_entry_files" lineno="1349"> +<summary> +Create, read, write, and delete all +entrypoint files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_relabel_all_entry_files" lineno="1369"> +<summary> +Relabel to and from all entry point +file types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_mmap_all_entry_files" lineno="1388"> +<summary> +Mmap all entry point files as executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_entry_file_spec_domtrans" lineno="1412"> +<summary> +Execute an entry_type in the specified domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="domain_mmap_low" lineno="1434"> +<summary> +Ability to mmap a low area of the address +space conditionally, as configured by +/proc/sys/kernel/mmap_min_addr. +Preventing such mappings helps protect against +exploiting null deref bugs in the kernel. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_mmap_low_uncond" lineno="1461"> +<summary> +Ability to mmap a low area of the address +space unconditionally, as configured +by /proc/sys/kernel/mmap_min_addr. +Preventing such mappings helps protect against +exploiting null deref bugs in the kernel. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_all_recvfrom_all_domains" lineno="1483"> +<summary> +Allow specified type to receive labeled +networking packets from all domains, over +all protocols (TCP, UDP, etc) +</summary> +<param name="type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_unconfined_signal" lineno="1501"> +<summary> +Send generic signals to the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="domain_unconfined" lineno="1519"> +<summary> +Unconfined access to domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="mmap_low_allowed" dftval="false"> +<desc> +<p> +Control the ability to mmap a low area of the address space, +as configured by /proc/sys/kernel/mmap_min_addr. +</p> +</desc> +</tunable> +</module> +<module name="files" filename="policy/modules/kernel/files.if"> +<summary> +Basic filesystem types and interfaces. +</summary> +<desc> +<p> +This module contains basic filesystem types and interfaces. This +includes: +<ul> +<li>The concept of different file types including basic +files, mount points, tmp files, etc.</li> +<li>Access to groups of files and all files.</li> +<li>Types and interfaces for the basic filesystem layout +(/, /etc, /tmp, /usr, etc.).</li> +</ul> +</p> +</desc> +<required val="true"> +Contains the concept of a file. +Comains the file initial SID. +</required> +<interface name="files_type" lineno="79"> +<summary> +Make the specified type usable for files +in a filesystem. +</summary> +<desc> +<p> +Make the specified type usable for files +in a filesystem. Types used for files that +do not use this interface, or an interface that +calls this one, will have unexpected behaviors +while the system is running. If the type is used +for device nodes (character or block files), then +the dev_node() interface is more appropriate. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>application_domain()</li> +<li>application_executable_file()</li> +<li>corecmd_executable_file()</li> +<li>init_daemon_domain()</li> +<li>init_domaion()</li> +<li>init_ranged_daemon_domain()</li> +<li>init_ranged_domain()</li> +<li>init_ranged_system_domain()</li> +<li>init_script_file()</li> +<li>init_script_domain()</li> +<li>init_system_domain()</li> +<li>files_config_files()</li> +<li>files_lock_file()</li> +<li>files_mountpoint()</li> +<li>files_pid_file()</li> +<li>files_security_file()</li> +<li>files_security_mountpoint()</li> +<li>files_tmp_file()</li> +<li>files_tmpfs_file()</li> +<li>logging_log_file()</li> +<li>userdom_user_home_content()</li> +</ul> +<p> +Example: +</p> +<p> +type myfile_t; +files_type(myfile_t) +allow mydomain_t myfile_t:file read_file_perms; +</p> +</desc> +<param name="type"> +<summary> +Type to be used for files. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="files_security_file" lineno="100"> +<summary> +Make the specified type a file that +should not be dontaudited from +browsing from user domains. +</summary> +<param name="file_type"> +<summary> +Type of the file to be used as a +member directory. +</summary> +</param> +</interface> +<interface name="files_lock_file" lineno="119"> +<summary> +Make the specified type usable for +lock files. +</summary> +<param name="type"> +<summary> +Type to be used for lock files. +</summary> +</param> +</interface> +<interface name="files_mountpoint" lineno="139"> +<summary> +Make the specified type usable for +filesystem mount points. +</summary> +<param name="type"> +<summary> +Type to be used for mount points. +</summary> +</param> +</interface> +<interface name="files_security_mountpoint" lineno="159"> +<summary> +Make the specified type usable for +security file filesystem mount points. +</summary> +<param name="type"> +<summary> +Type to be used for mount points. +</summary> +</param> +</interface> +<interface name="files_pid_file" lineno="207"> +<summary> +Make the specified type usable for +runtime process ID files. +</summary> +<desc> +<p> +Make the specified type usable for runtime process ID files, +typically found in /var/run. +This will also make the type usable for files, making +calls to files_type() redundant. Failure to use this interface +for a PID file type may result in problems with starting +or stopping services. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>files_pid_filetrans()</li> +</ul> +<p> +Example usage with a domain that can create and +write its PID file with a private PID file type in the +/var/run directory: +</p> +<p> +type mypidfile_t; +files_pid_file(mypidfile_t) +allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; +files_pid_filetrans(mydomain_t, mypidfile_t, file) +</p> +</desc> +<param name="type"> +<summary> +Type to be used for PID files. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="files_config_file" lineno="247"> +<summary> +Make the specified type a +configuration file. +</summary> +<desc> +<p> +Make the specified type usable for configuration files. +This will also make the type usable for files, making +calls to files_type() redundant. Failure to use this interface +for a temporary file may result in problems with +configuration management tools. +</p> +<p> +Example usage with a domain that can read +its configuration file /etc: +</p> +<p> +type myconffile_t; +files_config_file(myconffile_t) +allow mydomain_t myconffile_t:file read_file_perms; +files_search_etc(mydomain_t) +</p> +</desc> +<param name="file_type"> +<summary> +Type to be used as a configuration file. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="files_poly" lineno="267"> +<summary> +Make the specified type a +polyinstantiated directory. +</summary> +<param name="file_type"> +<summary> +Type of the file to be used as a +polyinstantiated directory. +</summary> +</param> +</interface> +<interface name="files_poly_parent" lineno="288"> +<summary> +Make the specified type a parent +of a polyinstantiated directory. +</summary> +<param name="file_type"> +<summary> +Type of the file to be used as a +parent directory. +</summary> +</param> +</interface> +<interface name="files_poly_member" lineno="309"> +<summary> +Make the specified type a +polyinstantiation member directory. +</summary> +<param name="file_type"> +<summary> +Type of the file to be used as a +member directory. +</summary> +</param> +</interface> +<interface name="files_poly_member_tmp" lineno="336"> +<summary> +Make the domain use the specified +type of polyinstantiated directory. +</summary> +<param name="domain"> +<summary> +Domain using the polyinstantiated +directory. +</summary> +</param> +<param name="file_type"> +<summary> +Type of the file to be used as a +member directory. +</summary> +</param> +</interface> +<interface name="files_tmp_file" lineno="383"> +<summary> +Make the specified type a file +used for temporary files. +</summary> +<desc> +<p> +Make the specified type usable for temporary files. +This will also make the type usable for files, making +calls to files_type() redundant. Failure to use this interface +for a temporary file may result in problems with +purging temporary files. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>files_tmp_filetrans()</li> +</ul> +<p> +Example usage with a domain that can create and +write its temporary file in the system temporary file +directories (/tmp or /var/tmp): +</p> +<p> +type mytmpfile_t; +files_tmp_file(mytmpfile_t) +allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; +files_tmp_filetrans(mydomain_t, mytmpfile_t, file) +</p> +</desc> +<param name="file_type"> +<summary> +Type of the file to be used as a +temporary file. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="files_tmpfs_file" lineno="405"> +<summary> +Transform the type into a file, for use on a +virtual memory filesystem (tmpfs). +</summary> +<param name="type"> +<summary> +The type to be transformed. +</summary> +</param> +</interface> +<interface name="files_getattr_all_dirs" lineno="424"> +<summary> +Get the attributes of all directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_dirs" lineno="443"> +<summary> +Do not audit attempts to get the attributes +of all directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_non_security" lineno="461"> +<summary> +List all non-security directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_non_security" lineno="480"> +<summary> +Do not audit attempts to list all +non-security directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_mounton_non_security" lineno="499"> +<summary> +Mount a filesystem on all non-security +directories and files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_write_non_security_dirs" lineno="518"> +<summary> +Allow attempts to modify any directory +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_non_security_dirs" lineno="536"> +<summary> +Allow attempts to manage non-security directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_all_files" lineno="554"> +<summary> +Get the attributes of all files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_files" lineno="574"> +<summary> +Do not audit attempts to get the attributes +of all files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_files" lineno="593"> +<summary> +Do not audit attempts to get the attributes +of non security files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_read_all_files" lineno="611"> +<summary> +Read all files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_execmod_all_files" lineno="642"> +<summary> +Allow shared library text relocations in all files. +</summary> +<desc> +<p> +Allow shared library text relocations in all files. +</p> +<p> +This is added to support WINE policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_non_security_files" lineno="661"> +<summary> +Read all non-security files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_all_dirs_except" lineno="687"> +<summary> +Read all directories on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="files_read_all_files_except" lineno="712"> +<summary> +Read all files on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="files_read_all_symlinks_except" lineno="737"> +<summary> +Read all symbolic links on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="files_getattr_all_symlinks" lineno="755"> +<summary> +Get the attributes of all symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_symlinks" lineno="774"> +<summary> +Do not audit attempts to get the attributes +of all symbolic links. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_read_all_symlinks" lineno="792"> +<summary> +Do not audit attempts to read all symbolic links. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="811"> +<summary> +Do not audit attempts to get the attributes +of non security symbolic links. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="830"> +<summary> +Do not audit attempts to get the attributes +of non security block devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="849"> +<summary> +Do not audit attempts to get the attributes +of non security character devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_read_all_symlinks" lineno="868"> +<summary> +Read all symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_getattr_all_pipes" lineno="887"> +<summary> +Get the attributes of all named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_pipes" lineno="907"> +<summary> +Do not audit attempts to get the attributes +of all named pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_pipes" lineno="926"> +<summary> +Do not audit attempts to get the attributes +of non security named pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_getattr_all_sockets" lineno="944"> +<summary> +Get the attributes of all named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_sockets" lineno="964"> +<summary> +Do not audit attempts to get the attributes +of all named sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_non_security_sockets" lineno="983"> +<summary> +Do not audit attempts to get the attributes +of non security named sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_read_all_blk_files" lineno="1001"> +<summary> +Read all block nodes with file types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_all_chr_files" lineno="1019"> +<summary> +Read all character nodes with file types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_all_files" lineno="1045"> +<summary> +Relabel all files on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_rw_all_files" lineno="1083"> +<summary> +rw all files on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_manage_all_files" lineno="1109"> +<summary> +Manage all files on the filesystem, except +the listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_search_all" lineno="1136"> +<summary> +Search the contents of all directories on +extended attribute filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_all" lineno="1155"> +<summary> +List the contents of all directories on +extended attribute filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_all_dirs" lineno="1175"> +<summary> +Do not audit attempts to search the +contents of any directories on extended +attribute filesystems. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_getattr_all_file_type_fs" lineno="1198"> +<summary> +Get the attributes of all filesystems +with the type of a file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabelto_all_file_type_fs" lineno="1216"> +<summary> +Relabel a filesystem to the type of a file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_all_file_type_fs" lineno="1234"> +<summary> +Relabel a filesystem to the type of a file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_mount_all_file_type_fs" lineno="1252"> +<summary> +Mount all filesystems with the type of a file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_unmount_all_file_type_fs" lineno="1270"> +<summary> +Unmount all filesystems with the type of a file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_config_dirs" lineno="1289"> +<summary> +Manage all configuration directories on filesystem +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="files_relabel_config_dirs" lineno="1308"> +<summary> +Relabel configuration directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="files_read_config_files" lineno="1326"> +<summary> +Read config files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_config_files" lineno="1347"> +<summary> +Manage all configuration files on filesystem +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="files_relabel_config_files" lineno="1366"> +<summary> +Relabel configuration files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="files_mounton_all_mountpoints" lineno="1384"> +<summary> +Mount a filesystem on all mount points. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_all_mountpoints" lineno="1403"> +<summary> +Get the attributes of all mount points. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_setattr_all_mountpoints" lineno="1421"> +<summary> +Set the attributes of all mount points. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_all_mountpoints" lineno="1439"> +<summary> +Search all mount points. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_all_mountpoints" lineno="1457"> +<summary> +Do not audit searching of all mount points. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_all_mountpoints" lineno="1475"> +<summary> +Do not audit listing of all mount points. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_root" lineno="1493"> +<summary> +List the contents of the root directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_root_dirs" lineno="1512"> +<summary> +Do not audit attempts to write to / dirs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_rw_root_dir" lineno="1531"> +<summary> +Do not audit attempts to write +files in the root directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_root_filetrans" lineno="1560"> +<summary> +Create an object in the root directory, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_dontaudit_read_root_files" lineno="1579"> +<summary> +Do not audit attempts to read files in +the root directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_rw_root_files" lineno="1598"> +<summary> +Do not audit attempts to read or write +files in the root directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_rw_root_chr_files" lineno="1617"> +<summary> +Do not audit attempts to read or write +character device nodes in the root directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_delete_root_files" lineno="1635"> +<summary> +Delete files in the root directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_root_dir_entry" lineno="1653"> +<summary> +Remove entries from the root directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_unmount_rootfs" lineno="1671"> +<summary> +Unmount a rootfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_boot_dirs" lineno="1689"> +<summary> +Get attributes of the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_boot_dirs" lineno="1708"> +<summary> +Do not audit attempts to get attributes +of the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_search_boot" lineno="1726"> +<summary> +Search the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_boot" lineno="1744"> +<summary> +Do not audit attempts to search the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_boot" lineno="1762"> +<summary> +List the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_boot" lineno="1780"> +<summary> +Do not audit attempts to list the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_create_boot_dirs" lineno="1798"> +<summary> +Create directories in /boot +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_boot_dirs" lineno="1817"> +<summary> +Create, read, write, and delete +directories in /boot. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_boot_filetrans" lineno="1846"> +<summary> +Create a private type object in boot +with an automatic type transition +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object_class"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_read_boot_files" lineno="1865"> +<summary> +read files in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_manage_boot_files" lineno="1885"> +<summary> +Create, read, write, and delete files +in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_relabelfrom_boot_files" lineno="1903"> +<summary> +Relabel from files in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_boot_symlinks" lineno="1921"> +<summary> +Read symbolic links in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_boot_symlinks" lineno="1940"> +<summary> +Read and write symbolic links +in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_boot_symlinks" lineno="1960"> +<summary> +Create, read, write, and delete symbolic links +in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_kernel_img" lineno="1978"> +<summary> +Read kernel files in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_create_kernel_img" lineno="1999"> +<summary> +Install a kernel into the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_delete_kernel" lineno="2019"> +<summary> +Delete a kernel from /boot. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_getattr_default_dirs" lineno="2037"> +<summary> +Getattr of directories with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_default_dirs" lineno="2056"> +<summary> +Do not audit attempts to get the attributes of +directories with the default file type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_search_default" lineno="2074"> +<summary> +Search the contents of directories with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_default" lineno="2092"> +<summary> +List contents of directories with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_default" lineno="2111"> +<summary> +Do not audit attempts to list contents of +directories with the default file type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_manage_default_dirs" lineno="2130"> +<summary> +Create, read, write, and delete directories with +the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_mounton_default" lineno="2148"> +<summary> +Mount a filesystem on a directory with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_default_files" lineno="2167"> +<summary> +Do not audit attempts to get the attributes of +files with the default file type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_read_default_files" lineno="2185"> +<summary> +Read files with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_read_default_files" lineno="2204"> +<summary> +Do not audit attempts to read files +with the default file type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_manage_default_files" lineno="2223"> +<summary> +Create, read, write, and delete files with +the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_default_symlinks" lineno="2241"> +<summary> +Read symbolic links with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_default_sockets" lineno="2259"> +<summary> +Read sockets with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_default_pipes" lineno="2277"> +<summary> +Read named pipes with the default file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_etc" lineno="2295"> +<summary> +Search the contents of /etc directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_setattr_etc_dirs" lineno="2313"> +<summary> +Set the attributes of the /etc directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_etc" lineno="2331"> +<summary> +List the contents of /etc directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_etc_dirs" lineno="2349"> +<summary> +Do not audit attempts to write to /etc dirs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_rw_etc_dirs" lineno="2367"> +<summary> +Add and remove entries from /etc directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_etc_dirs" lineno="2386"> +<summary> +Manage generic directories in /etc +</summary> +<param name="domain"> +<summary> +Domain allowed access +</summary> +</param> + +</interface> +<interface name="files_read_etc_files" lineno="2438"> +<summary> +Read generic files in /etc. +</summary> +<desc> +<p> +Allow the specified domain to read generic +files in /etc. These files are typically +general system configuration files that do +not have more specific SELinux types. Some +examples of these files are: +</p> +<ul> +<li>/etc/fstab</li> +<li>/etc/passwd</li> +<li>/etc/services</li> +<li>/etc/shells</li> +</ul> +<p> +This interface does not include access to /etc/shadow. +</p> +<p> +Generally, it is safe for many domains to have +this access. However, since this interface provides +access to the /etc/passwd file, caution must be +exercised, as user account names can be leaked +through this access. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>auth_read_shadow()</li> +<li>files_read_etc_runtime_files()</li> +<li>seutil_read_config()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="files_dontaudit_write_etc_files" lineno="2458"> +<summary> +Do not audit attempts to write generic files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_etc_files" lineno="2477"> +<summary> +Read and write generic files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_manage_etc_files" lineno="2499"> +<summary> +Create, read, write, and delete generic +files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_delete_etc_files" lineno="2518"> +<summary> +Delete system configuration files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_exec_etc_files" lineno="2536"> +<summary> +Execute generic files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_etc_files" lineno="2556"> +<summary> +Relabel from and to generic files in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_etc_symlinks" lineno="2575"> +<summary> +Read symbolic links in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_etc_symlinks" lineno="2593"> +<summary> +Create, read, write, and delete symbolic links in /etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_etc_filetrans" lineno="2622"> +<summary> +Create objects in /etc with a private +type using a type_transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +Private file type. +</summary> +</param> +<param name="class"> +<summary> +Object classes to be created. +</summary> +</param> +</interface> +<interface name="files_create_boot_flag" lineno="2647"> +<summary> +Create a boot flag. +</summary> +<desc> +<p> +Create a boot flag, such as +/.autorelabel and /.autofsck. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_delete_boot_flag" lineno="2673"> +<summary> +Delete a boot flag. +</summary> +<desc> +<p> +Delete a boot flag, such as +/.autorelabel and /.autofsck. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="2691"> +<summary> +Do not audit attempts to set the attributes of the etc_runtime files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_etc_runtime_files" lineno="2729"> +<summary> +Read files in /etc that are dynamically +created on boot, such as mtab. +</summary> +<desc> +<p> +Allow the specified domain to read dynamically created +configuration files in /etc. These files are typically +general system configuration files that do +not have more specific SELinux types. Some +examples of these files are: +</p> +<ul> +<li>/etc/motd</li> +<li>/etc/mtab</li> +<li>/etc/nologin</li> +</ul> +<p> +This interface does not include access to /etc/shadow. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10" /> +<rolecap/> +</interface> +<interface name="files_dontaudit_read_etc_runtime_files" lineno="2751"> +<summary> +Do not audit attempts to read files +in /etc that are dynamically +created on boot, such as mtab. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_rw_etc_runtime_files" lineno="2771"> +<summary> +Read and write files in /etc that are dynamically +created on boot, such as mtab. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_manage_etc_runtime_files" lineno="2793"> +<summary> +Create, read, write, and delete files in +/etc that are dynamically created on boot, +such as mtab. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_etc_filetrans_etc_runtime" lineno="2817"> +<summary> +Create, etc runtime objects with an automatic +type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The class of the object being created. +</summary> +</param> +</interface> +<interface name="files_getattr_isid_type_dirs" lineno="2836"> +<summary> +Getattr of directories on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_isid_type_dirs" lineno="2855"> +<summary> +Do not audit attempts to search directories on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_isid_type_dirs" lineno="2874"> +<summary> +List the contents of directories on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_isid_type_dirs" lineno="2893"> +<summary> +Read and write directories on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_dirs" lineno="2912"> +<summary> +Delete directories on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_isid_type_dirs" lineno="2931"> +<summary> +Create, read, write, and delete directories +on new filesystems that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_mounton_isid_type_dirs" lineno="2950"> +<summary> +Mount a filesystem on a directory on new filesystems +that has not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_isid_type_files" lineno="2969"> +<summary> +Read files on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_files" lineno="2988"> +<summary> +Delete files on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_symlinks" lineno="3007"> +<summary> +Delete symbolic links on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_fifo_files" lineno="3026"> +<summary> +Delete named pipes on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_sock_files" lineno="3045"> +<summary> +Delete named sockets on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_blk_files" lineno="3064"> +<summary> +Delete block files on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_isid_chr_files" lineno="3083"> +<summary> +Do not audit attempts to write to character +files that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_delete_isid_type_chr_files" lineno="3102"> +<summary> +Delete chr files on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_isid_type_files" lineno="3121"> +<summary> +Create, read, write, and delete files +on new filesystems that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_isid_type_symlinks" lineno="3140"> +<summary> +Create, read, write, and delete symbolic links +on new filesystems that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_isid_type_blk_files" lineno="3159"> +<summary> +Read and write block device nodes on new filesystems +that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_isid_type_blk_files" lineno="3178"> +<summary> +Create, read, write, and delete block device nodes +on new filesystems that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_isid_type_chr_files" lineno="3197"> +<summary> +Create, read, write, and delete character device nodes +on new filesystems that have not yet been labeled. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_home_dir" lineno="3216"> +<summary> +Get the attributes of the home directories root +(/home). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_home_dir" lineno="3237"> +<summary> +Do not audit attempts to get the +attributes of the home directories root +(/home). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_search_home" lineno="3256"> +<summary> +Search home directories root (/home). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_home" lineno="3276"> +<summary> +Do not audit attempts to search +home directories root (/home). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_home" lineno="3296"> +<summary> +Do not audit attempts to list +home directories root (/home). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_home" lineno="3315"> +<summary> +Get listing of home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabelto_home" lineno="3334"> +<summary> +Relabel to user home root (/home). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_home_filetrans" lineno="3362"> +<summary> +Create objects in /home. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="home_type"> +<summary> +The private type. +</summary> +</param> +<param name="object"> +<summary> +The class of the object being created. +</summary> +</param> +</interface> +<interface name="files_getattr_lost_found_dirs" lineno="3380"> +<summary> +Get the attributes of lost+found directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3399"> +<summary> +Do not audit attempts to get the attributes of +lost+found directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_lost_found" lineno="3417"> +<summary> +List the contents of lost+found directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_lost_found" lineno="3437"> +<summary> +Create, read, write, and delete objects in +lost+found directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_search_mnt" lineno="3459"> +<summary> +Search the contents of /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_mnt" lineno="3477"> +<summary> +Do not audit attempts to search /mnt. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_mnt" lineno="3495"> +<summary> +List the contents of /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_mnt" lineno="3513"> +<summary> +Do not audit attempts to list the contents of /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_mounton_mnt" lineno="3531"> +<summary> +Mount a filesystem on /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_mnt_dirs" lineno="3550"> +<summary> +Create, read, write, and delete directories in /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_manage_mnt_files" lineno="3568"> +<summary> +Create, read, write, and delete files in /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_mnt_files" lineno="3586"> +<summary> +read files in /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_mnt_symlinks" lineno="3604"> +<summary> +Read symbolic links in /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_mnt_symlinks" lineno="3622"> +<summary> +Create, read, write, and delete symbolic links in /mnt. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_kernel_modules" lineno="3640"> +<summary> +Search the contents of the kernel module directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_kernel_modules" lineno="3659"> +<summary> +List the contents of the kernel module directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_kernel_modules" lineno="3677"> +<summary> +Get the attributes of kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_kernel_modules" lineno="3695"> +<summary> +Read kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_write_kernel_modules" lineno="3715"> +<summary> +Write kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_kernel_modules" lineno="3734"> +<summary> +Delete kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_kernel_modules" lineno="3754"> +<summary> +Create, read, write, and delete +kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_relabel_kernel_modules" lineno="3772"> +<summary> +Relabel from and to kernel module files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_kernel_modules_filetrans" lineno="3802"> +<summary> +Create objects in the kernel module directories +with a private type via an automatic type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object_class"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_list_world_readable" lineno="3821"> +<summary> +List world-readable directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_world_readable_files" lineno="3840"> +<summary> +Read world-readable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_world_readable_symlinks" lineno="3859"> +<summary> +Read world-readable symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_world_readable_pipes" lineno="3877"> +<summary> +Read world-readable named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_world_readable_sockets" lineno="3895"> +<summary> +Read world-readable sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_associate_tmp" lineno="3915"> +<summary> +Allow the specified type to associate +to a filesystem with the type of the +temporary directory (/tmp). +</summary> +<param name="file_type"> +<summary> +Type of the file to associate. +</summary> +</param> +</interface> +<interface name="files_getattr_tmp_dirs" lineno="3933"> +<summary> +Get the attributes of the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_tmp_dirs" lineno="3952"> +<summary> +Do not audit attempts to get the +attributes of the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_tmp" lineno="3970"> +<summary> +Search the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_tmp" lineno="3988"> +<summary> +Do not audit attempts to search the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_tmp" lineno="4006"> +<summary> +Read the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_list_tmp" lineno="4024"> +<summary> +Do not audit listing of the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="files_delete_tmp_dir_entry" lineno="4042"> +<summary> +Remove entries from the tmp directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_generic_tmp_files" lineno="4060"> +<summary> +Read files in the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_generic_tmp_dirs" lineno="4078"> +<summary> +Manage temporary directories in /tmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_generic_tmp_files" lineno="4096"> +<summary> +Manage temporary files and directories in /tmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_generic_tmp_symlinks" lineno="4114"> +<summary> +Read symbolic links in the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_generic_tmp_sockets" lineno="4132"> +<summary> +Read and write generic named sockets in the tmp directory (/tmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_setattr_all_tmp_dirs" lineno="4150"> +<summary> +Set the attributes of all tmp directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_all_tmp" lineno="4168"> +<summary> +List all tmp directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_all_tmp_dirs" lineno="4188"> +<summary> +Relabel to and from all temporary +directory types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_dontaudit_getattr_all_tmp_files" lineno="4209"> +<summary> +Do not audit attempts to get the attributes +of all tmp files. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="files_getattr_all_tmp_files" lineno="4228"> +<summary> +Allow attempts to get the attributes +of all tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_all_tmp_files" lineno="4248"> +<summary> +Relabel to and from all temporary +file types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4269"> +<summary> +Do not audit attempts to get the attributes +of all tmp sock_file. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="files_read_all_tmp_files" lineno="4287"> +<summary> +Read all tmp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_tmp_filetrans" lineno="4316"> +<summary> +Create an object in the tmp directories, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_purge_tmp" lineno="4334"> +<summary> +Delete the contents of /tmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_setattr_usr_dirs" lineno="4357"> +<summary> +Set the attributes of the /usr directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_usr" lineno="4375"> +<summary> +Search the content of /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_list_usr" lineno="4394"> +<summary> +List the contents of generic +directories in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_usr_dirs" lineno="4412"> +<summary> +Do not audit write of /usr dirs +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_rw_usr_dirs" lineno="4430"> +<summary> +Add and remove entries from /usr directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_rw_usr_dirs" lineno="4449"> +<summary> +Do not audit attempts to add and remove +entries from /usr directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_delete_usr_dirs" lineno="4467"> +<summary> +Delete generic directories in /usr in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_usr_files" lineno="4485"> +<summary> +Delete generic files in /usr in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_getattr_usr_files" lineno="4503"> +<summary> +Get the attributes of files in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_usr_files" lineno="4539"> +<summary> +Read generic files in /usr. +</summary> +<desc> +<p> +Allow the specified domain to read generic +files in /usr. These files are various program +files that do not have more specific SELinux types. +Some examples of these files are: +</p> +<ul> +<li>/usr/include/*</li> +<li>/usr/share/doc/*</li> +<li>/usr/share/info/*</li> +</ul> +<p> +Generally, it is safe for many domains to have +this access. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="files_exec_usr_files" lineno="4559"> +<summary> +Execute generic programs in /usr in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_usr_files" lineno="4579"> +<summary> +dontaudit write of /usr files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_manage_usr_files" lineno="4597"> +<summary> +Create, read, write, and delete files in the /usr directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabelto_usr_files" lineno="4615"> +<summary> +Relabel a file to the type used in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabelfrom_usr_files" lineno="4633"> +<summary> +Relabel a file from the type used in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_usr_symlinks" lineno="4651"> +<summary> +Read symbolic links in /usr. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_usr_filetrans" lineno="4679"> +<summary> +Create objects in the /usr directory +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object to be created +</summary> +</param> +<param name="object_class"> +<summary> +The object class. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_src" lineno="4697"> +<summary> +Do not audit attempts to search /usr/src. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_getattr_usr_src_files" lineno="4715"> +<summary> +Get the attributes of files in /usr/src. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_usr_src_files" lineno="4736"> +<summary> +Read files in /usr/src. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_exec_usr_src_files" lineno="4757"> +<summary> +Execute programs in /usr/src in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_create_kernel_symbol_table" lineno="4777"> +<summary> +Install a system.map into the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_kernel_symbol_table" lineno="4796"> +<summary> +Read system.map in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_kernel_symbol_table" lineno="4815"> +<summary> +Delete a system.map in the /boot directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_var" lineno="4834"> +<summary> +Search the contents of /var. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_var_dirs" lineno="4852"> +<summary> +Do not audit attempts to write to /var. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_write_var_dirs" lineno="4870"> +<summary> +Allow attempts to write to /var.dirs +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_var" lineno="4889"> +<summary> +Do not audit attempts to search +the contents of /var. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_var" lineno="4907"> +<summary> +List the contents of /var. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_var_dirs" lineno="4926"> +<summary> +Create, read, write, and delete directories +in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_var_files" lineno="4944"> +<summary> +Read files in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_append_var_files" lineno="4962"> +<summary> +Append files in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_var_files" lineno="4980"> +<summary> +Read and write files in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_rw_var_files" lineno="4999"> +<summary> +Do not audit attempts to read and write +files in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_manage_var_files" lineno="5017"> +<summary> +Create, read, write, and delete files in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_var_symlinks" lineno="5035"> +<summary> +Read symbolic links in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_var_symlinks" lineno="5054"> +<summary> +Create, read, write, and delete symbolic +links in the /var directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_var_filetrans" lineno="5082"> +<summary> +Create objects in the /var directory +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object to be created +</summary> +</param> +<param name="object_class"> +<summary> +The object class. +</summary> +</param> +</interface> +<interface name="files_getattr_var_lib_dirs" lineno="5100"> +<summary> +Get the attributes of the /var/lib directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_var_lib" lineno="5132"> +<summary> +Search the /var/lib directory. +</summary> +<desc> +<p> +Search the /var/lib directory. This is +necessary to access files or directories under +/var/lib that have a private type. For example, a +domain accessing a private library file in the +/var/lib directory: +</p> +<p> +allow mydomain_t mylibfile_t:file read_file_perms; +files_search_var_lib(mydomain_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="5"/> +</interface> +<interface name="files_dontaudit_search_var_lib" lineno="5152"> +<summary> +Do not audit attempts to search the +contents of /var/lib. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="read" weight="5"/> +</interface> +<interface name="files_list_var_lib" lineno="5170"> +<summary> +List the contents of the /var/lib directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_var_lib_dirs" lineno="5188"> +<summary> +Read-write /var/lib directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_var_lib_filetrans" lineno="5216"> +<summary> +Create objects in the /var/lib directory +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object to be created +</summary> +</param> +<param name="object_class"> +<summary> +The object class. +</summary> +</param> +</interface> +<interface name="files_read_var_lib_files" lineno="5235"> +<summary> +Read generic files in /var/lib. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_var_lib_symlinks" lineno="5254"> +<summary> +Read generic symbolic links in /var/lib +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_urandom_seed" lineno="5276"> +<summary> +Create, read, write, and delete the +pseudorandom number generator seed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_mounttab" lineno="5296"> +<summary> +Allow domain to manage mount tables +necessary for rpcd, nfsd, etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_locks" lineno="5315"> +<summary> +Search the locks directory (/var/lock). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_locks" lineno="5335"> +<summary> +Do not audit attempts to search the +locks directory (/var/lock). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_locks" lineno="5354"> +<summary> +List generic lock directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_rw_lock_dirs" lineno="5374"> +<summary> +Add and remove entries in the /var/lock +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_relabel_all_lock_dirs" lineno="5394"> +<summary> +Relabel to and from all lock directory types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_getattr_generic_locks" lineno="5415"> +<summary> +Get the attributes of generic lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_generic_locks" lineno="5436"> +<summary> +Delete generic lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_generic_locks" lineno="5457"> +<summary> +Create, read, write, and delete generic +lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_all_locks" lineno="5478"> +<summary> +Delete all lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_read_all_locks" lineno="5499"> +<summary> +Read all lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_all_locks" lineno="5522"> +<summary> +manage all lock files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_lock_filetrans" lineno="5556"> +<summary> +Create an object in the locks directory, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_pid_dirs" lineno="5577"> +<summary> +Do not audit attempts to get the attributes +of the /var/run directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_setattr_pid_dirs" lineno="5596"> +<summary> +Set the attributes of the /var/run directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_pids" lineno="5616"> +<summary> +Search the contents of runtime process +ID directories (/var/run). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_pids" lineno="5636"> +<summary> +Do not audit attempts to search +the /var/run directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_pids" lineno="5656"> +<summary> +List the contents of the runtime process +ID directories (/var/run). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_generic_pids" lineno="5675"> +<summary> +Read generic process ID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_write_generic_pid_pipes" lineno="5695"> +<summary> +Write named generic process ID pipes +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_pid_filetrans" lineno="5751"> +<summary> +Create an object in the process ID directory, with a private type. +</summary> +<desc> +<p> +Create an object in the process ID directory (e.g., /var/run) +with a private type. Typically this is used for creating +private PID files in /var/run with the private type instead +of the general PID file type. To accomplish this goal, +either the program must be SELinux-aware, or use this interface. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>files_pid_file()</li> +</ul> +<p> +Example usage with a domain that can create and +write its PID file with a private PID file type in the +/var/run directory: +</p> +<p> +type mypidfile_t; +files_pid_file(mypidfile_t) +allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; +files_pid_filetrans(mydomain_t, mypidfile_t, file) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="files_rw_generic_pids" lineno="5771"> +<summary> +Read and write generic process ID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_getattr_all_pids" lineno="5792"> +<summary> +Do not audit attempts to get the attributes of +daemon runtime data files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_write_all_pids" lineno="5812"> +<summary> +Do not audit attempts to write to daemon runtime data files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_dontaudit_ioctl_all_pids" lineno="5831"> +<summary> +Do not audit attempts to ioctl daemon runtime data files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_read_all_pids" lineno="5852"> +<summary> +Read all process ID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_mounton_all_poly_members" lineno="5874"> +<summary> +Mount filesystems on all polyinstantiation +member directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_delete_all_pids" lineno="5893"> +<summary> +Delete all process IDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="files_delete_all_pid_dirs" lineno="5918"> +<summary> +Delete all process ID directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_search_spool" lineno="5940"> +<summary> +Search the contents of generic spool +directories (/var/spool). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_dontaudit_search_spool" lineno="5959"> +<summary> +Do not audit attempts to search generic +spool directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="files_list_spool" lineno="5978"> +<summary> +List the contents of generic spool +(/var/spool) directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_generic_spool_dirs" lineno="5997"> +<summary> +Create, read, write, and delete generic +spool directories (/var/spool). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_read_generic_spool" lineno="6016"> +<summary> +Read generic spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_manage_generic_spool" lineno="6036"> +<summary> +Create, read, write, and delete generic +spool files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_spool_filetrans" lineno="6067"> +<summary> +Create objects in the spool directory +with a private type with a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file"> +<summary> +Type to which the created node will be transitioned. +</summary> +</param> +<param name="class"> +<summary> +Object class(es) (single or set including {}) for which this +the transition will occur. +</summary> +</param> +</interface> +<interface name="files_polyinstantiate_all" lineno="6087"> +<summary> +Allow access to manage all polyinstantiated +directories on the system. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="files_unconfined" lineno="6141"> +<summary> +Unconfined access to files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="filesystem" filename="policy/modules/kernel/filesystem.if"> +<summary>Policy for filesystems.</summary> +<required val="true"> +Contains the initial SID for the filesystems. +</required> +<interface name="fs_type" lineno="16"> +<summary> +Transform specified type into a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_noxattr_type" lineno="36"> +<summary> +Transform specified type into a filesystem +type which does not have extended attribute +support. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_associate" lineno="59"> +<summary> +Associate the specified file type to persistent +filesystems with extended attributes. This +allows a file of this type to be created on +a filesystem such as ext3, JFS, and XFS. +</summary> +<param name="file_type"> +<summary> +The type of the to be associated. +</summary> +</param> +</interface> +<interface name="fs_associate_noxattr" lineno="81"> +<summary> +Associate the specified file type to +filesystems which lack extended attributes +support. This allows a file of this type +to be created on a filesystem such as +FAT32, and NFS. +</summary> +<param name="file_type"> +<summary> +The type of the to be associated. +</summary> +</param> +</interface> +<interface name="fs_exec_noxattr" lineno="101"> +<summary> +Execute files on a filesystem that does +not support extended attributes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_mount_xattr_fs" lineno="121"> +<summary> +Mount a persistent filesystem which +has extended attributes, such as +ext3, JFS, or XFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_xattr_fs" lineno="142"> +<summary> +Remount a persistent filesystem which +has extended attributes, such as +ext3, JFS, or XFS. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_xattr_fs" lineno="162"> +<summary> +Unmount a persistent filesystem which +has extended attributes, such as +ext3, JFS, or XFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_xattr_fs" lineno="198"> +<summary> +Get the attributes of persistent +filesystems which have extended +attributes, such as ext3, JFS, or XFS. +</summary> +<desc> +<p> +Allow the specified domain to +get the attributes of a persistent +filesystems which have extended +attributes, such as ext3, JFS, or XFS. +Example attributes: +</p> +<ul> +<li>Type of the file system (e.g., ext3)</li> +<li>Size of the file system</li> +<li>Available space on the file system</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="5"/> +<rolecap/> +</interface> +<interface name="fs_dontaudit_getattr_xattr_fs" lineno="219"> +<summary> +Do not audit attempts to +get the attributes of a persistent +filesystem which has extended +attributes, such as ext3, JFS, or XFS. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_relabelfrom_xattr_fs" lineno="239"> +<summary> +Allow changing of the label of a +filesystem with extended attributes +using the context= mount option. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_get_xattr_fs_quotas" lineno="259"> +<summary> +Get the filesystem quotas of a filesystem +with extended attributes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_set_xattr_fs_quotas" lineno="279"> +<summary> +Set the filesystem quotas of a filesystem +with extended attributes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_read_anon_inodefs_files" lineno="297"> +<summary> +Read files on anon_inodefs file systems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_anon_inodefs_files" lineno="317"> +<summary> +Read and write files on anon_inodefs +file systems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="337"> +<summary> +Do not audit attempts to read or write files on +anon_inodefs file systems. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_mount_autofs" lineno="356"> +<summary> +Mount an automount pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_autofs" lineno="375"> +<summary> +Remount an automount pseudo filesystem +This allows some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_autofs" lineno="393"> +<summary> +Unmount an automount pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_autofs" lineno="412"> +<summary> +Get the attributes of an automount +pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_auto_mountpoints" lineno="439"> +<summary> +Search automount filesystem to use automatically +mounted filesystems. +</summary> +<desc> +Allow the specified domain to search mount points +that have filesystems that are mounted by +the automount service. Generally this will +be required for any domain that accesses objects +on these filesystems. +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="5"/> +</interface> +<interface name="fs_list_auto_mountpoints" lineno="459"> +<summary> +Read directories of automatically +mounted filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_list_auto_mountpoints" lineno="478"> +<summary> +Do not audit attempts to list directories of automatically +mounted filesystems. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_autofs_symlinks" lineno="497"> +<summary> +Create, read, write, and delete symbolic links +on an autofs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_binfmt_misc_dirs" lineno="516"> +<summary> +Get the attributes of directories on +binfmt_misc filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_register_binary_executable_type" lineno="552"> +<summary> +Register an interpreter for new binary +file types, using the kernel binfmt_misc +support. +</summary> +<desc> +<p> +Register an interpreter for new binary +file types, using the kernel binfmt_misc +support. +</p> +<p> +A common use for this is to +register a JVM as an interpreter for +Java byte code. Registered binaries +can be directly executed on a command line +without specifying the interpreter. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_mount_cgroup" lineno="570"> +<summary> +Mount cgroup filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_cgroup" lineno="588"> +<summary> +Remount cgroup filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_cgroup" lineno="606"> +<summary> +Unmount cgroup filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_cgroup" lineno="624"> +<summary> +Get attributes of cgroup filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_cgroup_dirs" lineno="642"> +<summary> +Search cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_cgroup_dirs" lineno="662"> +<summary> +list cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_delete_cgroup_dirs" lineno="681"> +<summary> +Delete cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_cgroup_dirs" lineno="700"> +<summary> +Manage cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_cgroup_files" lineno="720"> +<summary> +Read cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_write_cgroup_files" lineno="740"> +<summary> +Write cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_cgroup_files" lineno="759"> +<summary> +Read and write cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_rw_cgroup_files" lineno="781"> +<summary> +Do not audit attempts to open, +get attributes, read and write +cgroup files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_cgroup_files" lineno="799"> +<summary> +Manage cgroup files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mounton_cgroup" lineno="819"> +<summary> +Mount on cgroup directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_cifs_dirs" lineno="838"> +<summary> +Do not audit attempts to read +dirs on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_mount_cifs" lineno="856"> +<summary> +Mount a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_cifs" lineno="875"> +<summary> +Remount a CIFS or SMB network filesystem. +This allows some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_cifs" lineno="893"> +<summary> +Unmount a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_cifs" lineno="913"> +<summary> +Get the attributes of a CIFS or +SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_search_cifs" lineno="931"> +<summary> +Search directories on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_cifs" lineno="950"> +<summary> +List the contents of directories on a +CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_cifs" lineno="969"> +<summary> +Do not audit attempts to list the contents +of directories on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_mounton_cifs" lineno="987"> +<summary> +Mounton a CIFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_cifs_files" lineno="1006"> +<summary> +Read files on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_noxattr_fs" lineno="1027"> +<summary> +Get the attributes of filesystems that +do not have extended attribute support. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_list_noxattr_fs" lineno="1045"> +<summary> +Read all noxattrfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_noxattr_fs" lineno="1064"> +<summary> +Do not audit attempts to list all +noxattrfs directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_noxattr_fs_dirs" lineno="1082"> +<summary> +Create, read, write, and delete all noxattrfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_noxattr_fs_files" lineno="1100"> +<summary> +Read all noxattrfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1119"> +<summary> +Do not audit attempts to read all +noxattrfs files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1137"> +<summary> +Dont audit attempts to write to noxattrfs files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_noxattr_fs_files" lineno="1155"> +<summary> +Create, read, write, and delete all noxattrfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_noxattr_fs_symlinks" lineno="1173"> +<summary> +Read all noxattrfs symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_relabelfrom_noxattr_fs" lineno="1192"> +<summary> +Relabel all objets from filesystems that +do not support extended attributes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_cifs_files" lineno="1218"> +<summary> +Do not audit attempts to read +files on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_append_cifs_files" lineno="1238"> +<summary> +Append files +on a CIFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_append_cifs_files" lineno="1258"> +<summary> +dontaudit Append files +on a CIFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_rw_cifs_files" lineno="1277"> +<summary> +Do not audit attempts to read or +write files on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_read_cifs_symlinks" lineno="1295"> +<summary> +Read symbolic links on a CIFS or SMB filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_cifs_named_pipes" lineno="1315"> +<summary> +Read named pipes +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_cifs_named_sockets" lineno="1334"> +<summary> +Read named pipes +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_exec_cifs_files" lineno="1355"> +<summary> +Execute files on a CIFS or SMB +network filesystem, in the caller +domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_cifs_dirs" lineno="1376"> +<summary> +Create, read, write, and delete directories +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1396"> +<summary> +Do not audit attempts to create, read, +write, and delete directories +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_cifs_files" lineno="1416"> +<summary> +Create, read, write, and delete files +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_cifs_files" lineno="1436"> +<summary> +Do not audit attempts to create, read, +write, and delete files +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_cifs_symlinks" lineno="1455"> +<summary> +Create, read, write, and delete symbolic links +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_cifs_named_pipes" lineno="1474"> +<summary> +Create, read, write, and delete named pipes +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_cifs_named_sockets" lineno="1493"> +<summary> +Create, read, write, and delete named sockets +on a CIFS or SMB network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_cifs_domtrans" lineno="1536"> +<summary> +Execute a file on a CIFS or SMB filesystem +in the specified domain. +</summary> +<desc> +<p> +Execute a file on a CIFS or SMB filesystem +in the specified domain. This allows +the specified domain to execute any file +on these filesystems in the specified +domain. This is not suggested. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +home directories on CIFS/SMB filesystems, +in particular used by the ssh-agent policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="fs_manage_configfs_dirs" lineno="1556"> +<summary> +Create, read, write, and delete dirs +on a configfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_configfs_files" lineno="1575"> +<summary> +Create, read, write, and delete files +on a configfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_dos_fs" lineno="1594"> +<summary> +Mount a DOS filesystem, such as +FAT32 or NTFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_dos_fs" lineno="1614"> +<summary> +Remount a DOS filesystem, such as +FAT32 or NTFS. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_dos_fs" lineno="1633"> +<summary> +Unmount a DOS filesystem, such as +FAT32 or NTFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_dos_fs" lineno="1653"> +<summary> +Get the attributes of a DOS +filesystem, such as FAT32 or NTFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_relabelfrom_dos_fs" lineno="1672"> +<summary> +Allow changing of the label of a +DOS filesystem using the context= mount option. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_dos" lineno="1690"> +<summary> +Search dosfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_dos" lineno="1708"> +<summary> +List dirs DOS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_dos_dirs" lineno="1727"> +<summary> +Create, read, write, and delete dirs +on a DOS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_dos_files" lineno="1745"> +<summary> +Read files on a DOS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_dos_files" lineno="1764"> +<summary> +Create, read, write, and delete files +on a DOS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_eventpollfs" lineno="1792"> +<summary> +Read eventpollfs files. +</summary> +<desc> +<p> +Read eventpollfs files +</p> +<p> +This interface has been deprecated, and will +be removed in the future. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_fusefs" lineno="1806"> +<summary> +Mount a FUSE filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_fusefs" lineno="1824"> +<summary> +Unmount a FUSE filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mounton_fusefs" lineno="1842"> +<summary> +Mounton a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_fusefs" lineno="1862"> +<summary> +Search directories +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_list_fusefs" lineno="1881"> +<summary> +Do not audit attempts to list the contents +of directories on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_fusefs_dirs" lineno="1901"> +<summary> +Create, read, write, and delete directories +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="1921"> +<summary> +Do not audit attempts to create, read, +write, and delete directories +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_read_fusefs_files" lineno="1940"> +<summary> +Read, a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_exec_fusefs_files" lineno="1959"> +<summary> +Execute files on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_fusefs_files" lineno="1979"> +<summary> +Create, read, write, and delete files +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_fusefs_files" lineno="1999"> +<summary> +Do not audit attempts to create, +read, write, and delete files +on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_read_fusefs_symlinks" lineno="2017"> +<summary> +Read symbolic links on a FUSEFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_hugetlbfs" lineno="2037"> +<summary> +Get the attributes of an hugetlbfs +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_hugetlbfs" lineno="2055"> +<summary> +List hugetlbfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_hugetlbfs_dirs" lineno="2073"> +<summary> +Manage hugetlbfs dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_hugetlbfs_files" lineno="2091"> +<summary> +Read and write hugetlbfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_associate_hugetlbfs" lineno="2109"> +<summary> +Allow the type to associate to hugetlbfs filesystems. +</summary> +<param name="type"> +<summary> +The type of the object to be associated. +</summary> +</param> +</interface> +<interface name="fs_search_inotifyfs" lineno="2127"> +<summary> +Search inotifyfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_inotifyfs" lineno="2145"> +<summary> +List inotifyfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_inotifyfs" lineno="2163"> +<summary> +Dontaudit List inotifyfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_hugetlbfs_filetrans" lineno="2192"> +<summary> +Create an object in a hugetlbfs filesystem, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="fs_mount_iso9660_fs" lineno="2212"> +<summary> +Mount an iso9660 filesystem, which +is usually used on CDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_iso9660_fs" lineno="2232"> +<summary> +Remount an iso9660 filesystem, which +is usually used on CDs. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_iso9660_fs" lineno="2251"> +<summary> +Unmount an iso9660 filesystem, which +is usually used on CDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_iso9660_fs" lineno="2271"> +<summary> +Get the attributes of an iso9660 +filesystem, which is usually used on CDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_iso9660_files" lineno="2290"> +<summary> +Read files on an iso9660 filesystem, which +is usually used on CDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_iso9660_files" lineno="2310"> +<summary> +Read files on an iso9660 filesystem, which +is usually used on CDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_nfs" lineno="2330"> +<summary> +Mount a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_nfs" lineno="2349"> +<summary> +Remount a NFS filesystem. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_nfs" lineno="2367"> +<summary> +Unmount a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_nfs" lineno="2386"> +<summary> +Get the attributes of a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_search_nfs" lineno="2404"> +<summary> +Search directories on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_nfs" lineno="2422"> +<summary> +List NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_nfs" lineno="2441"> +<summary> +Do not audit attempts to list the contents +of directories on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_mounton_nfs" lineno="2459"> +<summary> +Mounton a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_nfs_files" lineno="2478"> +<summary> +Read files on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_read_nfs_files" lineno="2498"> +<summary> +Do not audit attempts to read +files on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_write_nfs_files" lineno="2516"> +<summary> +Read files on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_exec_nfs_files" lineno="2536"> +<summary> +Execute files on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_append_nfs_files" lineno="2557"> +<summary> +Append files +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_append_nfs_files" lineno="2577"> +<summary> +dontaudit Append files +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_rw_nfs_files" lineno="2596"> +<summary> +Do not audit attempts to read or +write files on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_read_nfs_symlinks" lineno="2614"> +<summary> +Read symbolic links on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_nfs_symlinks" lineno="2633"> +<summary> +Dontaudit read symbolic links on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_read_nfs_named_sockets" lineno="2651"> +<summary> +Read named sockets on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_nfs_named_pipes" lineno="2670"> +<summary> +Read named pipes on a NFS network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_getattr_rpc_dirs" lineno="2688"> +<summary> +Read directories of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_rpc" lineno="2707"> +<summary> +Search directories of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_removable" lineno="2725"> +<summary> +Search removable storage directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_removable" lineno="2743"> +<summary> +Do not audit attempts to list removable storage directories. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="fs_read_removable_files" lineno="2761"> +<summary> +Read removable storage files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_removable_files" lineno="2779"> +<summary> +Do not audit attempts to read removable storage files. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_write_removable_files" lineno="2797"> +<summary> +Do not audit attempts to write removable storage files. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="fs_read_removable_symlinks" lineno="2815"> +<summary> +Read removable storage symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_removable_blk_files" lineno="2833"> +<summary> +Read block nodes on removable filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_removable_blk_files" lineno="2852"> +<summary> +Read and write block nodes on removable filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_rpc" lineno="2871"> +<summary> +Read directories of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_rpc_files" lineno="2889"> +<summary> +Read files of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_rpc_symlinks" lineno="2907"> +<summary> +Read symbolic links of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_rpc_sockets" lineno="2925"> +<summary> +Read sockets of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_rpc_sockets" lineno="2943"> +<summary> +Read and write sockets of RPC file system pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_nfs_dirs" lineno="2963"> +<summary> +Create, read, write, and delete directories +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_nfs_dirs" lineno="2983"> +<summary> +Do not audit attempts to create, read, +write, and delete directories +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_nfs_files" lineno="3003"> +<summary> +Create, read, write, and delete files +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_nfs_files" lineno="3023"> +<summary> +Do not audit attempts to create, +read, write, and delete files +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_nfs_symlinks" lineno="3043"> +<summary> +Create, read, write, and delete symbolic links +on a NFS network filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_manage_nfs_named_pipes" lineno="3062"> +<summary> +Create, read, write, and delete named pipes +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_nfs_named_sockets" lineno="3081"> +<summary> +Create, read, write, and delete named sockets +on a NFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_nfs_domtrans" lineno="3124"> +<summary> +Execute a file on a NFS filesystem +in the specified domain. +</summary> +<desc> +<p> +Execute a file on a NFS filesystem +in the specified domain. This allows +the specified domain to execute any file +on a NFS filesystem in the specified +domain. This is not suggested. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +<p> +This interface was added to handle +home directories on NFS filesystems, +in particular used by the ssh-agent policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the new process. +</summary> +</param> +</interface> +<interface name="fs_mount_nfsd_fs" lineno="3143"> +<summary> +Mount a NFS server pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_nfsd_fs" lineno="3162"> +<summary> +Mount a NFS server pseudo filesystem. +This allows some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_nfsd_fs" lineno="3180"> +<summary> +Unmount a NFS server pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_nfsd_fs" lineno="3199"> +<summary> +Get the attributes of a NFS server +pseudo filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_nfsd_fs" lineno="3217"> +<summary> +Search NFS server directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_nfsd_fs" lineno="3235"> +<summary> +List NFS server directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_nfsd_files" lineno="3253"> +<summary> +Getattr files on an nfsd filesystem +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_nfsd_fs" lineno="3271"> +<summary> +Read and write NFS server files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_associate_ramfs" lineno="3289"> +<summary> +Allow the type to associate to ramfs filesystems. +</summary> +<param name="type"> +<summary> +The type of the object to be associated. +</summary> +</param> +</interface> +<interface name="fs_mount_ramfs" lineno="3307"> +<summary> +Mount a RAM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_ramfs" lineno="3326"> +<summary> +Remount a RAM filesystem. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_ramfs" lineno="3344"> +<summary> +Unmount a RAM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_ramfs" lineno="3362"> +<summary> +Get the attributes of a RAM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_ramfs" lineno="3380"> +<summary> +Search directories on a ramfs +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_search_ramfs" lineno="3398"> +<summary> +Dontaudit Search directories on a ramfs +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_ramfs_dirs" lineno="3417"> +<summary> +Create, read, write, and delete +directories on a ramfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_ramfs_files" lineno="3435"> +<summary> +Dontaudit read on a ramfs files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_read_ramfs_pipes" lineno="3453"> +<summary> +Dontaudit read on a ramfs fifo_files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_ramfs_files" lineno="3472"> +<summary> +Create, read, write, and delete +files on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_write_ramfs_pipes" lineno="3490"> +<summary> +Write to named pipe on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_write_ramfs_pipes" lineno="3509"> +<summary> +Do not audit attempts to write to named +pipes on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_rw_ramfs_pipes" lineno="3527"> +<summary> +Read and write a named pipe on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_ramfs_pipes" lineno="3546"> +<summary> +Create, read, write, and delete +named pipes on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_write_ramfs_sockets" lineno="3564"> +<summary> +Write to named socket on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_ramfs_sockets" lineno="3583"> +<summary> +Create, read, write, and delete +named sockets on a ramfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_romfs" lineno="3601"> +<summary> +Mount a ROM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_romfs" lineno="3620"> +<summary> +Remount a ROM filesystem. This allows +some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_romfs" lineno="3638"> +<summary> +Unmount a ROM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_romfs" lineno="3657"> +<summary> +Get the attributes of a ROM +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_rpc_pipefs" lineno="3675"> +<summary> +Mount a RPC pipe filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_rpc_pipefs" lineno="3694"> +<summary> +Remount a RPC pipe filesystem. This +allows some mount option to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_rpc_pipefs" lineno="3712"> +<summary> +Unmount a RPC pipe filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_rpc_pipefs" lineno="3731"> +<summary> +Get the attributes of a RPC pipe +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_rpc_named_pipes" lineno="3749"> +<summary> +Read and write RPC pipe filesystem named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_tmpfs" lineno="3767"> +<summary> +Mount a tmpfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_tmpfs" lineno="3785"> +<summary> +Remount a tmpfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_tmpfs" lineno="3803"> +<summary> +Unmount a tmpfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_tmpfs" lineno="3823"> +<summary> +Get the attributes of a tmpfs +filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_associate_tmpfs" lineno="3841"> +<summary> +Allow the type to associate to tmpfs filesystems. +</summary> +<param name="type"> +<summary> +The type of the object to be associated. +</summary> +</param> +</interface> +<interface name="fs_getattr_tmpfs_dirs" lineno="3859"> +<summary> +Get the attributes of tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="3878"> +<summary> +Do not audit attempts to get the attributes +of tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_setattr_tmpfs_dirs" lineno="3896"> +<summary> +Set the attributes of tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_tmpfs" lineno="3914"> +<summary> +Search tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_tmpfs" lineno="3932"> +<summary> +List the contents of generic tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_list_tmpfs" lineno="3951"> +<summary> +Do not audit attempts to list the +contents of generic tmpfs directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_dirs" lineno="3970"> +<summary> +Create, read, write, and delete +tmpfs directories +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="3989"> +<summary> +Do not audit attempts to write +tmpfs directories +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_tmpfs_filetrans" lineno="4018"> +<summary> +Create an object in a tmpfs filesystem, with a private +type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4038"> +<summary> +Do not audit attempts to getattr +generic tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_rw_tmpfs_files" lineno="4057"> +<summary> +Do not audit attempts to read or write +generic tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_auto_mountpoints" lineno="4076"> +<summary> +Create, read, write, and delete +auto moutpoints. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_tmpfs_files" lineno="4094"> +<summary> +Read generic tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_tmpfs_files" lineno="4112"> +<summary> +Read and write generic tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_read_tmpfs_symlinks" lineno="4130"> +<summary> +Read tmpfs link files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_tmpfs_chr_files" lineno="4148"> +<summary> +Read and write character nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4167"> +<summary> +dontaudit Read and write character nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_relabel_tmpfs_chr_file" lineno="4186"> +<summary> +Relabel character nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_rw_tmpfs_blk_files" lineno="4205"> +<summary> +Read and write block nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_relabel_tmpfs_blk_file" lineno="4224"> +<summary> +Relabel block nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_files" lineno="4244"> +<summary> +Read and write, create and delete generic +files on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_symlinks" lineno="4263"> +<summary> +Read and write, create and delete symbolic +links on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_sockets" lineno="4282"> +<summary> +Read and write, create and delete socket +files on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_chr_files" lineno="4301"> +<summary> +Read and write, create and delete character +nodes on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_tmpfs_blk_files" lineno="4320"> +<summary> +Read and write, create and delete block nodes +on tmpfs filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_mount_xenfs" lineno="4338"> +<summary> +Mount a XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_xenfs" lineno="4356"> +<summary> +Search the XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_manage_xenfs_dirs" lineno="4376"> +<summary> +Create, read, write, and delete directories +on a XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="4396"> +<summary> +Do not audit attempts to create, read, +write, and delete directories +on a XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_manage_xenfs_files" lineno="4416"> +<summary> +Create, read, write, and delete files +on a XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_dontaudit_manage_xenfs_files" lineno="4436"> +<summary> +Do not audit attempts to create, +read, write, and delete files +on a XENFS filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_mount_all_fs" lineno="4454"> +<summary> +Mount all filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_remount_all_fs" lineno="4473"> +<summary> +Remount all filesystems. This +allows some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unmount_all_fs" lineno="4491"> +<summary> +Unmount all filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_fs" lineno="4523"> +<summary> +Get the attributes of all filesystems. +</summary> +<desc> +<p> +Allow the specified domain to +et the attributes of all filesystems. +Example attributes: +</p> +<ul> +<li>Type of the file system (e.g., ext3)</li> +<li>Size of the file system</li> +<li>Available space on the file system</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="5"/> +<rolecap/> +</interface> +<interface name="fs_dontaudit_getattr_all_fs" lineno="4543"> +<summary> +Do not audit attempts to get the attributes +all filesystems. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_get_all_fs_quotas" lineno="4562"> +<summary> +Get the quotas of all filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_set_all_quotas" lineno="4581"> +<summary> +Set the quotas of all filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fs_relabelfrom_all_fs" lineno="4599"> +<summary> +Relabelfrom all filesystems. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_dirs" lineno="4618"> +<summary> +Get the attributes of all directories +with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_search_all" lineno="4636"> +<summary> +Search all directories with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_list_all" lineno="4654"> +<summary> +List all directories with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_files" lineno="4673"> +<summary> +Get the attributes of all files with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_all_files" lineno="4692"> +<summary> +Do not audit attempts to get the attributes +of all files with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_symlinks" lineno="4711"> +<summary> +Get the attributes of all symbolic links with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_all_symlinks" lineno="4730"> +<summary> +Do not audit attempts to get the attributes +of all symbolic links with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_pipes" lineno="4749"> +<summary> +Get the attributes of all named pipes with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_all_pipes" lineno="4768"> +<summary> +Do not audit attempts to get the attributes +of all named pipes with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_sockets" lineno="4787"> +<summary> +Get the attributes of all named sockets with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_dontaudit_getattr_all_sockets" lineno="4806"> +<summary> +Do not audit attempts to get the attributes +of all named sockets with a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_blk_files" lineno="4825"> +<summary> +Get the attributes of all block device nodes with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_getattr_all_chr_files" lineno="4844"> +<summary> +Get the attributes of all character device nodes with +a filesystem type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fs_unconfined" lineno="4862"> +<summary> +Unconfined access to filesystems +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="kernel" filename="policy/modules/kernel/kernel.if"> +<summary> +Policy for kernel threads, proc filesystem, +and unlabeled processes and objects. +</summary> +<required val="true"> +This module has initial SIDs. +</required> +<interface name="kernel_domtrans_to" lineno="25"> +<summary> +Allows to start userland processes +by transitioning to the specified domain. +</summary> +<param name="domain"> +<summary> +The process type entered by kernel. +</summary> +</param> +<param name="entrypoint"> +<summary> +The executable type for the entrypoint. +</summary> +</param> +</interface> +<interface name="kernel_ranged_domtrans_to" lineno="55"> +<summary> +Allows to start userland processes +by transitioning to the specified domain, +with a range transition. +</summary> +<param name="domain"> +<summary> +The process type entered by kernel. +</summary> +</param> +<param name="entrypoint"> +<summary> +The executable type for the entrypoint. +</summary> +</param> +<param name="range"> +<summary> +Range for the domain. +</summary> +</param> +</interface> +<interface name="kernel_rootfs_mountpoint" lineno="83"> +<summary> +Allows the kernel to mount filesystems on +the specified directory type. +</summary> +<param name="directory_type"> +<summary> +The type of the directory to use as a mountpoint. +</summary> +</param> +</interface> +<interface name="kernel_setpgid" lineno="101"> +<summary> +Set the process group of kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_setsched" lineno="119"> +<summary> +Set the priority of kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_sigchld" lineno="137"> +<summary> +Send a SIGCHLD signal to kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_kill" lineno="155"> +<summary> +Send a kill signal to kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_signal" lineno="173"> +<summary> +Send a generic signal to kernel threads. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_share_state" lineno="192"> +<summary> +Allows the kernel to share state information with +the caller. +</summary> +<param name="domain"> +<summary> +The type of the process with which to share state information. +</summary> +</param> +</interface> +<interface name="kernel_use_fds" lineno="210"> +<summary> +Permits caller to use kernel file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_use_fds" lineno="229"> +<summary> +Do not audit attempts to use +kernel file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_rw_pipes" lineno="247"> +<summary> +Read and write kernel unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_rw_unix_dgram_sockets" lineno="265"> +<summary> +Read and write kernel unix datagram sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dgram_send" lineno="283"> +<summary> +Send messages to kernel unix datagram sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_tcp_recvfrom" lineno="301"> +<summary> +Receive messages from kernel TCP sockets. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_udp_send" lineno="315"> +<summary> +Send UDP network traffic to the kernel. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_udp_recvfrom" lineno="329"> +<summary> +Receive messages from kernel UDP sockets. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_load_module" lineno="343"> +<summary> +Allows caller to load kernel modules +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_search_key" lineno="361"> +<summary> +Allow search the kernel key ring. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_key" lineno="379"> +<summary> +dontaudit search the kernel key ring. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_link_key" lineno="397"> +<summary> +Allow link to the kernel key ring. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_link_key" lineno="415"> +<summary> +dontaudit link to the kernel key ring. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_ring_buffer" lineno="434"> +<summary> +Allows caller to read the ring buffer. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_dontaudit_read_ring_buffer" lineno="453"> +<summary> +Do not audit attempts to read the ring buffer. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_change_ring_buffer_level" lineno="472"> +<summary> +Change the level of kernel messages logged to the console. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_clear_ring_buffer" lineno="500"> +<summary> +Allows the caller to clear the ring buffer. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_request_load_module" lineno="540"> +<summary> +Allows caller to request the kernel to load a module +</summary> +<desc> +<p> +Allow the specified domain to request that the kernel +load a kernel module. An example of this is the +auto-loading of network drivers when doing an +ioctl() on a network interface. +</p> +<p> +In the specific case of a module loading request +on a network interface, the domain will also +need the net_admin capability. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_request_load_module" lineno="558"> +<summary> +Do not audit requests to the kernel to load a module. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_get_sysvipc_info" lineno="576"> +<summary> +Get information on all System V IPC objects. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_getattr_debugfs" lineno="594"> +<summary> +Get the attributes of a kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_mount_debugfs" lineno="612"> +<summary> +Mount a kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_unmount_debugfs" lineno="630"> +<summary> +Unmount a kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_remount_debugfs" lineno="648"> +<summary> +Remount a kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_search_debugfs" lineno="666"> +<summary> +Search the contents of a kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_debugfs" lineno="684"> +<summary> +Do not audit attempts to search the kernel debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_debugfs" lineno="702"> +<summary> +Read information from the debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="722"> +<summary> +Do not audit attempts to write kernel debugging filesystem dirs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_manage_debugfs" lineno="740"> +<summary> +Manage information from the debugging filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_mount_kvmfs" lineno="760"> +<summary> +Mount a kernel VM filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_unmount_proc" lineno="778"> +<summary> +Unmount the proc filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_getattr_proc" lineno="796"> +<summary> +Get the attributes of the proc filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="815"> +<summary> +Do not audit attempts to set the +attributes of directories in /proc. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_search_proc" lineno="833"> +<summary> +Search directories in /proc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_list_proc" lineno="851"> +<summary> +List the contents of directories in /proc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_list_proc" lineno="870"> +<summary> +Do not audit attempts to list the +contents of directories in /proc. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_write_proc_dirs" lineno="889"> +<summary> +Do not audit attempts to write the +directories in /proc. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_getattr_proc_files" lineno="907"> +<summary> +Get the attributes of files in /proc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_read_proc_symlinks" lineno="934"> +<summary> +Read generic symbolic links in /proc. +</summary> +<desc> +<p> +Allow the specified domain to read (follow) generic +symbolic links (symlinks) in the proc filesystem (/proc). +This interface does not include access to the targets of +these links. An example symlink is /proc/self. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="kernel_read_system_state" lineno="973"> +<summary> +Allows caller to read system state information in /proc. +</summary> +<desc> +<p> +Allow the specified domain to read general system +state information from the proc filesystem (/proc). +</p> +<p> +Generally it should be safe to allow this access. Some +example files that can be read based on this interface: +</p> +<ul> +<li>/proc/cpuinfo</li> +<li>/proc/meminfo</li> +<li>/proc/uptime</li> +</ul> +<p> +This does not allow access to sysctl entries (/proc/sys/*) +nor process state information (/proc/pid). +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +<rolecap/> +</interface> +<interface name="kernel_write_proc_files" lineno="999"> +<summary> +Write to generic proc entries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_dontaudit_read_system_state" lineno="1018"> +<summary> +Do not audit attempts by caller to +read system state information in proc. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1037"> +<summary> +Do not audit attempts by caller to +read system state information in proc. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_rw_afs_state" lineno="1056"> +<summary> +Allow caller to read and write state information for AFS. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_software_raid_state" lineno="1076"> +<summary> +Allow caller to read the state information for software raid. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_software_raid_state" lineno="1096"> +<summary> +Allow caller to read and set the state information for software raid. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_getattr_core_if" lineno="1116"> +<summary> +Allows caller to get attribues of core kernel interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_core_if" lineno="1137"> +<summary> +Do not audit attempts to get the attributes of +core kernel interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_core_if" lineno="1155"> +<summary> +Allows caller to read the core kernel interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_read_messages" lineno="1179"> +<summary> +Allow caller to read kernel messages +using the /proc/kmsg interface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_getattr_message_if" lineno="1201"> +<summary> +Allow caller to get the attributes of kernel message +interface (/proc/kmsg). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_message_if" lineno="1220"> +<summary> +Do not audit attempts by caller to get the attributes of kernel +message interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_network_state" lineno="1240"> +<summary> +Do not audit attempts to search the network +state directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> + +</interface> +<interface name="kernel_search_network_state" lineno="1259"> +<summary> +Allow searching of network state directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_read_network_state" lineno="1289"> +<summary> +Read the network state information. +</summary> +<desc> +<p> +Allow the specified domain to read the networking +state information. This includes several pieces +of networking information, such as network interface +names, netfilter (iptables) statistics, protocol +information, routes, and remote procedure call (RPC) +information. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +<rolecap/> +</interface> +<interface name="kernel_read_network_state_symlinks" lineno="1310"> +<summary> +Allow caller to read the network state symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_search_xen_state" lineno="1331"> +<summary> +Allow searching of xen state directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_dontaudit_search_xen_state" lineno="1351"> +<summary> +Do not audit attempts to search the xen +state directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> + +</interface> +<interface name="kernel_read_xen_state" lineno="1370"> +<summary> +Allow caller to read the xen state information. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_read_xen_state_symlinks" lineno="1392"> +<summary> +Allow caller to read the xen state symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_write_xen_state" lineno="1413"> +<summary> +Allow caller to write xen state information. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_list_all_proc" lineno="1431"> +<summary> +Allow attempts to list all proc directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_list_all_proc" lineno="1450"> +<summary> +Do not audit attempts to list all proc directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_sysctl" lineno="1471"> +<summary> +Do not audit attempts by caller to search +the base directory of sysctls. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> + +</interface> +<interface name="kernel_read_sysctl" lineno="1490"> +<summary> +Allow access to read sysctl directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> + +</interface> +<interface name="kernel_read_device_sysctls" lineno="1510"> +<summary> +Allow caller to read the device sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_device_sysctls" lineno="1531"> +<summary> +Read and write device sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_search_vm_sysctl" lineno="1551"> +<summary> +Allow caller to search virtual memory sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_read_vm_sysctls" lineno="1570"> +<summary> +Allow caller to read virtual memory sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_vm_sysctls" lineno="1591"> +<summary> +Read and write virtual memory sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_search_network_sysctl" lineno="1613"> +<summary> +Search network sysctl directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_search_network_sysctl" lineno="1631"> +<summary> +Do not audit attempts by caller to search network sysctl directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_net_sysctls" lineno="1650"> +<summary> +Allow caller to read network sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_net_sysctls" lineno="1671"> +<summary> +Allow caller to modiry contents of sysctl network files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_unix_sysctls" lineno="1693"> +<summary> +Allow caller to read unix domain +socket sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_unix_sysctls" lineno="1715"> +<summary> +Read and write unix domain +socket sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_hotplug_sysctls" lineno="1736"> +<summary> +Read the hotplug sysctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_hotplug_sysctls" lineno="1757"> +<summary> +Read and write the hotplug sysctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_modprobe_sysctls" lineno="1778"> +<summary> +Read the modprobe sysctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_modprobe_sysctls" lineno="1799"> +<summary> +Read and write the modprobe sysctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="1819"> +<summary> +Do not audit attempts to search generic kernel sysctls. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_crypto_sysctls" lineno="1837"> +<summary> +Read generic crypto sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_read_kernel_sysctls" lineno="1878"> +<summary> +Read general kernel sysctls. +</summary> +<desc> +<p> +Allow the specified domain to read general +kernel sysctl settings. These settings are typically +read using the sysctl program. The settings +that are included by this interface are prefixed +with "kernel.", for example, kernel.sysrq. +</p> +<p> +This does not include access to the hotplug +handler setting (kernel.hotplug) +nor the module installer handler setting +(kernel.modprobe). +</p> +<p> +Related interfaces: +</p> +<ul> +<li>kernel_rw_kernel_sysctl()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="1898"> +<summary> +Do not audit attempts to write generic kernel sysctls. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_rw_kernel_sysctl" lineno="1917"> +<summary> +Read and write generic kernel sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_fs_sysctls" lineno="1938"> +<summary> +Read filesystem sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_fs_sysctls" lineno="1959"> +<summary> +Read and write fileystem sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_irq_sysctls" lineno="1980"> +<summary> +Read IRQ sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_irq_sysctls" lineno="2001"> +<summary> +Read and write IRQ sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_read_rpc_sysctls" lineno="2022"> +<summary> +Read RPC sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_rpc_sysctls" lineno="2043"> +<summary> +Read and write RPC sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_dontaudit_list_all_sysctls" lineno="2063"> +<summary> +Do not audit attempts to list all sysctl directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_read_all_sysctls" lineno="2083"> +<summary> +Allow caller to read all sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_rw_all_sysctls" lineno="2106"> +<summary> +Read and write all sysctls. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="kernel_kill_unlabeled" lineno="2130"> +<summary> +Send a kill signal to unlabeled processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_mount_unlabeled" lineno="2148"> +<summary> +Mount a kernel unlabeled filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_unmount_unlabeled" lineno="2166"> +<summary> +Unmount a kernel unlabeled filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_signal_unlabeled" lineno="2184"> +<summary> +Send general signals to unlabeled processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_signull_unlabeled" lineno="2202"> +<summary> +Send a null signal to unlabeled processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_sigstop_unlabeled" lineno="2220"> +<summary> +Send a stop signal to unlabeled processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_sigchld_unlabeled" lineno="2238"> +<summary> +Send a child terminated signal to unlabeled processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_list_unlabeled" lineno="2256"> +<summary> +List unlabeled directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_read_unlabeled_state" lineno="2274"> +<summary> +Read the process state (/proc/pid) of all unlabeled_t. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_list_unlabeled" lineno="2294"> +<summary> +Do not audit attempts to list unlabeled directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_rw_unlabeled_dirs" lineno="2312"> +<summary> +Read and write unlabeled directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_rw_unlabeled_files" lineno="2330"> +<summary> +Read and write unlabeled files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2349"> +<summary> +Do not audit attempts by caller to get the +attributes of an unlabeled file. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2368"> +<summary> +Do not audit attempts by caller to +read an unlabeled file. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2387"> +<summary> +Do not audit attempts by caller to get the +attributes of unlabeled symbolic links. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2406"> +<summary> +Do not audit attempts by caller to get the +attributes of unlabeled named pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2425"> +<summary> +Do not audit attempts by caller to get the +attributes of unlabeled named sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2444"> +<summary> +Do not audit attempts by caller to get attributes for +unlabeled block devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_rw_unlabeled_blk_files" lineno="2462"> +<summary> +Read and write unlabeled block device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="2481"> +<summary> +Do not audit attempts by caller to get attributes for +unlabeled character devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="2499"> +<summary> +Allow caller to relabel unlabeled directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_files" lineno="2517"> +<summary> +Allow caller to relabel unlabeled files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="2536"> +<summary> +Allow caller to relabel unlabeled symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="2555"> +<summary> +Allow caller to relabel unlabeled named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="2574"> +<summary> +Allow caller to relabel unlabeled named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_sendrecv_unlabeled_association" lineno="2608"> +<summary> +Send and receive messages from an +unlabeled IPSEC association. +</summary> +<desc> +<p> +Send and receive messages from an +unlabeled IPSEC association. Network +connections that are not protected +by IPSEC have use an unlabeled +assocation. +</p> +<p> +The corenetwork interface +corenet_non_ipsec_sendrecv() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="2644"> +<summary> +Do not audit attempts to send and receive messages +from an unlabeled IPSEC association. +</summary> +<desc> +<p> +Do not audit attempts to send and receive messages +from an unlabeled IPSEC association. Network +connections that are not protected +by IPSEC have use an unlabeled +assocation. +</p> +<p> +The corenetwork interface +corenet_dontaudit_non_ipsec_sendrecv() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_tcp_recvfrom_unlabeled" lineno="2671"> +<summary> +Receive TCP packets from an unlabeled connection. +</summary> +<desc> +<p> +Receive TCP packets from an unlabeled connection. +</p> +<p> +The corenetwork interface corenet_tcp_recv_unlabeled() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="2700"> +<summary> +Do not audit attempts to receive TCP packets from an unlabeled +connection. +</summary> +<desc> +<p> +Do not audit attempts to receive TCP packets from an unlabeled +connection. +</p> +<p> +The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled() +should be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_udp_recvfrom_unlabeled" lineno="2727"> +<summary> +Receive UDP packets from an unlabeled connection. +</summary> +<desc> +<p> +Receive UDP packets from an unlabeled connection. +</p> +<p> +The corenetwork interface corenet_udp_recv_unlabeled() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="2756"> +<summary> +Do not audit attempts to receive UDP packets from an unlabeled +connection. +</summary> +<desc> +<p> +Do not audit attempts to receive UDP packets from an unlabeled +connection. +</p> +<p> +The corenetwork interface corenet_dontaudit_udp_recv_unlabeled() +should be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_raw_recvfrom_unlabeled" lineno="2783"> +<summary> +Receive Raw IP packets from an unlabeled connection. +</summary> +<desc> +<p> +Receive Raw IP packets from an unlabeled connection. +</p> +<p> +The corenetwork interface corenet_raw_recv_unlabeled() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="2812"> +<summary> +Do not audit attempts to receive Raw IP packets from an unlabeled +connection. +</summary> +<desc> +<p> +Do not audit attempts to receive Raw IP packets from an unlabeled +connection. +</p> +<p> +The corenetwork interface corenet_dontaudit_raw_recv_unlabeled() +should be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_sendrecv_unlabeled_packets" lineno="2842"> +<summary> +Send and receive unlabeled packets. +</summary> +<desc> +<p> +Send and receive unlabeled packets. +These packets do not match any netfilter +SECMARK rules. +</p> +<p> +The corenetwork interface +corenet_sendrecv_unlabeled_packets() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_recvfrom_unlabeled_peer" lineno="2870"> +<summary> +Receive packets from an unlabeled peer. +</summary> +<desc> +<p> +Receive packets from an unlabeled peer, these packets do not have any +peer labeling information present. +</p> +<p> +The corenetwork interface corenet_recvfrom_unlabeled_peer() should +be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="2898"> +<summary> +Do not audit attempts to receive packets from an unlabeled peer. +</summary> +<desc> +<p> +Do not audit attempts to receive packets from an unlabeled peer, +these packets do not have any peer labeling information present. +</p> +<p> +The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled() +should be used instead of this one. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="kernel_relabelfrom_unlabeled_database" lineno="2916"> +<summary> +Relabel from unlabeled database objects. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="kernel_unconfined" lineno="2953"> +<summary> +Unconfined access to kernel module resources. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<bool name="secure_mode_insmod" dftval="false"> +<desc> +<p> +Disable kernel module loading. +</p> +</desc> +</bool> +</module> +<module name="mcs" filename="policy/modules/kernel/mcs.if"> +<summary>Multicategory security policy</summary> +<required val="true"> +Contains attributes used in MCS policy. +</required> +<interface name="mcs_file_read_all" lineno="18"> +<summary> +This domain is allowed to read files and directories +regardless of their MCS category set. +</summary> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mcs_file_write_all" lineno="38"> +<summary> +This domain is allowed to write files and directories +regardless of their MCS category set. +</summary> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mcs_killall" lineno="58"> +<summary> +This domain is allowed to sigkill and sigstop +all domains regardless of their MCS category set. +</summary> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mcs_ptrace_all" lineno="78"> +<summary> +This domain is allowed to ptrace +all domains regardless of their MCS +category set. +</summary> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +</interface> +<interface name="mcs_process_set_categories" lineno="98"> +<summary> +Make specified domain MCS trusted +for setting any category set for +the processes it executes. +</summary> +<param name="domain"> +<summary> +Domain target for user exemption. +</summary> +</param> +</interface> +</module> +<module name="mls" filename="policy/modules/kernel/mls.if"> +<summary>Multilevel security policy</summary> +<desc> +<p> +This module contains interfaces for handling multilevel +security. The interfaces allow the specified subjects +and objects to be allowed certain privileges in the +MLS rules. +</p> +</desc> +<required val="true"> +Contains attributes used in MLS policy. +</required> +<interface name="mls_file_read_to_clearance" lineno="26"> +<summary> +Make specified domain MLS trusted +for reading from files up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_read_up" lineno="55"> +<summary> +Make specified domain MLS trusted +for reading from files at all levels. (Deprecated) +</summary> +<desc> +<p> +Make specified domain MLS trusted +for reading from files at all levels. +</p> +<p> +This interface has been deprecated, please use +mls_file_read_all_levels() instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_file_read_all_levels" lineno="72"> +<summary> +Make specified domain MLS trusted +for reading from files at all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_write_to_clearance" lineno="92"> +<summary> +Make specified domain MLS trusted +for write to files up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_write_down" lineno="121"> +<summary> +Make specified domain MLS trusted +for writing to files at all levels. (Deprecated) +</summary> +<desc> +<p> +Make specified domain MLS trusted +for writing to files at all levels. +</p> +<p> +This interface has been deprecated, please use +mls_file_write_all_levels() instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_file_write_all_levels" lineno="138"> +<summary> +Make specified domain MLS trusted +for writing to files at all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_upgrade" lineno="158"> +<summary> +Make specified domain MLS trusted +for raising the level of files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_downgrade" lineno="178"> +<summary> +Make specified domain MLS trusted +for lowering the level of files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_file_write_within_range" lineno="200"> +<summary> +Make specified domain trusted to +be written to within its MLS range. +The subject's MLS range must be a +proper subset of the object's MLS range. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_socket_read_all_levels" lineno="220"> +<summary> +Make specified domain MLS trusted +for reading from sockets at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_socket_read_to_clearance" lineno="241"> +<summary> +Make specified domain MLS trusted +for reading from sockets at any level +that is dominated by the process clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_socket_write_to_clearance" lineno="262"> +<summary> +Make specified domain MLS trusted +for writing to sockets up to +its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_socket_write_all_levels" lineno="282"> +<summary> +Make specified domain MLS trusted +for writing to sockets at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_net_receive_all_levels" lineno="303"> +<summary> +Make specified domain MLS trusted +for receiving network data from +network interfaces or hosts at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_net_write_within_range" lineno="325"> +<summary> +Make specified domain trusted to +write to network objects within its MLS range. +The subject's MLS range must be a +proper subset of the object's MLS range. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_net_inbound_all_levels" lineno="346"> +<summary> +Make specified domain trusted to +write inbound packets regardless of the +network's or node's MLS range. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_net_outbound_all_levels" lineno="367"> +<summary> +Make specified domain trusted to +write outbound packets regardless of the +network's or node's MLS range. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_sysvipc_read_to_clearance" lineno="388"> +<summary> +Make specified domain MLS trusted +for reading from System V IPC objects +up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_sysvipc_read_all_levels" lineno="409"> +<summary> +Make specified domain MLS trusted +for reading from System V IPC objects +at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_sysvipc_write_to_clearance" lineno="430"> +<summary> +Make specified domain MLS trusted +for writing to System V IPC objects +up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_sysvipc_write_all_levels" lineno="451"> +<summary> +Make specified domain MLS trusted +for writing to System V IPC objects +at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_rangetrans_source" lineno="471"> +<summary> +Allow the specified domain to do a MLS +range transition that changes +the current level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_rangetrans_target" lineno="491"> +<summary> +Make specified domain a target domain +for MLS range transitions that change +the current level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_process_read_to_clearance" lineno="512"> +<summary> +Make specified domain MLS trusted +for reading from processes up to +its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_process_read_up" lineno="541"> +<summary> +Make specified domain MLS trusted +for reading from processes at all levels. (Deprecated) +</summary> +<desc> +<p> +Make specified domain MLS trusted +for reading from processes at all levels. +</p> +<p> +This interface has been deprecated, please use +mls_process_read_all_levels() instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_process_read_all_levels" lineno="558"> +<summary> +Make specified domain MLS trusted +for reading from processes at all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_process_write_to_clearance" lineno="579"> +<summary> +Make specified domain MLS trusted +for writing to processes up to +its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_process_write_down" lineno="608"> +<summary> +Make specified domain MLS trusted +for writing to processes at all levels. (Deprecated) +</summary> +<desc> +<p> +Make specified domain MLS trusted +for writing to processes at all levels. +</p> +<p> +This interface has been deprecated, please use +mls_process_write_all_levels() instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mls_process_write_all_levels" lineno="625"> +<summary> +Make specified domain MLS trusted +for writing to processes at all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_process_set_level" lineno="646"> +<summary> +Make specified domain MLS trusted +for setting the level of processes +it executes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_xwin_read_to_clearance" lineno="666"> +<summary> +Make specified domain MLS trusted +for reading from X objects up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_xwin_read_all_levels" lineno="686"> +<summary> +Make specified domain MLS trusted +for reading from X objects at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_xwin_write_to_clearance" lineno="706"> +<summary> +Make specified domain MLS trusted +for write to X objects up to its clearance. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_xwin_write_all_levels" lineno="726"> +<summary> +Make specified domain MLS trusted +for writing to X objects at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_colormap_read_all_levels" lineno="746"> +<summary> +Make specified domain MLS trusted +for reading from X colormaps at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_colormap_write_all_levels" lineno="766"> +<summary> +Make specified domain MLS trusted +for writing to X colormaps at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_trusted_object" lineno="795"> +<summary> +Make specified object MLS trusted. +</summary> +<desc> +<p> +Make specified object MLS trusted. This +allows all levels to read and write the +object. +</p> +<p> +This currently only applies to filesystem +objects, for example, files and directories. +</p> +</desc> +<param name="domain"> +<summary> +The type of the object. +</summary> +</param> +</interface> +<interface name="mls_fd_use_all_levels" lineno="816"> +<summary> +Make the specified domain trusted +to inherit and use file descriptors +from all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_fd_share_all_levels" lineno="837"> +<summary> +Make the file descriptors from the +specifed domain inheritable by +all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_context_translate_all_levels" lineno="857"> +<summary> +Make specified domain MLS trusted +for translating contexts at all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_db_read_all_levels" lineno="877"> +<summary> +Make specified domain MLS trusted +for reading from databases at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_db_write_all_levels" lineno="897"> +<summary> +Make specified domain MLS trusted +for writing to databases at any level. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_db_upgrade" lineno="917"> +<summary> +Make specified domain MLS trusted +for raising the level of databases. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_db_downgrade" lineno="937"> +<summary> +Make specified domain MLS trusted +for lowering the level of databases. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_dbus_send_all_levels" lineno="957"> +<summary> +Make specified domain MLS trusted +for sending dbus messages to +all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mls_dbus_recv_all_levels" lineno="978"> +<summary> +Make specified domain MLS trusted +for receiving dbus messages from +all levels. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="selinux" filename="policy/modules/kernel/selinux.if"> +<summary> +Policy for kernel security interface, in particular, selinuxfs. +</summary> +<required val="true"> +Contains the policy for the kernel SELinux security interface. +</required> +<interface name="selinux_labeled_boolean" lineno="34"> +<summary> +Make the specified type used for labeling SELinux Booleans. +This interface is only usable in the base module. +</summary> +<desc> +<p> +Make the specified type used for labeling SELinux Booleans. +</p> +<p> +This makes use of genfscon statements, which are only +available in the base module. Thus any module which calls this +interface must be included in the base module. +</p> +</desc> +<param name="type"> +<summary> +Type used for labeling a Boolean. +</summary> +</param> +<param name="boolean"> +<summary> +Name of the Boolean. +</summary> +</param> +</interface> +<interface name="selinux_get_fs_mount" lineno="56"> +<summary> +Get the mountpoint of the selinuxfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_get_fs_mount" lineno="82"> +<summary> +Do not audit attempts to get the mountpoint +of the selinuxfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_mount_fs" lineno="107"> +<summary> +Mount the selinuxfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_remount_fs" lineno="126"> +<summary> +Remount the selinuxfs filesystem. +This allows some mount options to be changed. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_unmount_fs" lineno="144"> +<summary> +Unmount the selinuxfs filesystem. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_getattr_fs" lineno="162"> +<summary> +Get the attributes of the selinuxfs filesystem +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_getattr_fs" lineno="181"> +<summary> +Do not audit attempts to get the +attributes of the selinuxfs filesystem +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_getattr_dir" lineno="200"> +<summary> +Do not audit attempts to get the +attributes of the selinuxfs directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_search_fs" lineno="218"> +<summary> +Search selinuxfs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_search_fs" lineno="236"> +<summary> +Do not audit attempts to search selinuxfs. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_dontaudit_read_fs" lineno="255"> +<summary> +Do not audit attempts to read +generic selinuxfs entries +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="selinux_get_enforce_mode" lineno="276"> +<summary> +Allows the caller to get the mode of policy enforcement +(enforcing or permissive mode). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_set_enforce_mode" lineno="307"> +<summary> +Allow caller to set the mode of policy enforcement +(enforcing or permissive mode). +</summary> +<desc> +<p> +Allow caller to set the mode of policy enforcement +(enforcing or permissive mode). +</p> +<p> +Since this is a security event, this action is +always audited. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_load_policy" lineno="338"> +<summary> +Allow caller to load the policy into the kernel. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_read_policy" lineno="369"> +<summary> +Allow caller to read the policy from the kernel. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_set_boolean" lineno="406"> +<summary> +Allow caller to set the state of Booleans to +enable or disable conditional portions of the policy. (Deprecated) +</summary> +<desc> +<p> +Allow caller to set the state of Booleans to +enable or disable conditional portions of the policy. +</p> +<p> +Since this is a security event, this action is +always audited. +</p> +<p> +This interface has been deprecated. Please use +selinux_set_generic_booleans() or selinux_set_all_booleans() +instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_set_generic_booleans" lineno="433"> +<summary> +Allow caller to set the state of generic Booleans to +enable or disable conditional portions of the policy. +</summary> +<desc> +<p> +Allow caller to set the state of generic Booleans to +enable or disable conditional portions of the policy. +</p> +<p> +Since this is a security event, this action is +always audited. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_set_all_booleans" lineno="471"> +<summary> +Allow caller to set the state of all Booleans to +enable or disable conditional portions of the policy. +</summary> +<desc> +<p> +Allow caller to set the state of all Booleans to +enable or disable conditional portions of the policy. +</p> +<p> +Since this is a security event, this action is +always audited. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_set_parameters" lineno="516"> +<summary> +Allow caller to set SELinux access vector cache parameters. +</summary> +<desc> +<p> +Allow caller to set SELinux access vector cache parameters. +The allows the domain to set performance related parameters +of the AVC, such as cache threshold. +</p> +<p> +Since this is a security event, this action is +always audited. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_validate_context" lineno="540"> +<summary> +Allows caller to validate security contexts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_dontaudit_validate_context" lineno="561"> +<summary> +Do not audit attempts to validate security contexts. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_compute_access_vector" lineno="582"> +<summary> +Allows caller to compute an access vector. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_compute_create_context" lineno="603"> +<summary> +Calculate the default type for object creation. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="selinux_compute_member" lineno="624"> +<summary> +Allows caller to compute polyinstatntiated +directory members. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_compute_relabel_context" lineno="653"> +<summary> +Calculate the context for relabeling objects. +</summary> +<desc> +<p> +Calculate the context for relabeling objects. +This is determined by using the type_change +rules in the policy, and is generally used +for determining the context for relabeling +a terminal when a user logs in. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_compute_user_contexts" lineno="673"> +<summary> +Allows caller to compute possible contexts for a user. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="selinux_unconfined" lineno="693"> +<summary> +Unconfined access to the SELinux kernel security server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<bool name="secure_mode_policyload" dftval="false"> +<desc> +<p> +Boolean to determine whether the system permits loading policy, setting +enforcing mode, and changing boolean values. Set this to true and you +have to reboot to set it back. +</p> +</desc> +</bool> +</module> +<module name="storage" filename="policy/modules/kernel/storage.if"> +<summary>Policy controlling access to storage devices</summary> +<interface name="storage_getattr_fixed_disk_dev" lineno="14"> +<summary> +Allow the caller to get the attributes of fixed disk +device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="34"> +<summary> +Do not audit attempts made by the caller to get +the attributes of fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_setattr_fixed_disk_dev" lineno="54"> +<summary> +Allow the caller to set the attributes of fixed disk +device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="74"> +<summary> +Do not audit attempts made by the caller to set +the attributes of fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_raw_read_fixed_disk" lineno="95"> +<summary> +Allow the caller to directly read from a fixed disk. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_read_fixed_disk" lineno="118"> +<summary> +Do not audit attempts made by the caller to read +fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_raw_write_fixed_disk" lineno="141"> +<summary> +Allow the caller to directly write to a fixed disk. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_write_fixed_disk" lineno="164"> +<summary> +Do not audit attempts made by the caller to write +fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_raw_rw_fixed_disk" lineno="186"> +<summary> +Allow the caller to directly read and write to a fixed disk. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_create_fixed_disk_dev" lineno="201"> +<summary> +Allow the caller to create fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_delete_fixed_disk_dev" lineno="221"> +<summary> +Allow the caller to create fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_manage_fixed_disk" lineno="240"> +<summary> +Create, read, write, and delete fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dev_filetrans_fixed_disk" lineno="264"> +<summary> +Create block devices in /dev with the fixed disk type +via an automatic type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="283"> +<summary> +Create block devices in on a tmpfs filesystem with the +fixed disk type via an automatic type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_relabel_fixed_disk" lineno="301"> +<summary> +Relabel fixed disk device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_swapon_fixed_disk" lineno="320"> +<summary> +Enable a fixed disk device as swap space +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_getattr_fuse_dev" lineno="340"> +<summary> +Allow the caller to get the attributes +of device nodes of fuse devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_rw_fuse" lineno="359"> +<summary> +read or write fuse device interfaces. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_rw_fuse" lineno="378"> +<summary> +Do not audit attempts to read or write +fuse device interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_getattr_scsi_generic_dev" lineno="397"> +<summary> +Allow the caller to get the attributes of +the generic SCSI interface device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_setattr_scsi_generic_dev" lineno="417"> +<summary> +Allow the caller to set the attributes of +the generic SCSI interface device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_read_scsi_generic" lineno="440"> +<summary> +Allow the caller to directly read, in a +generic fashion, from any SCSI device. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_write_scsi_generic" lineno="465"> +<summary> +Allow the caller to directly write, in a +generic fashion, from any SCSI device. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_setattr_scsi_generic_dev_dev" lineno="487"> +<summary> +Set attributes of the device nodes +for the SCSI generic inerface. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_rw_scsi_generic" lineno="507"> +<summary> +Do not audit attempts to read or write +SCSI generic device interfaces. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_getattr_removable_dev" lineno="526"> +<summary> +Allow the caller to get the attributes of removable +devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_getattr_removable_dev" lineno="546"> +<summary> +Do not audit attempts made by the caller to get +the attributes of removable devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_read_removable_device" lineno="565"> +<summary> +Do not audit attempts made by the caller to read +removable devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_write_removable_device" lineno="585"> +<summary> +Do not audit attempts made by the caller to write +removable devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_setattr_removable_dev" lineno="604"> +<summary> +Allow the caller to set the attributes of removable +devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_setattr_removable_dev" lineno="624"> +<summary> +Do not audit attempts made by the caller to set +the attributes of removable devices device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_raw_read_removable_device" lineno="646"> +<summary> +Allow the caller to directly read from +a removable device. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_raw_read_removable_device" lineno="665"> +<summary> +Do not audit attempts to directly read removable devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_raw_write_removable_device" lineno="687"> +<summary> +Allow the caller to directly write to +a removable device. +This is extremly dangerous as it can bypass the +SELinux protections for filesystem objects, and +should only be used by trusted domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_dontaudit_raw_write_removable_device" lineno="706"> +<summary> +Do not audit attempts to directly write removable devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="storage_read_tape" lineno="725"> +<summary> +Allow the caller to directly read +a tape device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_write_tape" lineno="745"> +<summary> +Allow the caller to directly read +a tape device. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_getattr_tape_dev" lineno="765"> +<summary> +Allow the caller to get the attributes +of device nodes of tape devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_setattr_tape_dev" lineno="785"> +<summary> +Allow the caller to set the attributes +of device nodes of tape devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="storage_unconfined" lineno="804"> +<summary> +Unconfined access to storage devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="terminal" filename="policy/modules/kernel/terminal.if"> +<summary>Policy for terminals.</summary> +<required val="true"> +Depended on by other required modules. +</required> +<interface name="term_pty" lineno="16"> +<summary> +Transform specified type into a pty type. +</summary> +<param name="pty_type"> +<summary> +An object type that will applied to a pty. +</summary> +</param> +</interface> +<interface name="term_user_pty" lineno="45"> +<summary> +Transform specified type into an user +pty type. This allows it to be relabeled via +type change by login programs such as ssh. +</summary> +<param name="userdomain"> +<summary> +The type of the user domain associated with +this pty. +</summary> +</param> +<param name="object_type"> +<summary> +An object type that will applied to a pty. +</summary> +</param> +</interface> +<interface name="term_login_pty" lineno="65"> +<summary> +Transform specified type into a pty type +used by login programs, such as sshd. +</summary> +<param name="pty_type"> +<summary> +An object type that will applied to a pty. +</summary> +</param> +</interface> +<interface name="term_tty" lineno="84"> +<summary> +Transform specified type into a tty type. +</summary> +<param name="tty_type"> +<summary> +An object type that will applied to a tty. +</summary> +</param> +</interface> +<interface name="term_user_tty" lineno="110"> +<summary> +Transform specified type into a user tty type. +</summary> +<param name="domain"> +<summary> +User domain that is related to this tty. +</summary> +</param> +<param name="tty_type"> +<summary> +An object type that will applied to a tty. +</summary> +</param> +</interface> +<interface name="term_create_pty" lineno="149"> +<summary> +Create a pty in the /dev/pts directory. +</summary> +<param name="domain"> +<summary> +The type of the process creating the pty. +</summary> +</param> +<param name="pty_type"> +<summary> +The type of the pty. +</summary> +</param> +</interface> +<interface name="term_write_all_terms" lineno="175"> +<summary> +Write the console, all +ttys and all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_use_all_terms" lineno="198"> +<summary> +Read and write the console, all +ttys and all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_write_console" lineno="220"> +<summary> +Write to the console. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_read_console" lineno="240"> +<summary> +Read from the console. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_read_console" lineno="260"> +<summary> +Do not audit attempts to read from the console. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_use_console" lineno="279"> +<summary> +Read from and write to the console. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_console" lineno="299"> +<summary> +Do not audit attemtps to read from +or write to the console. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_console" lineno="319"> +<summary> +Set the attributes of the console +device node. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_relabel_console" lineno="338"> +<summary> +Relabel from and to the console type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_create_console_dev" lineno="357"> +<summary> +Create the console device (/dev/console). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_getattr_pty_fs" lineno="377"> +<summary> +Get the attributes of a pty filesystem +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_getattr_pty_dirs" lineno="396"> +<summary> +Do not audit attempts to get the +attributes of the /dev/pts directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_search_ptys" lineno="414"> +<summary> +Search the contents of the /dev/pts directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_search_ptys" lineno="434"> +<summary> +Do not audit attempts to search the +contents of the /dev/pts directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_list_ptys" lineno="454"> +<summary> +Read the /dev/pts directory to +list all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_list_ptys" lineno="474"> +<summary> +Do not audit attempts to read the +/dev/pts directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_dontaudit_manage_pty_dirs" lineno="493"> +<summary> +Do not audit attempts to create, read, +write, or delete the /dev/pts directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_dontaudit_getattr_generic_ptys" lineno="512"> +<summary> +Do not audit attempts to get the attributes +of generic pty devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_ioctl_generic_ptys" lineno="530"> +<summary> +ioctl of generic pty devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_setattr_generic_ptys" lineno="552"> +<summary> +Allow setting the attributes of +generic pty devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_setattr_generic_ptys" lineno="572"> +<summary> +Dontaudit setting the attributes of +generic pty devices. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_use_generic_ptys" lineno="592"> +<summary> +Read and write the generic pty +type. This is generally only used in +the targeted policy. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_use_generic_ptys" lineno="614"> +<summary> +Dot not audit attempts to read and +write the generic pty type. This is +generally only used in the targeted policy. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_controlling_term" lineno="632"> +<summary> +Set the attributes of the tty device +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_controlling_term" lineno="652"> +<summary> +Read and write the controlling +terminal (/dev/tty). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_getattr_ptmx" lineno="671"> +<summary> +Get the attributes of the pty multiplexor (/dev/ptmx). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_dontaudit_getattr_ptmx" lineno="690"> +<summary> +Do not audit attempts to get attributes +on the pty multiplexor (/dev/ptmx). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_use_ptmx" lineno="708"> +<summary> +Read and write the pty multiplexor (/dev/ptmx). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_dontaudit_use_ptmx" lineno="728"> +<summary> +Do not audit attempts to read and +write the pty multiplexor (/dev/ptmx). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_getattr_all_ptys" lineno="748"> +<summary> +Get the attributes of all +pty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_getattr_all_ptys" lineno="771"> +<summary> +Do not audit attempts to get the +attributes of any pty +device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_all_ptys" lineno="791"> +<summary> +Set the attributes of all +pty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_relabelto_all_ptys" lineno="812"> +<summary> +Relabel to all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_write_all_ptys" lineno="830"> +<summary> +Write to all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_all_ptys" lineno="850"> +<summary> +Read and write all ptys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_all_ptys" lineno="871"> +<summary> +Do not audit attempts to read or write any ptys. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_relabel_all_ptys" lineno="889"> +<summary> +Relabel from and to all pty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_getattr_all_user_ptys" lineno="911"> +<summary> +Get the attributes of all user +pty device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_getattr_all_user_ptys" lineno="928"> +<summary> +Do not audit attempts to get the +attributes of any user pty +device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_setattr_all_user_ptys" lineno="945"> +<summary> +Set the attributes of all user +pty device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_relabelto_all_user_ptys" lineno="960"> +<summary> +Relabel to all user ptys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_write_all_user_ptys" lineno="975"> +<summary> +Write to all user ptys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_all_user_ptys" lineno="991"> +<summary> +Read and write all user ptys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_all_user_ptys" lineno="1007"> +<summary> +Do not audit attempts to read any +user ptys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_relabel_all_user_ptys" lineno="1023"> +<summary> +Relabel from and to all user +user pty device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_getattr_unallocated_ttys" lineno="1040"> +<summary> +Get the attributes of all unallocated +tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1060"> +<summary> +Do not audit attempts to get the attributes +of all unallocated tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_unallocated_ttys" lineno="1080"> +<summary> +Set the attributes of all unallocated +tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1100"> +<summary> +Do not audit attempts to set the attributes +of unallocated tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1119"> +<summary> +Do not audit attempts to ioctl +unallocated tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_relabel_unallocated_ttys" lineno="1138"> +<summary> +Relabel from and to the unallocated +tty type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_reset_tty_labels" lineno="1158"> +<summary> +Relabel from all user tty types to +the unallocated tty type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_append_unallocated_ttys" lineno="1179"> +<summary> +Append to unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_write_unallocated_ttys" lineno="1198"> +<summary> +Write to unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_unallocated_ttys" lineno="1218"> +<summary> +Read and write unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_unallocated_ttys" lineno="1238"> +<summary> +Do not audit attempts to read or +write unallocated ttys. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_getattr_all_ttys" lineno="1257"> +<summary> +Get the attributes of all tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_getattr_all_ttys" lineno="1277"> +<summary> +Do not audit attempts to get the +attributes of any tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_all_ttys" lineno="1297"> +<summary> +Set the attributes of all tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_relabel_all_ttys" lineno="1316"> +<summary> +Relabel from and to all tty device nodes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_write_all_ttys" lineno="1335"> +<summary> +Write to all ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_all_ttys" lineno="1355"> +<summary> +Read and write all ttys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_all_ttys" lineno="1375"> +<summary> +Do not audit attempts to read or write +any ttys. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_getattr_all_user_ttys" lineno="1395"> +<summary> +Get the attributes of all user tty +device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_getattr_all_user_ttys" lineno="1412"> +<summary> +Do not audit attempts to get the +attributes of any user tty +device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="term_setattr_all_user_ttys" lineno="1429"> +<summary> +Set the attributes of all user tty +device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_relabel_all_user_ttys" lineno="1445"> +<summary> +Relabel from and to all user +user tty device nodes. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_write_all_user_ttys" lineno="1460"> +<summary> +Write to all user ttys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="term_use_all_user_ttys" lineno="1476"> +<summary> +Read and write all user to all user ttys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="term_dontaudit_use_all_user_ttys" lineno="1492"> +<summary> +Do not audit attempts to read or write +any user ttys. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="ubac" filename="policy/modules/kernel/ubac.if"> +<summary>User-based access control policy</summary> +<required val="true"> +Contains attributes used in UBAC policy. +</required> +<interface name="ubac_constrained" lineno="29"> +<summary> +Constrain by user-based access control (UBAC). +</summary> +<desc> +<p> +Constrain the specified type by user-based +access control (UBAC). Typically, these are +user processes or user files that need to be +differentiated by SELinux user. Normally this +does not include administrative or privileged +programs. For the UBAC rules to be enforced, +both the subject (source) type and the object +(target) types must be UBAC constrained. +</p> +</desc> +<param name="type"> +<summary> +Type to be constrained by UBAC. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="ubac_file_exempt" lineno="47"> +<summary> +Exempt user-based access control for files. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_process_exempt" lineno="65"> +<summary> +Exempt user-based access control for processes. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_fd_exempt" lineno="83"> +<summary> +Exempt user-based access control for file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_socket_exempt" lineno="101"> +<summary> +Exempt user-based access control for sockets. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_sysvipc_exempt" lineno="119"> +<summary> +Exempt user-based access control for SysV IPC. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_xwin_exempt" lineno="137"> +<summary> +Exempt user-based access control for X Windows. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_dbus_exempt" lineno="155"> +<summary> +Exempt user-based access control for dbus. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_key_exempt" lineno="173"> +<summary> +Exempt user-based access control for keys. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +<interface name="ubac_db_exempt" lineno="191"> +<summary> +Exempt user-based access control for databases. +</summary> +<param name="domain"> +<summary> +Domain to be exempted. +</summary> +</param> +</interface> +</module> +</layer> +<layer name="roles"> +<summary>Policy modules for user roles.</summary> +<module name="auditadm" filename="policy/modules/roles/auditadm.if"> +<summary>Audit administrator role</summary> +<interface name="auditadm_role_change" lineno="14"> +<summary> +Change to the audit administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auditadm_role_change_to" lineno="44"> +<summary> +Change from the audit administrator role. +</summary> +<desc> +<p> +Change from the audit administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="logadm" filename="policy/modules/roles/logadm.if"> +<summary>Log administrator role</summary> +<interface name="logadm_role_change" lineno="14"> +<summary> +Change to the log administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logadm_role_change_to" lineno="44"> +<summary> +Change from the log administrator role. +</summary> +<desc> +<p> +Change from the log administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="secadm" filename="policy/modules/roles/secadm.if"> +<summary>Security administrator role</summary> +<interface name="secadm_role_change" lineno="14"> +<summary> +Change to the security administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="secadm_role_change_to_template" lineno="44"> +<summary> +Change from the security administrator role. +</summary> +<desc> +<p> +Change from the security administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="staff" filename="policy/modules/roles/staff.if"> +<summary>Administrator's unprivileged user role</summary> +<interface name="staff_role_change" lineno="14"> +<summary> +Change to the staff role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="staff_role_change_to" lineno="44"> +<summary> +Change from the staff role. +</summary> +<desc> +<p> +Change from the staff role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="sysadm" filename="policy/modules/roles/sysadm.if"> +<summary>General system administration role</summary> +<interface name="sysadm_role_change" lineno="14"> +<summary> +Change to the system administrator role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysadm_role_change_to" lineno="44"> +<summary> +Change from the system administrator role. +</summary> +<desc> +<p> +Change from the system administrator role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysadm_shell_domtrans" lineno="62"> +<summary> +Execute a shell in the sysadm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_bin_spec_domtrans" lineno="83"> +<summary> +Execute a generic bin program in the sysadm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_entry_spec_domtrans" lineno="106"> +<summary> +Execute all entrypoint files in the sysadm domain. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_entry_spec_domtrans_to" lineno="141"> +<summary> +Allow sysadm to execute all entrypoint files in +a specified domain. This is an explicit transition, +requiring the caller to use setexeccon(). +</summary> +<desc> +<p> +Allow sysadm to execute all entrypoint files in +a specified domain. This is an explicit transition, +requiring the caller to use setexeccon(). +</p> +<p> +This is a interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_bin_spec_domtrans_to" lineno="175"> +<summary> +Allow sysadm to execute a generic bin program in +a specified domain. This is an explicit transition, +requiring the caller to use setexeccon(). +</summary> +<desc> +<p> +Allow sysadm to execute a generic bin program in +a specified domain. +</p> +<p> +This is a interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain to execute in. +</summary> +</param> +</interface> +<interface name="sysadm_sigchld" lineno="196"> +<summary> +Send a SIGCHLD signal to sysadm users. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_use_fds" lineno="214"> +<summary> +Inherit and use sysadm file descriptors +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysadm_rw_pipes" lineno="232"> +<summary> +Read and write sysadm user unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_ptrace" dftval="false"> +<desc> +<p> +Allow sysadm to debug or ptrace all processes. +</p> +</desc> +</tunable> +</module> +<module name="unprivuser" filename="policy/modules/roles/unprivuser.if"> +<summary>Generic unprivileged user role</summary> +<interface name="unprivuser_role_change" lineno="14"> +<summary> +Change to the generic user role. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="unprivuser_role_change_to" lineno="44"> +<summary> +Change from the generic user role. +</summary> +<desc> +<p> +Change from the generic user role to +the specified role. +</p> +<p> +This is an interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +</layer> +<layer name="services"> +<summary> + Policy modules for system services, like cron, and network services, + like sshd. +</summary> +<module name="postgresql" filename="policy/modules/services/postgresql.if"> +<summary>PostgreSQL relational database</summary> +<interface name="postgresql_role" lineno="18"> +<summary> +Role access for SE-PostgreSQL. +</summary> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the user domain. +</summary> +</param> +</interface> +<interface name="postgresql_loadable_module" lineno="103"> +<summary> +Marks as a SE-PostgreSQL loadable shared library module +</summary> +<param name="type"> +<summary> +Type marked as a database object type. +</summary> +</param> +</interface> +<interface name="postgresql_database_object" lineno="121"> +<summary> +Marks as a SE-PostgreSQL database object type +</summary> +<param name="type"> +<summary> +Type marked as a database object type. +</summary> +</param> +</interface> +<interface name="postgresql_schema_object" lineno="139"> +<summary> +Marks as a SE-PostgreSQL schema object type +</summary> +<param name="type"> +<summary> +Type marked as a schema object type. +</summary> +</param> +</interface> +<interface name="postgresql_table_object" lineno="157"> +<summary> +Marks as a SE-PostgreSQL table/column/tuple object type +</summary> +<param name="type"> +<summary> +Type marked as a table/column/tuple object type. +</summary> +</param> +</interface> +<interface name="postgresql_system_table_object" lineno="175"> +<summary> +Marks as a SE-PostgreSQL system table/column/tuple object type +</summary> +<param name="type"> +<summary> +Type marked as a table/column/tuple object type. +</summary> +</param> +</interface> +<interface name="postgresql_sequence_object" lineno="194"> +<summary> +Marks as a SE-PostgreSQL sequence type +</summary> +<param name="type"> +<summary> +Type marked as a sequence type. +</summary> +</param> +</interface> +<interface name="postgresql_view_object" lineno="212"> +<summary> +Marks as a SE-PostgreSQL view object type +</summary> +<param name="type"> +<summary> +Type marked as a view object type. +</summary> +</param> +</interface> +<interface name="postgresql_procedure_object" lineno="230"> +<summary> +Marks as a SE-PostgreSQL procedure object type +</summary> +<param name="type"> +<summary> +Type marked as a database object type. +</summary> +</param> +</interface> +<interface name="postgresql_language_object" lineno="248"> +<summary> +Marks as a SE-PostgreSQL procedural language object type +</summary> +<param name="type"> +<summary> +Type marked as a procedural language object type. +</summary> +</param> +</interface> +<interface name="postgresql_blob_object" lineno="266"> +<summary> +Marks as a SE-PostgreSQL binary large object type +</summary> +<param name="type"> +<summary> +Type marked as a database binary large object type. +</summary> +</param> +</interface> +<interface name="postgresql_search_db" lineno="284"> +<summary> +Allow the specified domain to search postgresql's database directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_manage_db" lineno="301"> +<summary> +Allow the specified domain to manage postgresql's database. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_domtrans" lineno="321"> +<summary> +Execute postgresql in the postgresql domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="postgresql_signal" lineno="339"> +<summary> +Allow domain to signal postgresql +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_read_config" lineno="357"> +<summary> +Allow the specified domain to read postgresql's etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="postgresql_tcp_connect" lineno="378"> +<summary> +Allow the specified domain to connect to postgresql with a tcp socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_stream_connect" lineno="400"> +<summary> +Allow the specified domain to connect to postgresql with a unix socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="postgresql_unpriv_client" lineno="423"> +<summary> +Allow the specified domain unprivileged accesses to unifined database objects +managed by SE-PostgreSQL, +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_unconfined" lineno="508"> +<summary> +Allow the specified domain unconfined accesses to any database objects +managed by SE-PostgreSQL, +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="postgresql_admin" lineno="532"> +<summary> +All of the rules required to administrate an postgresql environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be allowed to manage the postgresql domain. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="sepgsql_enable_users_ddl" dftval="true"> +<desc> +<p> +Allow unprived users to execute DDL statement +</p> +</desc> +</tunable> +<tunable name="sepgsql_unconfined_dbadm" dftval="true"> +<desc> +<p> +Allow database admins to execute DML statement +</p> +</desc> +</tunable> +</module> +<module name="ssh" filename="policy/modules/services/ssh.if"> +<summary>Secure shell client and server policy.</summary> +<template name="ssh_basic_client_template" lineno="34"> +<summary> +Basic SSH client template. +</summary> +<desc> +<p> +This template creates a derived domains which are used +for ssh client sessions. A derived +type is also created to protect the user ssh keys. +</p> +<p> +This template was added for NX. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="user_domain"> +<summary> +The type of the domain. +</summary> +</param> +<param name="user_role"> +<summary> +The role associated with the user domain. +</summary> +</param> +</template> +<template name="ssh_server_template" lineno="171"> +<summary> +The template to define a ssh server. +</summary> +<desc> +<p> +This template creates a domains to be used for +creating a ssh server. This is typically done +to have multiple ssh servers of different sensitivities, +such as for an internal network-facing ssh server, and +a external network-facing ssh server. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the server domain (e.g., sshd +is the prefix for sshd_t). +</summary> +</param> +</template> +<template name="ssh_role_template" lineno="296"> +<summary> +Role access for ssh +</summary> +<param name="role_prefix"> +<summary> +The prefix of the role (e.g., user +is the prefix for user_r). +</summary> +</param> +<param name="role"> +<summary> +Role allowed access +</summary> +</param> +<param name="domain"> +<summary> +User domain for the role +</summary> +</param> +</template> +<interface name="ssh_sigchld" lineno="440"> +<summary> +Send a SIGCHLD signal to the ssh server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_signal" lineno="458"> +<summary> +Send a generic signal to the ssh server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_signull" lineno="476"> +<summary> +Send a null signal to sshd processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_read_pipes" lineno="494"> +<summary> +Read a ssh server unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_rw_pipes" lineno="511"> +<summary> +Read and write a ssh server unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_rw_stream_sockets" lineno="529"> +<summary> +Read and write ssh server unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_rw_tcp_sockets" lineno="547"> +<summary> +Read and write ssh server TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_dontaudit_rw_tcp_sockets" lineno="566"> +<summary> +Do not audit attempts to read and write +ssh server TCP sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="ssh_tcp_connect" lineno="584"> +<summary> +Connect to SSH daemons over TCP sockets. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_domtrans" lineno="598"> +<summary> +Execute the ssh daemon sshd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ssh_exec" lineno="616"> +<summary> +Execute the ssh client in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_setattr_key_files" lineno="635"> +<summary> +Set the attributes of sshd key files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_agent_exec" lineno="654"> +<summary> +Execute the ssh agent client in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_read_user_home_files" lineno="673"> +<summary> +Read ssh home directory content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_domtrans_keygen" lineno="694"> +<summary> +Execute the ssh key generator in the ssh keygen domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ssh_dontaudit_read_server_keys" lineno="712"> +<summary> +Read ssh server keys +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="ssh_manage_home_files" lineno="730"> +<summary> +Manage ssh home directory content +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ssh_delete_tmp" lineno="749"> +<summary> +Delete from the ssh temp files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_ssh_keysign" dftval="false"> +<desc> +<p> +allow host key based authentication +</p> +</desc> +</tunable> +<tunable name="ssh_sysadm_login" dftval="false"> +<desc> +<p> +Allow ssh logins as sysadm_r:sysadm_t +</p> +</desc> +</tunable> +</module> +<module name="xserver" filename="policy/modules/services/xserver.if"> +<summary>X Windows Server</summary> +<interface name="xserver_restricted_role" lineno="19"> +<summary> +Rules required for using the X Windows server +and environment, for restricted users. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_role" lineno="133"> +<summary> +Rules required for using the X Windows server +and environment. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_ro_session" lineno="185"> +<summary> +Create sessions on the X server, with read-only +access to the X server shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="tmpfs_type"> +<summary> +The type of the domain SYSV tmpfs files. +</summary> +</param> +</interface> +<interface name="xserver_rw_session" lineno="225"> +<summary> +Create sessions on the X server, with read and write +access to the X server shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="tmpfs_type"> +<summary> +The type of the domain SYSV tmpfs files. +</summary> +</param> +</interface> +<interface name="xserver_non_drawing_client" lineno="245"> +<summary> +Create non-drawing client sessions on an X server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_user_client" lineno="282"> +<summary> +Create full client sessions +on a user X server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="tmpfs_type"> +<summary> +The type of the domain SYSV tmpfs files. +</summary> +</param> +</interface> +<template name="xserver_common_x_domain_template" lineno="343"> +<summary> +Interface to provide X object permissions on a given X server to +an X client domain. Provides the minimal set required by a basic +X client application. +</summary> +<param name="prefix"> +<summary> +The prefix of the X client domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="domain"> +<summary> +Client domain allowed access. +</summary> +</param> +</template> +<template name="xserver_object_types_template" lineno="403"> +<summary> +Template for creating the set of types used +in an X windows domain. +</summary> +<param name="prefix"> +<summary> +The prefix of the X client domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="xserver_user_x_domain_template" lineno="445"> +<summary> +Interface to provide X object permissions on a given X server to +an X client domain. Provides the minimal set required by a basic +X client application. +</summary> +<param name="prefix"> +<summary> +The prefix of the X client domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<param name="domain"> +<summary> +Client domain allowed access. +</summary> +</param> +<param name="tmpfs_type"> +<summary> +The type of the domain SYSV tmpfs files. +</summary> +</param> +</template> +<interface name="xserver_use_user_fonts" lineno="512"> +<summary> +Read user fonts, user font configuration, +and manage the user font cache. +</summary> +<desc> +<p> +Read user fonts, user font configuration, +and manage the user font cache. +</p> +<p> +This is a templated interface, and should only +be called from a per-userdomain template. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_domtrans_xauth" lineno="542"> +<summary> +Transition to the Xauthority domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="xserver_user_home_dir_filetrans_user_xauth" lineno="560"> +<summary> +Create a Xauthority file in the user home directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_use_all_users_fonts" lineno="579"> +<summary> +Read all users fonts, user font configurations, +and manage all users font caches. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_user_xauth" lineno="594"> +<summary> +Read all users .Xauthority. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_setattr_console_pipes" lineno="613"> +<summary> +Set the attributes of the X windows console named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_rw_console" lineno="631"> +<summary> +Read and write the X windows console named pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_use_xdm_fds" lineno="649"> +<summary> +Use file descriptors for xdm. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_use_xdm_fds" lineno="668"> +<summary> +Do not audit attempts to inherit +XDM file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_rw_xdm_pipes" lineno="686"> +<summary> +Read and write XDM unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_rw_xdm_pipes" lineno="705"> +<summary> +Do not audit attempts to read and write +XDM unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_stream_connect_xdm" lineno="725"> +<summary> +Connect to XDM over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_xdm_rw_config" lineno="744"> +<summary> +Read xdm-writable configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_setattr_xdm_tmp_dirs" lineno="763"> +<summary> +Set the attributes of XDM temporary directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_create_xdm_tmp_sockets" lineno="782"> +<summary> +Create a named socket in a XDM +temporary directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_xdm_pid" lineno="802"> +<summary> +Read XDM pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_xdm_lib_files" lineno="821"> +<summary> +Read XDM var lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_xsession_entry_type" lineno="839"> +<summary> +Make an X session script an entrypoint for the specified domain. +</summary> +<param name="domain"> +<summary> +The domain for which the shell is an entrypoint. +</summary> +</param> +</interface> +<interface name="xserver_xsession_spec_domtrans" lineno="876"> +<summary> +Execute an X session in the target domain. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<desc> +<p> +Execute an Xsession in the target domain. This +is an explicit transition, requiring the +caller to use setexeccon(). +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the shell process. +</summary> +</param> +</interface> +<interface name="xserver_getattr_log" lineno="894"> +<summary> +Get the attributes of X server logs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_write_log" lineno="914"> +<summary> +Do not audit attempts to write the X server +log files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_delete_log" lineno="932"> +<summary> +Delete X server log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_xkb_libs" lineno="953"> +<summary> +Read X keyboard extension libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_xdm_tmp_files" lineno="974"> +<summary> +Read xdm temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_read_xdm_tmp_files" lineno="993"> +<summary> +Do not audit attempts to read xdm temporary files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_rw_xdm_tmp_files" lineno="1012"> +<summary> +Read write xdm temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_manage_xdm_tmp_files" lineno="1031"> +<summary> +Create, read, write, and delete xdm temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_getattr_xdm_tmp_sockets" lineno="1050"> +<summary> +Do not audit attempts to get the attributes of +xdm temporary named sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_domtrans" lineno="1068"> +<summary> +Execute the X server in the X server domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="xserver_signal" lineno="1087"> +<summary> +Signal X servers +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_kill" lineno="1105"> +<summary> +Kill X servers +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_rw_shm" lineno="1124"> +<summary> +Read and write X server Sys V Shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_rw_tcp_sockets" lineno="1143"> +<summary> +Do not audit attempts to read and write to +X server sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_dontaudit_rw_stream_sockets" lineno="1162"> +<summary> +Do not audit attempts to read and write X server +unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="xserver_stream_connect" lineno="1181"> +<summary> +Connect to the X server over a unix domain +stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_read_tmp_files" lineno="1200"> +<summary> +Read X server temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_manage_core_devices" lineno="1221"> +<summary> +Interface to provide X object permissions on a given X server to +an X client domain. Gives the domain permission to read the +virtual core keyboard and virtual core pointer devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="xserver_unconfined" lineno="1244"> +<summary> +Interface to provide X object permissions on a given X server to +an X client domain. Gives the domain complete control over the +display. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_write_xshm" dftval="false"> +<desc> +<p> +Allows clients to write to the X server shared +memory segments. +</p> +</desc> +</tunable> +<tunable name="xdm_sysadm_login" dftval="false"> +<desc> +<p> +Allow xdm logins as sysadm +</p> +</desc> +</tunable> +<tunable name="xserver_object_manager" dftval="false"> +<desc> +<p> +Support X userspace object manager +</p> +</desc> +</tunable> +</module> +</layer> +<layer name="system"> +<summary> + Policy modules for system functions from init to multi-user login. +</summary> +<module name="application" filename="policy/modules/system/application.if"> +<summary>Policy for user executable applications.</summary> +<interface name="application_type" lineno="13"> +<summary> +Make the specified type usable as an application domain. +</summary> +<param name="type"> +<summary> +Type to be used as a domain type. +</summary> +</param> +</interface> +<interface name="application_executable_file" lineno="36"> +<summary> +Make the specified type usable for files +that are exectuables, such as binary programs. +This does not include shared libraries. +</summary> +<param name="type"> +<summary> +Type to be used for files. +</summary> +</param> +</interface> +<interface name="application_exec" lineno="56"> +<summary> +Execute application executables in the caller domain. +</summary> +<param name="type"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="application_exec_all" lineno="75"> +<summary> +Execute all executable files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="application_domain" lineno="110"> +<summary> +Create a domain for applications. +</summary> +<desc> +<p> +Create a domain for applications. Typically these are +programs that are run interactively. +</p> +<p> +The types will be made usable as a domain and file, making +calls to domain_type() and files_type() redundant. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as an application domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="application_signull" lineno="126"> +<summary> +Send null signals to all application domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="application_dontaudit_signull" lineno="145"> +<summary> +Do not audit attempts to send null signals +to all application domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="application_signal" lineno="163"> +<summary> +Send general signals to all application domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="application_dontaudit_signal" lineno="182"> +<summary> +Do not audit attempts to send general signals +to all application domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="application_dontaudit_sigkill" lineno="201"> +<summary> +Do not audit attempts to send kill signals +to all application domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +</module> +<module name="authlogin" filename="policy/modules/system/authlogin.if"> +<summary>Common policy for authentication and user login.</summary> +<interface name="auth_role" lineno="18"> +<summary> +Role access for password authentication. +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_use_pam" lineno="43"> +<summary> +Use PAM for authentication. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_login_pgm_domain" lineno="95"> +<summary> +Make the specified domain used for a login program. +</summary> +<param name="domain"> +<summary> +Domain type used for a login program domain. +</summary> +</param> +</interface> +<interface name="auth_login_entry_type" lineno="173"> +<summary> +Use the login program as an entry point program. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_file" lineno="203"> +<summary> +Make the specified type usable as a +login file. +</summary> +<desc> +<p> +Make the specified type usable as a login file, +This type has restricted modification capabilities when used with +other interfaces that permit files_type access. +The default type has properties similar to that of the shadow file. +This will also make the type usable as a security file, making +calls to files_security_file() redundant. +</p> +</desc> +<param name="type"> +<summary> +Type to be used as a login file. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="auth_domtrans_login_program" lineno="227"> +<summary> +Execute a login_program in the target domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the login_program process. +</summary> +</param> +</interface> +<interface name="auth_ranged_domtrans_login_program" lineno="257"> +<summary> +Execute a login_program in the target domain, +with a range transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +The type of the login_program process. +</summary> +</param> +<param name="range"> +<summary> +Range of the login program. +</summary> +</param> +</interface> +<interface name="auth_search_cache" lineno="283"> +<summary> +Search authentication cache +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_cache" lineno="301"> +<summary> +Read authentication cache +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_rw_cache" lineno="319"> +<summary> +Read/Write authentication cache +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_cache" lineno="337"> +<summary> +Manage authentication cache +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_var_filetrans_cache" lineno="356"> +<summary> +Automatic transition from cache_t to cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_domtrans_chk_passwd" lineno="374"> +<summary> +Run unix_chkpwd to check a password. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_domtrans_chkpwd" lineno="422"> +<summary> +Run unix_chkpwd to check a password. +Stripped down version to be called within boolean +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_run_chk_passwd" lineno="448"> +<summary> +Execute chkpwd programs in the chkpwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the chkpwd domain. +</summary> +</param> +</interface> +<interface name="auth_domtrans_upd_passwd" lineno="467"> +<summary> +Execute a domain transition to run unix_update. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_run_upd_passwd" lineno="492"> +<summary> +Execute updpwd programs in the updpwd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the updpwd domain. +</summary> +</param> +</interface> +<interface name="auth_getattr_shadow" lineno="511"> +<summary> +Get the attributes of the shadow passwords file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_dontaudit_getattr_shadow" lineno="531"> +<summary> +Do not audit attempts to get the attributes +of the shadow passwords file. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="auth_read_shadow" lineno="553"> +<summary> +Read the shadow passwords file (/etc/shadow) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_can_read_shadow_passwords" lineno="577"> +<summary> +Pass shadow assertion for reading. +</summary> +<desc> +<p> +Pass shadow assertion for reading. +This should only be used with +auth_tunable_read_shadow(), and +only exists because typeattribute +does not work in conditionals. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_tunable_read_shadow" lineno="603"> +<summary> +Read the shadow password file. +</summary> +<desc> +<p> +Read the shadow password file. This +should only be used in a conditional; +it does not pass the reading shadow +assertion. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_dontaudit_read_shadow" lineno="623"> +<summary> +Do not audit attempts to read the shadow +password file (/etc/shadow). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="auth_rw_shadow" lineno="641"> +<summary> +Read and write the shadow password file (/etc/shadow). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_shadow" lineno="663"> +<summary> +Create, read, write, and delete the shadow +password file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_etc_filetrans_shadow" lineno="683"> +<summary> +Automatic transition from etc to shadow. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_relabelto_shadow" lineno="702"> +<summary> +Relabel to the shadow +password file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_relabel_shadow" lineno="724"> +<summary> +Relabel from and to the shadow +password file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_append_faillog" lineno="745"> +<summary> +Append to the login failure log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_rw_faillog" lineno="764"> +<summary> +Read and write the login failure log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_lastlog" lineno="784"> +<summary> +Read the last logins log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auth_append_lastlog" lineno="803"> +<summary> +Append only to the last logins log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_rw_lastlog" lineno="822"> +<summary> +Read and write to the last logins log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_domtrans_pam" lineno="841"> +<summary> +Execute pam programs in the pam domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_signal_pam" lineno="859"> +<summary> +Send generic signals to pam processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_run_pam" lineno="882"> +<summary> +Execute pam programs in the PAM domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the PAM domain. +</summary> +</param> +</interface> +<interface name="auth_exec_pam" lineno="901"> +<summary> +Execute the pam program. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_var_auth" lineno="920"> +<summary> +Read var auth files. Used by various other applications +and pam applets etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_rw_var_auth" lineno="940"> +<summary> +Read and write var auth files. Used by various other applications +and pam applets etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_var_auth" lineno="960"> +<summary> +Manage var auth files. Used by various other applications +and pam applets etc. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_pam_pid" lineno="981"> +<summary> +Read PAM PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_dontaudit_read_pam_pid" lineno="1001"> +<summary> +Do not audit attemps to read PAM PID files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="auth_delete_pam_pid" lineno="1019"> +<summary> +Delete pam PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_pam_pid" lineno="1039"> +<summary> +Manage pam PID files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_domtrans_pam_console" lineno="1059"> +<summary> +Execute pam_console with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_search_pam_console_data" lineno="1078"> +<summary> +Search the contents of the +pam_console data directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_list_pam_console_data" lineno="1098"> +<summary> +List the contents of the pam_console +data directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_relabel_pam_console_data_dirs" lineno="1117"> +<summary> +Relabel pam_console data directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_pam_console_data" lineno="1135"> +<summary> +Read pam_console data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_pam_console_data" lineno="1156"> +<summary> +Create, read, write, and delete +pam_console data files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_delete_pam_console_data" lineno="1176"> +<summary> +Delete pam_console data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_all_dirs_except_auth_files" lineno="1203"> +<summary> +Read all directories on the filesystem, except +login files and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_read_all_dirs_except_shadow" lineno="1228"> +<summary> +Read all directories on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_read_all_files_except_auth_files" lineno="1251"> +<summary> +Read all files on the filesystem, except +login files and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auth_read_all_files_except_shadow" lineno="1277"> +<summary> +Read all files on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auth_read_all_symlinks_except_auth_files" lineno="1299"> +<summary> +Read all symbolic links on the filesystem, except +login files and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_read_all_symlinks_except_shadow" lineno="1324"> +<summary> +Read all symbolic links on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_relabel_all_files_except_auth_files" lineno="1346"> +<summary> +Relabel all files on the filesystem, except +login files and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_relabel_all_files_except_shadow" lineno="1371"> +<summary> +Relabel all files on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_rw_all_files_except_auth_files" lineno="1393"> +<summary> +Read and write all files on the filesystem, except +login files and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_rw_all_files_except_shadow" lineno="1418"> +<summary> +Read and write all files on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_manage_all_files_except_auth_files" lineno="1440"> +<summary> +Manage all files on the filesystem, except +login files passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_manage_all_files_except_shadow" lineno="1465"> +<summary> +Manage all files on the filesystem, except +the shadow passwords and listed exceptions. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="exception_types" optional="true"> +<summary> +The types to be excluded. Each type or attribute +must be negated by the caller. +</summary> +</param> +</interface> +<interface name="auth_domtrans_utempter" lineno="1480"> +<summary> +Execute utempter programs in the utempter domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="auth_run_utempter" lineno="1503"> +<summary> +Execute utempter programs in the utempter domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the utempter domain. +</summary> +</param> +</interface> +<interface name="auth_dontaudit_exec_utempter" lineno="1522"> +<summary> +Do not audit attemps to execute utempter executable. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="auth_setattr_login_records" lineno="1540"> +<summary> +Set the attributes of login record files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_read_login_records" lineno="1560"> +<summary> +Read login records files (/var/log/wtmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auth_dontaudit_read_login_records" lineno="1581"> +<summary> +Do not audit attempts to read login records +files (/var/log/wtmp). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="auth_dontaudit_write_login_records" lineno="1600"> +<summary> +Do not audit attempts to write to +login records files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="auth_append_login_records" lineno="1618"> +<summary> +Append to login records (wtmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_write_login_records" lineno="1637"> +<summary> +Write to login records (wtmp). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_rw_login_records" lineno="1655"> +<summary> +Read and write login records. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_log_filetrans_login_records" lineno="1675"> +<summary> +Create a login records in the log directory +using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_manage_login_records" lineno="1694"> +<summary> +Create, read, write, and delete login +records files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_relabel_login_records" lineno="1713"> +<summary> +Relabel login record files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="auth_use_nsswitch" lineno="1741"> +<summary> +Use nsswitch to look up user, password, group, or +host information. +</summary> +<desc> +<p> +Allow the specified domain to look up user, password, +group, or host information using the name service. +The most common use of this interface is for services +that do host name resolution (usually DNS resolution). +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="auth_unconfined" lineno="1812"> +<summary> +Unconfined access to the authlogin module. +</summary> +<desc> +<p> +Unconfined access to the authlogin module. +</p> +<p> +Currently, this only allows assertions for +the shadow passwords file (/etc/shadow) to +be passed. No access is granted yet. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="clock" filename="policy/modules/system/clock.if"> +<summary>Policy for reading and setting the hardware clock.</summary> +<interface name="clock_domtrans" lineno="13"> +<summary> +Execute hwclock in the clock domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="clock_run" lineno="38"> +<summary> +Execute hwclock in the clock domain, and +allow the specified role the hwclock domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="clock_exec" lineno="57"> +<summary> +Execute hwclock in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="clock_dontaudit_write_adjtime" lineno="75"> +<summary> +Do not audit attempts to write clock drift adjustments. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="clock_rw_adjtime" lineno="93"> +<summary> +Read and write clock drift adjustments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="fstools" filename="policy/modules/system/fstools.if"> +<summary>Tools for filesystem management, such as mkfs and fsck.</summary> +<interface name="fstools_domtrans" lineno="13"> +<summary> +Execute fs tools in the fstools domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="fstools_run" lineno="39"> +<summary> +Execute fs tools in the fstools domain, and +allow the specified role the fs tools domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="fstools_exec" lineno="58"> +<summary> +Execute fsadm in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fstools_signal" lineno="76"> +<summary> +Send signal to fsadm process +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fstools_read_pipes" lineno="94"> +<summary> +Read fstools unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fstools_relabelto_entry_files" lineno="113"> +<summary> +Relabel a file to the type used by the +filesystem tools programs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fstools_manage_entry_files" lineno="132"> +<summary> +Create, read, write, and delete a file used by the +filesystem tools programs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="fstools_getattr_swap_files" lineno="150"> +<summary> +Getattr swapfile +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="getty" filename="policy/modules/system/getty.if"> +<summary>Policy for getty.</summary> +<interface name="getty_domtrans" lineno="13"> +<summary> +Execute gettys in the getty domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="getty_use_fds" lineno="32"> +<summary> +Inherit and use getty file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="getty_read_log" lineno="51"> +<summary> +Allow process to read getty log file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="getty_read_config" lineno="71"> +<summary> +Allow process to read getty config file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="getty_rw_config" lineno="91"> +<summary> +Allow process to edit getty config file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="hostname" filename="policy/modules/system/hostname.if"> +<summary>Policy for changing the system host name.</summary> +<interface name="hostname_domtrans" lineno="13"> +<summary> +Execute hostname in the hostname domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hostname_run" lineno="38"> +<summary> +Execute hostname in the hostname domain, and +allow the specified role the hostname domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="hostname_exec" lineno="58"> +<summary> +Execute hostname in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="hotplug" filename="policy/modules/system/hotplug.if"> +<summary> +Policy for hotplug system, for supporting the +connection and disconnection of devices at runtime. +</summary> +<interface name="hotplug_domtrans" lineno="16"> +<summary> +Execute hotplug with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="hotplug_exec" lineno="35"> +<summary> +Execute hotplug in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hotplug_use_fds" lineno="54"> +<summary> +Inherit and use hotplug file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hotplug_dontaudit_use_fds" lineno="73"> +<summary> +Do not audit attempts to inherit +hotplug file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hotplug_dontaudit_search_config" lineno="92"> +<summary> +Do not audit attempts to search the +hotplug configuration directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="hotplug_getattr_config_dirs" lineno="110"> +<summary> +Get the attributes of the hotplug configuration directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hotplug_search_config" lineno="128"> +<summary> +Search the hotplug configuration directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="hotplug_read_config" lineno="147"> +<summary> +Read the configuration files for hotplug. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="hotplug_search_pids" lineno="168"> +<summary> +Search the hotplug PIDs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="init" filename="policy/modules/system/init.if"> +<summary>System initialization programs (init and init scripts).</summary> +<interface name="init_script_file" lineno="32"> +<summary> +Create a file type used for init scripts. +</summary> +<desc> +<p> +Create a file type used for init scripts. It can not be +used in conjunction with init_script_domain(). These +script files are typically stored in the /etc/init.d directory. +</p> +<p> +Typically this is used to constrain what services an +admin can start/stop. For example, a policy writer may want +to constrain a web administrator to only being able to +restart the web server, not other services. This special type +will help address that goal. +</p> +<p> +This also makes the type usable for files; thus an +explicit call to files_type() is redundant. +</p> +</desc> +<param name="script_file"> +<summary> +Type to be used for a script file. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="init_script_domain" lineno="67"> +<summary> +Create a domain used for init scripts. +</summary> +<desc> +<p> +Create a domain used for init scripts. +Can not be used in conjunction with +init_script_file(). +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as an init script domain. +</summary> +</param> +<param name="script_file"> +<summary> +Type of the script file used as an entry point to this domain. +</summary> +</param> +</interface> +<interface name="init_domain" lineno="97"> +<summary> +Create a domain which can be started by init. +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +</interface> +<interface name="init_ranged_domain" lineno="140"> +<summary> +Create a domain which can be started by init, +with a range transition. +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<param name="range"> +<summary> +Range for the domain. +</summary> +</param> +</interface> +<interface name="init_daemon_domain" lineno="192"> +<summary> +Create a domain for long running processes +(daemons/services) which are started by init scripts. +</summary> +<desc> +<p> +Create a domain for long running processes (daemons/services) +which are started by init scripts. Short running processes +should use the init_system_domain() interface instead. +Typically all long running processes started by an init +script (usually in /etc/init.d) will need to use this +interface. +</p> +<p> +The types will be made usable as a domain and file, making +calls to domain_type() and files_type() redundant. +</p> +<p> +If the process must also run in a specific MLS/MCS level, +the init_ranged_daemon_domain() should be used instead. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as a daemon domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="init_ranged_daemon_domain" lineno="283"> +<summary> +Create a domain for long running processes +(daemons/services) which are started by init scripts, +running at a specified MLS/MCS range. +</summary> +<desc> +<p> +Create a domain for long running processes (daemons/services) +which are started by init scripts, running at a specified +MLS/MCS range. Short running processes +should use the init_ranged_system_domain() interface instead. +Typically all long running processes started by an init +script (usually in /etc/init.d) will need to use this +interface if they need to run in a specific MLS/MCS range. +</p> +<p> +The types will be made usable as a domain and file, making +calls to domain_type() and files_type() redundant. +</p> +<p> +If the policy build option TYPE is standard (MLS and MCS disabled), +this interface has the same behavior as init_daemon_domain(). +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as a daemon domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<param name="range"> +<summary> +MLS/MCS range for the domain. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="init_system_domain" lineno="337"> +<summary> +Create a domain for short running processes +which are started by init scripts. +</summary> +<desc> +<p> +Create a domain for short running processes +which are started by init scripts. These are generally applications that +are used to initialize the system during boot. +Long running processes, such as daemons/services +should use the init_daemon_domain() interface instead. +Typically all short running processes started by an init +script (usually in /etc/init.d) will need to use this +interface. +</p> +<p> +The types will be made usable as a domain and file, making +calls to domain_type() and files_type() redundant. +</p> +<p> +If the process must also run in a specific MLS/MCS level, +the init_ranged_system_domain() should be used instead. +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as a system domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="init_ranged_system_domain" lineno="401"> +<summary> +Create a domain for short running processes +which are started by init scripts. +</summary> +<desc> +<p> +Create a domain for long running processes (daemons/services) +which are started by init scripts. +These are generally applications that +are used to initialize the system during boot. +Long running processes +should use the init_ranged_system_domain() interface instead. +Typically all short running processes started by an init +script (usually in /etc/init.d) will need to use this +interface if they need to run in a specific MLS/MCS range. +</p> +<p> +The types will be made usable as a domain and file, making +calls to domain_type() and files_type() redundant. +</p> +<p> +If the policy build option TYPE is standard (MLS and MCS disabled), +this interface has the same behavior as init_system_domain(). +</p> +</desc> +<param name="domain"> +<summary> +Type to be used as a system domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +<param name="range"> +<summary> +Range for the domain. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="init_domtrans" lineno="428"> +<summary> +Execute init (/sbin/init) with a domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="init_exec" lineno="447"> +<summary> +Execute the init program in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="init_exec_rc" lineno="477"> +<summary> +Execute the rc application in the caller domain. +</summary> +<desc> +<p> +This is only applicable to Gentoo or distributions that use the OpenRC +init system. +</p> +<p> +The OpenRC /sbin/rc binary is used for both init scripts as well as +management applications and tools. When used for management purposes, +calling /sbin/rc should never cause a transition to initrc_t. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_getpgid" lineno="496"> +<summary> +Get the process group of init. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_signull" lineno="514"> +<summary> +Send init a null signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_sigchld" lineno="532"> +<summary> +Send init a SIGCHLD signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_stream_connect" lineno="550"> +<summary> +Connect to init with a unix socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_use_fds" lineno="608"> +<summary> +Inherit and use file descriptors from init. +</summary> +<desc> +<p> +Allow the specified domain to inherit file +descriptors from the init program (process ID 1). +Typically the only file descriptors to be +inherited from init are for the console. +This does not allow the domain any access to +the object to which the file descriptors references. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>init_dontaudit_use_fds()</li> +<li>term_dontaudit_use_console()</li> +<li>term_use_console()</li> +</ul> +<p> +Example usage: +</p> +<p> +init_use_fds(mydomain_t) +term_use_console(mydomain_t) +</p> +<p> +Normally, processes that can inherit these file +descriptors (usually services) write messages to the +system log instead of writing to the console. +Therefore, in many cases, this access should +dontaudited instead. +</p> +<p> +Example dontaudit usage: +</p> +<p> +init_dontaudit_use_fds(mydomain_t) +term_dontaudit_use_console(mydomain_t) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="1"/> +</interface> +<interface name="init_dontaudit_use_fds" lineno="627"> +<summary> +Do not audit attempts to inherit file +descriptors from init. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_udp_send" lineno="645"> +<summary> +Send UDP network traffic to init. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_getattr_initctl" lineno="659"> +<summary> +Get the attributes of initctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_getattr_initctl" lineno="678"> +<summary> +Do not audit attempts to get the +attributes of initctl. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_write_initctl" lineno="696"> +<summary> +Write to initctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_telinit" lineno="716"> +<summary> +Use telinit (Read and write initctl). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="init_rw_initctl" lineno="747"> +<summary> +Read and write initctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_rw_initctl" lineno="767"> +<summary> +Do not audit attempts to read and +write initctl. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_script_file_entry_type" lineno="786"> +<summary> +Make init scripts an entry point for +the specified domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_spec_domtrans_script" lineno="804"> +<summary> +Execute init scripts with a specified domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="init_domtrans_script" lineno="839"> +<summary> +Execute init scripts with an automatic domain transition. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="init_script_file_domtrans" lineno="881"> +<summary> +Execute a init script in a specified domain. +</summary> +<desc> +<p> +Execute a init script in a specified domain. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +Domain to transition to. +</summary> +</param> +</interface> +<interface name="init_labeled_script_domtrans" lineno="906"> +<summary> +Transition to the init script domain +on a specified labeled init script. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="init_script_file"> +<summary> +Labeled init script file. +</summary> +</param> +</interface> +<interface name="init_all_labeled_script_domtrans" lineno="926"> +<summary> +Transition to the init script domain +for all labeled init script types +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="init_run_daemon" lineno="956"> +<summary> +Start and stop daemon programs directly. +</summary> +<desc> +<p> +Start and stop daemon programs directly +in the traditional "/etc/init.d/daemon start" +style, and do not require run_init. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role to be performing this action. +</summary> +</param> +</interface> +<interface name="init_read_state" lineno="976"> +<summary> +Read the process state (/proc/pid) of init. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_ptrace" lineno="997"> +<summary> +Ptrace init +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="init_write_script_pipes" lineno="1015"> +<summary> +Write an init script unnamed pipe. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_getattr_script_files" lineno="1033"> +<summary> +Get the attribute of init script entrypoint files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_script_files" lineno="1052"> +<summary> +Read init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_exec_script_files" lineno="1071"> +<summary> +Execute init scripts in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_getattr_all_script_files" lineno="1090"> +<summary> +Get the attribute of all init script entrypoint files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_all_script_files" lineno="1109"> +<summary> +Read all init script files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_read_all_script_files" lineno="1128"> +<summary> +Dontaudit read all init script files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_exec_all_script_files" lineno="1146"> +<summary> +Execute all init scripts in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_script_state" lineno="1165"> +<summary> +Read the process state (/proc/pid) of the init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_use_script_fds" lineno="1189"> +<summary> +Inherit and use init script file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_use_script_fds" lineno="1208"> +<summary> +Do not audit attempts to inherit +init script file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_search_script_keys" lineno="1226"> +<summary> +Search init script keys. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_getpgid_script" lineno="1244"> +<summary> +Get the process group ID of init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_sigchld_script" lineno="1262"> +<summary> +Send SIGCHLD signals to init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_signal_script" lineno="1280"> +<summary> +Send generic signals to init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_signull_script" lineno="1298"> +<summary> +Send null signals to init scripts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_rw_script_pipes" lineno="1316"> +<summary> +Read and write init script unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_udp_send_script" lineno="1334"> +<summary> +Send UDP network traffic to init scripts. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_stream_connect_script" lineno="1349"> +<summary> +Allow the specified domain to connect to +init scripts with a unix socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_rw_script_stream_sockets" lineno="1368"> +<summary> +Allow the specified domain to read/write to +init scripts with a unix domain stream sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_stream_connect_script" lineno="1387"> +<summary> +Dont audit the specified domain connecting to +init scripts with a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_dbus_send_script" lineno="1404"> +<summary> +Send messages to init scripts over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dbus_chat_script" lineno="1424"> +<summary> +Send and receive messages from +init scripts over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_use_script_ptys" lineno="1453"> +<summary> +Read and write the init script pty. +</summary> +<desc> +<p> +Read and write the init script pty. This +pty is generally opened by the open_init_pty +portion of the run_init program so that the +daemon does not require direct access to +the administrator terminal. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_use_script_ptys" lineno="1473"> +<summary> +Do not audit attempts to read and +write the init script pty. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_getattr_script_status_files" lineno="1492"> +<summary> +Get the attributes of init script +status files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_read_script_status_files" lineno="1511"> +<summary> +Do not audit attempts to read init script +status files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_read_script_tmp_files" lineno="1530"> +<summary> +Read init script temporary data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_rw_script_tmp_files" lineno="1549"> +<summary> +Read and write init script temporary data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_script_tmp_filetrans" lineno="1579"> +<summary> +Create files in a init script +temporary data directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object to be created +</summary> +</param> +<param name="object_class"> +<summary> +The object class. +</summary> +</param> +</interface> +<interface name="init_getattr_utmp" lineno="1598"> +<summary> +Get the attributes of init script process id files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_read_utmp" lineno="1616"> +<summary> +Read utmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_write_utmp" lineno="1635"> +<summary> +Do not audit attempts to write utmp. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_write_utmp" lineno="1653"> +<summary> +Write to utmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_lock_utmp" lineno="1673"> +<summary> +Do not audit attempts to lock +init script pid files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_rw_utmp" lineno="1691"> +<summary> +Read and write utmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_dontaudit_rw_utmp" lineno="1710"> +<summary> +Do not audit attempts to read and write utmp. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="init_manage_utmp" lineno="1728"> +<summary> +Create, read, write, and delete utmp. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_pid_filetrans_utmp" lineno="1748"> +<summary> +Create files in /var/run with the +utmp file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_tcp_recvfrom_all_daemons" lineno="1766"> +<summary> +Allow the specified domain to connect to daemon with a tcp socket +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="init_udp_recvfrom_all_daemons" lineno="1784"> +<summary> +Allow the specified domain to connect to daemon with a udp socket +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="init_upstart" dftval="false"> +<desc> +<p> +Enable support for upstart as the init program. +</p> +</desc> +</tunable> +</module> +<module name="ipsec" filename="policy/modules/system/ipsec.if"> +<summary>TCP/IP encryption</summary> +<interface name="ipsec_domtrans" lineno="13"> +<summary> +Execute ipsec in the ipsec domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ipsec_stream_connect" lineno="31"> +<summary> +Connect to IPSEC using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_domtrans_mgmt" lineno="50"> +<summary> +Execute ipsec in the ipsec mgmt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_stream_connect_racoon" lineno="68"> +<summary> +Connect to racoon using a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_getattr_key_sockets" lineno="87"> +<summary> +Get the attributes of an IPSEC key socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_exec_mgmt" lineno="105"> +<summary> +Execute the IPSEC management program in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_signal_mgmt" lineno="124"> +<summary> +Send ipsec mgmt a general signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_signull_mgmt" lineno="143"> +<summary> +Send ipsec mgmt a null signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_kill_mgmt" lineno="162"> +<summary> +Send ipsec mgmt a kill signal. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_mgmt_dbus_chat" lineno="181"> +<summary> +Send and receive messages from +ipsec-mgmt over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_read_config" lineno="202"> +<summary> +Read the IPSEC configuration +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ipsec_match_default_spd" lineno="221"> +<summary> +Match the default SPD entry. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_setcontext_default_spd" lineno="241"> +<summary> +Set the context of a SPD entry to +the default context. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_write_pid" lineno="259"> +<summary> +write the ipsec_var_run_t files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_manage_pid" lineno="278"> +<summary> +Create, read, write, and delete the IPSEC pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="ipsec_domtrans_racoon" lineno="297"> +<summary> +Execute racoon in the racoon domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ipsec_run_racoon" lineno="321"> +<summary> +Execute racoon and allow the specified role the domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="ipsec_domtrans_setkey" lineno="340"> +<summary> +Execute setkey in the setkey domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="ipsec_run_setkey" lineno="364"> +<summary> +Execute setkey and allow the specified role the domains. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access.. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="racoon_read_shadow" dftval="false"> +<desc> +<p> +Allow racoon to read shadow +</p> +</desc> +</tunable> +</module> +<module name="iptables" filename="policy/modules/system/iptables.if"> +<summary>Policy for iptables.</summary> +<interface name="iptables_domtrans" lineno="13"> +<summary> +Execute iptables in the iptables domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="iptables_run" lineno="43"> +<summary> +Execute iptables in the iptables domain, and +allow the specified role the iptables domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="iptables_exec" lineno="62"> +<summary> +Execute iptables in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_initrc_domtrans" lineno="81"> +<summary> +Execute iptables in the iptables domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="iptables_setattr_config" lineno="99"> +<summary> +Set the attributes of iptables config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_read_config" lineno="118"> +<summary> +Read iptables config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_etc_filetrans_config" lineno="139"> +<summary> +Create files in /etc with the type used for +the iptables config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="iptables_manage_config" lineno="157"> +<summary> +Manage iptables config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="libraries" filename="policy/modules/system/libraries.if"> +<summary>Policy for system libraries.</summary> +<interface name="libs_domtrans_ldconfig" lineno="13"> +<summary> +Execute ldconfig in the ldconfig domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="libs_run_ldconfig" lineno="38"> +<summary> +Execute ldconfig in the ldconfig domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the ldconfig domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="libs_exec_ldconfig" lineno="58"> +<summary> +Execute ldconfig in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="libs_use_ld_so" lineno="78"> +<summary> +Use the dynamic link/loader for automatic loading +of shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_legacy_use_ld_so" lineno="103"> +<summary> +Use the dynamic link/loader for automatic loading +of shared libraries with legacy support. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_exec_ld_so" lineno="123"> +<summary> +Execute the dynamic link/loader in the caller's domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_manage_ld_so" lineno="145"> +<summary> +Create, read, write, and delete the +dynamic link/loader. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_relabel_ld_so" lineno="165"> +<summary> +Relabel to and from the type used for +the dynamic link/loader. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_rw_ld_so_cache" lineno="184"> +<summary> +Modify the dynamic link/loader's cached listing +of shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_search_lib" lineno="203"> +<summary> +Search library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_dontaudit_write_lib_dirs" lineno="228"> +<summary> +Do not audit attempts to write to library directories. +</summary> +<desc> +<p> +Do not audit attempts to write to library directories. +Typically this is used to quiet attempts to recompile +python byte code. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="libs_manage_lib_dirs" lineno="246"> +<summary> +Create, read, write, and delete library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_dontaudit_setattr_lib_files" lineno="264"> +<summary> +dontaudit attempts to setattr on library files +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="libs_read_lib_files" lineno="283"> +<summary> +Read files in the library directories, such +as static libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_exec_lib_files" lineno="304"> +<summary> +Execute library scripts in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_use_lib_files" lineno="326"> +<summary> +Load and execute functions from generic +lib files as shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_manage_lib_files" lineno="343"> +<summary> +Create, read, write, and delete generic +files in library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_relabelto_lib_files" lineno="361"> +<summary> +Relabel files to the type used in library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_relabel_lib_files" lineno="381"> +<summary> +Relabel to and from the type used +for generic lib files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_delete_lib_symlinks" lineno="400"> +<summary> +Delete generic symlinks in library directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_manage_shared_libs" lineno="419"> +<summary> +Create, read, write, and delete shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_use_shared_libs" lineno="437"> +<summary> +Load and execute functions from shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_legacy_use_shared_libs" lineno="460"> +<summary> +Load and execute functions from shared libraries, +with legacy support. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="libs_relabel_shared_libs" lineno="481"> +<summary> +Relabel to and from the type used for +shared libraries. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lib_filetrans_shared_lib" lineno="505"> +<summary> +Create an object in lib directories, with +the shared libraries type using a type transition. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +<interface name="files_lib_filetrans_shared_lib" lineno="534"> +<summary> +Create an object in lib directories, with +the shared libraries type using a type transition. (Deprecated) +</summary> +<desc> +<p> +Create an object in lib directories, with +the shared libraries type using a type transition. (Deprecated) +</p> +<p> +lib_filetrans_shared_lib() should be used instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +</interface> +</module> +<module name="locallogin" filename="policy/modules/system/locallogin.if"> +<summary>Policy for local logins.</summary> +<interface name="locallogin_domtrans" lineno="13"> +<summary> +Execute local logins in the local login domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="locallogin_use_fds" lineno="35"> +<summary> +Allow processes to inherit local login file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="locallogin_dontaudit_use_fds" lineno="53"> +<summary> +Do not audit attempts to inherit local login file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="locallogin_signull" lineno="71"> +<summary> +Send a null signal to local login processes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="locallogin_search_keys" lineno="89"> +<summary> +Search for key. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="locallogin_link_keys" lineno="107"> +<summary> +Allow link to the local_login key ring. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="locallogin_domtrans_sulogin" lineno="125"> +<summary> +Execute local logins in the local login domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="logging" filename="policy/modules/system/logging.if"> +<summary>Policy for the kernel message logger and system logging daemon.</summary> +<interface name="logging_log_file" lineno="41"> +<summary> +Make the specified type usable for log files +in a filesystem. +</summary> +<desc> +<p> +Make the specified type usable for log files in a filesystem. +This will also make the type usable for files, making +calls to files_type() redundant. Failure to use this interface +for a log file type may result in problems with log +rotation, log analysis, and log monitoring programs. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>logging_log_filetrans()</li> +</ul> +<p> +Example usage with a domain that can create +and append to a private log file stored in the +general directories (e.g., /var/log): +</p> +<p> +type mylogfile_t; +logging_log_file(mylogfile_t) +allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; +logging_log_filetrans(mydomain_t, mylogfile_t, file) +</p> +</desc> +<param name="type"> +<summary> +Type to be used for files. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="logging_send_audit_msgs" lineno="62"> +<summary> +Send audit messages. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_dontaudit_send_audit_msgs" lineno="77"> +<summary> +dontaudit attempts to send audit messages. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="logging_set_loginuid" lineno="92"> +<summary> +Set login uid +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_set_tty_audit" lineno="107"> +<summary> +Set tty auditing +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_set_audit_parameters" lineno="121"> +<summary> +Set up audit +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_read_audit_log" lineno="137"> +<summary> +Read the audit log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_domtrans_auditctl" lineno="157"> +<summary> +Execute auditctl in the auditctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logging_run_auditctl" lineno="182"> +<summary> +Execute auditctl in the auditctl domain, and +allow the specified role the auditctl domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_domtrans_auditd" lineno="201"> +<summary> +Execute auditd in the auditd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logging_run_auditd" lineno="225"> +<summary> +Execute auditd in the auditd domain, and +allow the specified role the auditd domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="logging_stream_connect_auditd" lineno="244"> +<summary> +Connect to auditdstored over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_domtrans_dispatcher" lineno="259"> +<summary> +Execute a domain transition to run the audit dispatcher. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logging_signal_dispatcher" lineno="277"> +<summary> +Signal the audit dispatcher. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_dispatcher_domain" lineno="301"> +<summary> +Create a domain for processes +which can be started by the system audit dispatcher +</summary> +<param name="domain"> +<summary> +Type to be used as a domain. +</summary> +</param> +<param name="entry_point"> +<summary> +Type of the program to be used as an entry point to this domain. +</summary> +</param> +</interface> +<interface name="logging_stream_connect_dispatcher" lineno="329"> +<summary> +Connect to the audit dispatcher over an unix stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_manage_audit_config" lineno="349"> +<summary> +Manage the auditd configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_manage_audit_log" lineno="369"> +<summary> +Manage the audit log. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_domtrans_klog" lineno="389"> +<summary> +Execute klogd in the klog domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logging_check_exec_syslog" lineno="408"> +<summary> +Check if syslogd is executable. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_domtrans_syslog" lineno="428"> +<summary> +Execute syslogd in the syslog domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="logging_log_filetrans" lineno="485"> +<summary> +Create an object in the log directory, with a private type. +</summary> +<desc> +<p> +Allow the specified domain to create an object +in the general system log directories (e.g., /var/log) +with a private type. Typically this is used for creating +private log files in /var/log with the private type instead +of the general system log type. To accomplish this goal, +either the program must be SELinux-aware, or use this interface. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>logging_log_file()</li> +</ul> +<p> +Example usage with a domain that can create +and append to a private log file stored in the +general directories (e.g., /var/log): +</p> +<p> +type mylogfile_t; +logging_log_file(mylogfile_t) +allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; +logging_log_filetrans(mydomain_t, mylogfile_t, file) +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private type"> +<summary> +The type of the object to be created. +</summary> +</param> +<param name="object"> +<summary> +The object class of the object being created. +</summary> +</param> +<infoflow type="write" weight="10"/> +</interface> +<interface name="logging_send_syslog_msg" lineno="526"> +<summary> +Send system log messages. +</summary> +<desc> +<p> +Allow the specified domain to connect to the +system log service (syslog), to send messages be added to +the system logs. Typically this is used by services +that do not have their own log file in /var/log. +</p> +<p> +This does not allow messages to be sent to +the auditing system. +</p> +<p> +Programs which use the libc function syslog() will +require this access. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>logging_send_audit_msgs()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_read_audit_config" lineno="557"> +<summary> +Read the auditd configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_dontaudit_search_audit_config" lineno="578"> +<summary> +dontaudit search of auditd configuration files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_read_syslog_config" lineno="597"> +<summary> +Read syslog configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_search_logs" lineno="617"> +<summary> +Allows the domain to open a file in the +log directory, but does not allow the listing +of the contents of the log directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_dontaudit_search_logs" lineno="636"> +<summary> +Do not audit attempts to search the var log directory. +</summary> +<param name="domain"> +<summary> +Domain not to audit. +</summary> +</param> +</interface> +<interface name="logging_list_logs" lineno="654"> +<summary> +List the contents of the generic log directory (/var/log). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_rw_generic_log_dirs" lineno="673"> +<summary> +Read and write the generic log directory (/var/log). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_setattr_all_log_dirs" lineno="693"> +<summary> +Set attributes on all log dirs. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_dontaudit_getattr_all_logs" lineno="712"> +<summary> +Do not audit attempts to get the atttributes +of any log files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="logging_append_all_logs" lineno="730"> +<summary> +Append to all log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_read_all_logs" lineno="751"> +<summary> +Read all log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_exec_all_logs" lineno="773"> +<summary> +Execute all log files in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_rw_all_logs" lineno="793"> +<summary> +read/write to all log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_manage_all_logs" lineno="813"> +<summary> +Create, read, write, and delete all log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_read_generic_logs" lineno="834"> +<summary> +Read generic log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_write_generic_logs" lineno="854"> +<summary> +Write generic log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_dontaudit_write_generic_logs" lineno="874"> +<summary> +Dontaudit Write generic log files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="logging_rw_generic_logs" lineno="892"> +<summary> +Read and write generic log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="logging_manage_generic_logs" lineno="914"> +<summary> +Create, read, write, and delete +generic log files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_admin_audit" lineno="940"> +<summary> +All of the rules required to administrate +the audit environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +User role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_admin_syslog" lineno="984"> +<summary> +All of the rules required to administrate +the syslog environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +User role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="logging_admin" lineno="1042"> +<summary> +All of the rules required to administrate +the logging environment +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +User role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="lvm" filename="policy/modules/system/lvm.if"> +<summary>Policy for logical volume management programs.</summary> +<interface name="lvm_domtrans" lineno="13"> +<summary> +Execute lvm programs in the lvm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="lvm_exec" lineno="32"> +<summary> +Execute lvm programs in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="lvm_run" lineno="57"> +<summary> +Execute lvm programs in the lvm domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the LVM domain. +</summary> +</param> +<rolecap/> +</interface> +<interface name="lvm_read_config" lineno="77"> +<summary> +Read LVM configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="lvm_manage_config" lineno="98"> +<summary> +Manage LVM configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="lvm_domtrans_clvmd" lineno="118"> +<summary> +Execute a domain transition to run clvmd. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +</module> +<module name="miscfiles" filename="policy/modules/system/miscfiles.if"> +<summary>Miscelaneous files.</summary> +<interface name="miscfiles_cert_type" lineno="38"> +<summary> +Make the specified type usable as a cert file. +</summary> +<desc> +<p> +Make the specified type usable for cert files. +This will also make the type usable for files, making +calls to files_type() redundant. Failure to use this interface +for a temporary file may result in problems with +cert management tools. +</p> +<p> +Related interfaces: +</p> +<ul> +<li>files_type()</li> +</ul> +<p> +Example: +</p> +<p> +type mycertfile_t; +cert_type(mycertfile_t) +allow mydomain_t mycertfile_t:file read_file_perms; +files_search_etc(mydomain_t) +</p> +</desc> +<param name="type"> +<summary> +Type to be used for files. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="miscfiles_read_all_certs" lineno="58"> +<summary> +Read all SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_read_generic_certs" lineno="79"> +<summary> +Read generic SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_manage_generic_cert_dirs" lineno="99"> +<summary> +Manage generic SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_generic_cert_files" lineno="118"> +<summary> +Manage generic SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_read_certs" lineno="137"> +<summary> +Read SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_cert_dirs" lineno="152"> +<summary> +Manage SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_cert_files" lineno="167"> +<summary> +Manage SSL certificates. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_fonts" lineno="183"> +<summary> +Read fonts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_setattr_fonts_dirs" lineno="212"> +<summary> +Set the attributes on a fonts directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_dontaudit_setattr_fonts_dirs" lineno="232"> +<summary> +Do not audit attempts to set the attributes +on a fonts directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_dontaudit_write_fonts" lineno="251"> +<summary> +Do not audit attempts to write fonts. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_manage_fonts" lineno="271"> +<summary> +Create, read, write, and delete fonts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_setattr_fonts_cache_dirs" lineno="295"> +<summary> +Set the attributes on a fonts cache directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_dontaudit_setattr_fonts_cache_dirs" lineno="314"> +<summary> +Do not audit attempts to set the attributes +on a fonts cache directory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_fonts_cache" lineno="333"> +<summary> +Create, read, write, and delete fonts cache. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_read_hwdata" lineno="355"> +<summary> +Read hardware identification data. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_setattr_localization" lineno="375"> +<summary> +Allow process to setattr localization info +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_localization" lineno="407"> +<summary> +Allow process to read localization information. +</summary> +<desc> +<p> +Allow the specified domain to read the localization files. +This is typically for time zone configuration files, such as +/etc/localtime and files in /usr/share/zoneinfo. +Typically, any domain which needs to know the GMT/UTC +offset of the current timezone will need access +to these files. Generally, it should be safe for any +domain to read these files. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="miscfiles_rw_localization" lineno="429"> +<summary> +Allow process to write localization info +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_relabel_localization" lineno="449"> +<summary> +Allow process to relabel localization info +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_legacy_read_localization" lineno="468"> +<summary> +Allow process to read legacy time localization info +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_search_man_pages" lineno="487"> +<summary> +Search man pages. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_dontaudit_search_man_pages" lineno="506"> +<summary> +Do not audit attempts to search man pages. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="miscfiles_read_man_pages" lineno="525"> +<summary> +Read man pages +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_delete_man_pages" lineno="547"> +<summary> +Delete man pages +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_man_pages" lineno="572"> +<summary> +Create, read, write, and delete man pages +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_public_files" lineno="595"> +<summary> +Read public files used for file +transfer services. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_manage_public_files" lineno="617"> +<summary> +Create, read, write, and delete public files +and directories used for file transfer services. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="miscfiles_read_tetex_data" lineno="637"> +<summary> +Read TeX data +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_exec_tetex_data" lineno="661"> +<summary> +Execute TeX data programs in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_domain_entry_test_files" lineno="686"> +<summary> +Let test files be an entry point for +a specified domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_read_test_files" lineno="704"> +<summary> +Read test files and directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_exec_test_files" lineno="723"> +<summary> +Execute test files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_etc_filetrans_localization" lineno="742"> +<summary> +Execute test files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="miscfiles_manage_localization" lineno="762"> +<summary> +Create, read, write, and delete localization +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="modutils" filename="policy/modules/system/modutils.if"> +<summary>Policy for kernel module utilities</summary> +<interface name="modutils_getattr_module_deps" lineno="13"> +<summary> +Getattr the dependencies of kernel modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_read_module_deps" lineno="31"> +<summary> +Read the dependencies of kernel modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_read_module_config" lineno="52"> +<summary> +Read the configuration options used when +loading modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="modutils_rename_module_config" lineno="77"> +<summary> +Rename a file with the configuration options used when +loading modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_delete_module_config" lineno="96"> +<summary> +Unlink a file with the configuration options used when +loading modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_manage_module_config" lineno="115"> +<summary> +Manage files with the configuration options used when +loading modules. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_domtrans_insmod_uncond" lineno="135"> +<summary> +Unconditionally execute insmod in the insmod domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="modutils_domtrans_insmod" lineno="154"> +<summary> +Execute insmod in the insmod domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="modutils_run_insmod" lineno="182"> +<summary> +Execute insmod in the insmod domain, and +allow the specified role the insmod domain, +and use the caller's terminal. Has a sigchld +backchannel. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="modutils_exec_insmod" lineno="201"> +<summary> +Execute insmod in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_domtrans_depmod" lineno="220"> +<summary> +Execute depmod in the depmod domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="modutils_run_depmod" lineno="245"> +<summary> +Execute depmod in the depmod domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="modutils_exec_depmod" lineno="264"> +<summary> +Execute depmod in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="modutils_domtrans_update_mods" lineno="283"> +<summary> +Execute depmod in the depmod domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="modutils_run_update_mods" lineno="308"> +<summary> +Execute update_modules in the update_modules domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="modutils_exec_update_mods" lineno="327"> +<summary> +Execute update_modules in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="mount" filename="policy/modules/system/mount.if"> +<summary>Policy for mount.</summary> +<interface name="mount_domtrans" lineno="13"> +<summary> +Execute mount in the mount domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mount_run" lineno="39"> +<summary> +Execute mount in the mount domain, and +allow the specified role the mount domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="mount_exec" lineno="58"> +<summary> +Execute mount in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_signal" lineno="80"> +<summary> +Send a generic signal to mount. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_use_fds" lineno="98"> +<summary> +Use file descriptors for mount. +</summary> +<param name="domain"> +<summary> +The type of the process performing this action. +</summary> +</param> +</interface> +<interface name="mount_send_nfs_client_request" lineno="128"> +<summary> +Allow the mount domain to send nfs requests for mounting +network drives +</summary> +<desc> +<p> +Allow the mount domain to send nfs requests for mounting +network drives +</p> +<p> +This interface has been deprecated as these rules were +a side effect of leaked mount file descriptors. This +interface has no effect. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="mount_domtrans_unconfined" lineno="142"> +<summary> +Execute mount in the unconfined mount domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="mount_run_unconfined" lineno="168"> +<summary> +Execute mount in the unconfined mount domain, and +allow the specified role the unconfined mount domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<tunable name="allow_mount_anyfile" dftval="false"> +<desc> +<p> +Allow the mount command to mount any directory or file. +</p> +</desc> +</tunable> +</module> +<module name="netlabel" filename="policy/modules/system/netlabel.if"> +<summary>NetLabel/CIPSO labeled networking management</summary> +<interface name="netlabel_domtrans_mgmt" lineno="13"> +<summary> +Execute netlabel_mgmt in the netlabel_mgmt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="netlabel_run_mgmt" lineno="39"> +<summary> +Execute netlabel_mgmt in the netlabel_mgmt domain, and +allow the specified role the netlabel_mgmt domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +</module> +<module name="selinuxutil" filename="policy/modules/system/selinuxutil.if"> +<summary>Policy for SELinux policy and userland applications.</summary> +<interface name="seutil_domtrans_checkpolicy" lineno="13"> +<summary> +Execute checkpolicy in the checkpolicy domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_checkpolicy" lineno="41"> +<summary> +Execute checkpolicy in the checkpolicy domain, and +allow the specified role the checkpolicy domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_exec_checkpolicy" lineno="61"> +<summary> +Execute checkpolicy in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_domtrans_loadpolicy" lineno="81"> +<summary> +Execute load_policy in the load_policy domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_loadpolicy" lineno="108"> +<summary> +Execute load_policy in the load_policy domain, and +allow the specified role the load_policy domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_exec_loadpolicy" lineno="127"> +<summary> +Execute load_policy in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_read_loadpolicy" lineno="146"> +<summary> +Read the load_policy program file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_domtrans_newrole" lineno="165"> +<summary> +Execute newrole in the newole domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_newrole" lineno="193"> +<summary> +Execute newrole in the newrole domain, and +allow the specified role the newrole domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_exec_newrole" lineno="212"> +<summary> +Execute newrole in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_signal_newrole" lineno="233"> +<summary> +Do not audit the caller attempts to send +a signal to newrole. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_sigchld_newrole" lineno="261"> +<summary> +Send a SIGCHLD signal to newrole. +</summary> +<desc> +<p> +Allow the specified domain to send a SIGCHLD +signal to newrole. This signal is automatically +sent from a process that is terminating to +its parent. This may be needed by domains +that are executed from newrole. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="write" weight="1"/> +</interface> +<interface name="seutil_use_newrole_fds" lineno="279"> +<summary> +Inherit and use newrole file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_use_newrole_fds" lineno="298"> +<summary> +Do not audit attempts to inherit and use +newrole file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_domtrans_restorecon" lineno="316"> +<summary> +Execute restorecon in the restorecon domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_restorecon" lineno="339"> +<summary> +Execute restorecon in the restorecon domain, and +allow the specified role the restorecon domain, +and use the caller's terminal. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_exec_restorecon" lineno="355"> +<summary> +Execute restorecon in the caller domain. (Deprecated) +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_domtrans_runinit" lineno="370"> +<summary> +Execute run_init in the run_init domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_init_script_domtrans_runinit" lineno="396"> +<summary> +Execute init scripts in the run_init domain. +</summary> +<desc> +<p> +Execute init scripts in the run_init domain. +This is used for the Gentoo integrated run_init. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_runinit" lineno="426"> +<summary> +Execute run_init in the run_init domain, and +allow the specified role the run_init domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_init_script_run_runinit" lineno="462"> +<summary> +Execute init scripts in the run_init domain, and +allow the specified role the run_init domain, +and use the caller's terminal. +</summary> +<desc> +<p> +Execute init scripts in the run_init domain, and +allow the specified role the run_init domain, +and use the caller's terminal. +</p> +<p> +This is used for the Gentoo integrated run_init. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +</interface> +<interface name="seutil_use_runinit_fds" lineno="481"> +<summary> +Inherit and use run_init file descriptors. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_domtrans_setfiles" lineno="499"> +<summary> +Execute setfiles in the setfiles domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_setfiles" lineno="527"> +<summary> +Execute setfiles in the setfiles domain, and +allow the specified role the setfiles domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_exec_setfiles" lineno="546"> +<summary> +Execute setfiles in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_search_config" lineno="567"> +<summary> +Do not audit attempts to search the SELinux +configuration directory (/etc/selinux). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_read_config" lineno="586"> +<summary> +Do not audit attempts to read the SELinux +userland configuration (/etc/selinux). +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="seutil_read_config" lineno="606"> +<summary> +Read the general SELinux configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_rw_config" lineno="628"> +<summary> +Read and write the general SELinux configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_manage_selinux_config" lineno="660"> +<summary> +Create, read, write, and delete +the general selinux configuration files. (Deprecated) +</summary> +<desc> +<p> +Create, read, write, and delete +the general selinux configuration files. +</p> +<p> +This interface has been deprecated, please +use the seutil_manage_config() interface instead. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_manage_config" lineno="677"> +<summary> +Create, read, write, and delete +the general selinux configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_manage_config_dirs" lineno="699"> +<summary> +Create, read, write, and delete +the general selinux configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_search_default_contexts" lineno="718"> +<summary> +Search the policy directory with default_context files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_read_default_contexts" lineno="738"> +<summary> +Read the default_contexts files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_manage_default_contexts" lineno="759"> +<summary> +Create, read, write, and delete the default_contexts files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_read_file_contexts" lineno="780"> +<summary> +Read the file_contexts files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_dontaudit_read_file_contexts" lineno="801"> +<summary> +Do not audit attempts to read the file_contexts files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_rw_file_contexts" lineno="820"> +<summary> +Read and write the file_contexts files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_manage_file_contexts" lineno="841"> +<summary> +Create, read, write, and delete the file_contexts files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_read_bin_policy" lineno="861"> +<summary> +Read the SELinux binary policy. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_create_bin_policy" lineno="881"> +<summary> +Create the SELinux binary policy. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_relabelto_bin_policy" lineno="904"> +<summary> +Allow the caller to relabel a file to the binary policy type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_manage_bin_policy" lineno="925"> +<summary> +Create, read, write, and delete the SELinux +binary policy. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_read_src_policy" lineno="947"> +<summary> +Read SELinux policy source files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_manage_src_policy" lineno="969"> +<summary> +Create, read, write, and delete SELinux +policy source files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_domtrans_semanage" lineno="990"> +<summary> +Execute a domain transition to run semanage. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="seutil_run_semanage" lineno="1018"> +<summary> +Execute semanage in the semanage domain, and +allow the specified role the semanage domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="seutil_manage_module_store" lineno="1038"> +<summary> +Full management of the semanage +module store. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_get_semanage_read_lock" lineno="1059"> +<summary> +Get read lock on module store +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_get_semanage_trans_lock" lineno="1078"> +<summary> +Get trans lock on module store +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_libselinux_linked" lineno="1106"> +<summary> +SELinux-enabled program access for +libselinux-linked programs. +</summary> +<desc> +<p> +SELinux-enabled programs are typically +linked to the libselinux library. This +interface will allow access required for +the libselinux constructor to function. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="seutil_dontaudit_libselinux_linked" lineno="1136"> +<summary> +Do not audit SELinux-enabled program access for +libselinux-linked programs. +</summary> +<desc> +<p> +SELinux-enabled programs are typically +linked to the libselinux library. This +interface will dontaudit access required for +the libselinux constructor to function. +</p> +<p> +Generally this should not be used on anything +but simple SELinux-enabled programs that do not +rely on data initialized by the libselinux +constructor. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +</module> +<module name="setrans" filename="policy/modules/system/setrans.if"> +<summary>SELinux MLS/MCS label translation service.</summary> +<interface name="setrans_initrc_domtrans" lineno="14"> +<summary> +Execute setrans server in the setrans domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="setrans_translate_context" lineno="32"> +<summary> +Allow a domain to translate contexts. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="sysnetwork" filename="policy/modules/system/sysnetwork.if"> +<summary>Policy for network configuration: ifconfig and dhcp client.</summary> +<interface name="sysnet_domtrans_dhcpc" lineno="13"> +<summary> +Execute dhcp client in dhcpc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sysnet_run_dhcpc" lineno="39"> +<summary> +Execute DHCP clients in the dhcpc domain, and +allow the specified role the dhcpc domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_dontaudit_use_dhcpc_fds" lineno="59"> +<summary> +Do not audit attempts to use +the dhcp file descriptors. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sysnet_sigchld_dhcpc" lineno="77"> +<summary> +Send a SIGCHLD signal to the dhcp client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_kill_dhcpc" lineno="96"> +<summary> +Send a kill signal to the dhcp client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_sigstop_dhcpc" lineno="114"> +<summary> +Send a SIGSTOP signal to the dhcp client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_signull_dhcpc" lineno="132"> +<summary> +Send a null signal to the dhcp client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_signal_dhcpc" lineno="151"> +<summary> +Send a generic signal to the dhcp client. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_dbus_chat_dhcpc" lineno="170"> +<summary> +Send and receive messages from +dhcpc over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_rw_dhcp_config" lineno="190"> +<summary> +Read and write dhcp configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_search_dhcpc_state" lineno="210"> +<summary> +Search the DHCP client state +directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_read_dhcpc_state" lineno="229"> +<summary> +Read dhcp client state files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_delete_dhcpc_state" lineno="247"> +<summary> +Delete the dhcp client state files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_setattr_config" lineno="265"> +<summary> +Set the attributes of network config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_read_config" lineno="305"> +<summary> +Read network config files. +</summary> +<desc> +<p> +Allow the specified domain to read the +general network configuration files. A +common example of this is the +/etc/resolv.conf file, which has domain +name system (DNS) server IP addresses. +Typically, most networking processes will +require the access provided by this interface. +</p> +<p> +Higher-level interfaces which involve +networking will generally call this interface, +for example: +</p> +<ul> +<li>sysnet_dns_name_resolve()</li> +<li>sysnet_use_ldap()</li> +<li>sysnet_use_portmap()</li> +</ul> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_dontaudit_read_config" lineno="329"> +<summary> +Do not audit attempts to read network config files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="sysnet_write_config" lineno="347"> +<summary> +Write network config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_create_config" lineno="366"> +<summary> +Create network config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_etc_filetrans_config" lineno="386"> +<summary> +Create files in /etc with the type used for +the network config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_manage_config" lineno="404"> +<summary> +Create, read, write, and delete network config files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_read_dhcpc_pid" lineno="426"> +<summary> +Read the dhcp client pid file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_delete_dhcpc_pid" lineno="445"> +<summary> +Delete the dhcp client pid file. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_domtrans_ifconfig" lineno="463"> +<summary> +Execute ifconfig in the ifconfig domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="sysnet_run_ifconfig" lineno="490"> +<summary> +Execute ifconfig in the ifconfig domain, and +allow the specified role the ifconfig domain, +and use the caller's terminal. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_exec_ifconfig" lineno="510"> +<summary> +Execute ifconfig in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_signal_ifconfig" lineno="530"> +<summary> +Send a generic signal to ifconfig. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_read_dhcp_config" lineno="548"> +<summary> +Read the DHCP configuration files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_search_dhcp_state" lineno="568"> +<summary> +Search the DHCP state data directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_dhcp_state_filetrans" lineno="607"> +<summary> +Create DHCP state data. +</summary> +<desc> +<p> +Create DHCP state data. +</p> +<p> +This is added for DHCP server, as +the server and client put their state +files in the same directory. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="file_type"> +<summary> +The type of the object to be created +</summary> +</param> +<param name="object_class"> +<summary> +The object class. +</summary> +</param> +</interface> +<interface name="sysnet_dns_name_resolve" lineno="627"> +<summary> +Perform a DNS name resolution. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="sysnet_use_ldap" lineno="668"> +<summary> +Connect and use a LDAP server. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="sysnet_use_portmap" lineno="700"> +<summary> +Connect and use remote port mappers. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="udev" filename="policy/modules/system/udev.if"> +<summary>Policy for udev.</summary> +<interface name="udev_signal" lineno="13"> +<summary> +Send generic signals to udev. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="udev_domtrans" lineno="31"> +<summary> +Execute udev in the udev domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="udev_exec" lineno="49"> +<summary> +Execute udev in the caller domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="udev_helper_domtrans" lineno="67"> +<summary> +Execute a udev helper in the udev domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="udev_read_state" lineno="85"> +<summary> +Allow process to read udev process state. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="udev_dontaudit_use_fds" lineno="106"> +<summary> +Do not audit attempts to inherit a +udev file descriptor. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="udev_dontaudit_rw_dgram_sockets" lineno="125"> +<summary> +Do not audit attempts to read or write +to a udev unix datagram socket. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="udev_manage_rules_files" lineno="143"> +<summary> +Manage udev rules files +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="udev_dontaudit_search_db" lineno="161"> +<summary> +Do not audit search of udev database directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="udev_read_db" lineno="185"> +<summary> +Read the udev device table. +</summary> +<desc> +<p> +Allow the specified domain to read the udev device table. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="read" weight="10"/> +</interface> +<interface name="udev_rw_db" lineno="206"> +<summary> +Allow process to modify list of devices. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="udev_manage_pid_files" lineno="226"> +<summary> +Create, read, write, and delete +udev pid files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="unconfined" filename="policy/modules/system/unconfined.if"> +<summary>The unconfined domain.</summary> +<interface name="unconfined_domain_noaudit" lineno="13"> +<summary> +Make the specified domain unconfined. +</summary> +<param name="domain"> +<summary> +Domain to make unconfined. +</summary> +</param> +</interface> +<interface name="unconfined_domain" lineno="124"> +<summary> +Make the specified domain unconfined and +audit executable heap usage. +</summary> +<desc> +<p> +Make the specified domain unconfined and +audit executable heap usage. With exception +of memory protections, usage of this interface +will result in the level of access the domain has +is like SELinux was not being used. +</p> +<p> +Only completely trusted domains should use this interface. +</p> +</desc> +<param name="domain"> +<summary> +Domain to make unconfined. +</summary> +</param> +</interface> +<interface name="unconfined_alias_domain" lineno="152"> +<summary> +Add an alias type to the unconfined domain. (Deprecated) +</summary> +<desc> +<p> +Add an alias type to the unconfined domain. (Deprecated) +</p> +<p> +This is added to support targeted policy. Its +use should be limited. It has no effect +on the strict policy. +</p> +</desc> +<param name="domain"> +<summary> +New alias of the unconfined domain. +</summary> +</param> +</interface> +<interface name="unconfined_execmem_alias_program" lineno="178"> +<summary> +Add an alias type to the unconfined execmem +program file type. (Deprecated) +</summary> +<desc> +<p> +Add an alias type to the unconfined execmem +program file type. (Deprecated) +</p> +<p> +This is added to support targeted policy. Its +use should be limited. It has no effect +on the strict policy. +</p> +</desc> +<param name="domain"> +<summary> +New alias of the unconfined execmem program type. +</summary> +</param> +</interface> +<interface name="unconfined_domtrans" lineno="192"> +<summary> +Transition to the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="unconfined_run" lineno="215"> +<summary> +Execute specified programs in the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="role"> +<summary> +The role to allow the unconfined domain. +</summary> +</param> +</interface> +<interface name="unconfined_shell_domtrans" lineno="234"> +<summary> +Transition to the unconfined domain by executing a shell. +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="unconfined_domtrans_to" lineno="272"> +<summary> +Allow unconfined to execute the specified program in +the specified domain. +</summary> +<desc> +<p> +Allow unconfined to execute the specified program in +the specified domain. +</p> +<p> +This is a interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain to execute in. +</summary> +</param> +<param name="entry_file"> +<summary> +Domain entry point file. +</summary> +</param> +</interface> +<interface name="unconfined_run_to" lineno="309"> +<summary> +Allow unconfined to execute the specified program in +the specified domain. Allow the specified domain the +unconfined role and use of unconfined user terminals. +</summary> +<desc> +<p> +Allow unconfined to execute the specified program in +the specified domain. Allow the specified domain the +unconfined role and use of unconfined user terminals. +</p> +<p> +This is a interface to support third party modules +and its use is not allowed in upstream reference +policy. +</p> +</desc> +<param name="domain"> +<summary> +Domain to execute in. +</summary> +</param> +<param name="entry_file"> +<summary> +Domain entry point file. +</summary> +</param> +</interface> +<interface name="unconfined_use_fds" lineno="330"> +<summary> +Inherit file descriptors from the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_sigchld" lineno="348"> +<summary> +Send a SIGCHLD signal to the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_signull" lineno="366"> +<summary> +Send a SIGNULL signal to the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_signal" lineno="384"> +<summary> +Send generic signals to the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_read_pipes" lineno="402"> +<summary> +Read unconfined domain unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dontaudit_read_pipes" lineno="420"> +<summary> +Do not audit attempts to read unconfined domain unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="unconfined_rw_pipes" lineno="438"> +<summary> +Read and write unconfined domain unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dontaudit_rw_pipes" lineno="457"> +<summary> +Do not audit attempts to read and write +unconfined domain unnamed pipes. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="unconfined_stream_connect" lineno="476"> +<summary> +Connect to the unconfined domain using +a unix domain stream socket. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dontaudit_rw_tcp_sockets" lineno="505"> +<summary> +Do not audit attempts to read or write +unconfined domain tcp sockets. +</summary> +<desc> +<p> +Do not audit attempts to read or write +unconfined domain tcp sockets. +</p> +<p> +This interface was added due to a broken +symptom in ldconfig. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="unconfined_create_keys" lineno="523"> +<summary> +Create keys for the unconfined domain. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dbus_send" lineno="541"> +<summary> +Send messages to the unconfined domain over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dbus_chat" lineno="561"> +<summary> +Send and receive messages from +unconfined_t over dbus. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="unconfined_dbus_connect" lineno="582"> +<summary> +Connect to the the unconfined DBUS +for service (acquire_svc). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +</module> +<module name="userdomain" filename="policy/modules/system/userdomain.if"> +<summary>Policy for user domains</summary> +<template name="userdom_base_user_template" lineno="24"> +<summary> +The template containing the most basic rules common to all users. +</summary> +<desc> +<p> +The template containing the most basic rules common to all users. +</p> +<p> +This template creates a user domain, types, and +rules for the user's tty and pty. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<rolebase/> +</template> +<interface name="userdom_ro_home_role" lineno="148"> +<summary> +Allow a home directory for which the +role has read-only access. +</summary> +<desc> +<p> +Allow a home directory for which the +role has read-only access. +</p> +<p> +This does not allow execute access. +</p> +</desc> +<param name="role"> +<summary> +The user role +</summary> +</param> +<param name="userdomain"> +<summary> +The user domain +</summary> +</param> +<rolebase/> +</interface> +<interface name="userdom_manage_home_role" lineno="219"> +<summary> +Allow a home directory for which the +role has full access. +</summary> +<desc> +<p> +Allow a home directory for which the +role has full access. +</p> +<p> +This does not allow execute access. +</p> +</desc> +<param name="role"> +<summary> +The user role +</summary> +</param> +<param name="userdomain"> +<summary> +The user domain +</summary> +</param> +<rolebase/> +</interface> +<interface name="userdom_manage_tmp_role" lineno="288"> +<summary> +Manage user temporary files +</summary> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolebase/> +</interface> +<interface name="userdom_exec_user_tmp_files" lineno="314"> +<summary> +The execute access user temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolebase/> +</interface> +<interface name="userdom_manage_tmpfs_role" lineno="349"> +<summary> +Role access for the user tmpfs type +that the user has full access. +</summary> +<desc> +<p> +Role access for the user tmpfs type +that the user has full access. +</p> +<p> +This does not allow execute access. +</p> +</desc> +<param name="role"> +<summary> +Role allowed access. +</summary> +</param> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<template name="userdom_basic_networking_template" lineno="375"> +<summary> +The template allowing the user basic +network permissions +</summary> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<rolebase/> +</template> +<template name="userdom_xwindows_client_template" lineno="418"> +<summary> +The template for creating a user xwindows client. (Deprecated) +</summary> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<rolebase/> +</template> +<template name="userdom_change_password_template" lineno="459"> +<summary> +The template for allowing the user to change passwords. +</summary> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +<rolebase/> +</template> +<template name="userdom_common_user_template" lineno="489"> +<summary> +The template containing rules common to unprivileged +users and administrative users. +</summary> +<desc> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, tmp, and tmpfs files. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="userdom_login_user_template" lineno="709"> +<summary> +The template for creating a login user. +</summary> +<desc> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, home directories, +tmp, and tmpfs files. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="userdom_restricted_user_template" lineno="827"> +<summary> +The template for creating a unprivileged login user. +</summary> +<desc> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, home directories, +tmp, and tmpfs files. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="userdom_restricted_xwindows_user_template" lineno="868"> +<summary> +The template for creating a unprivileged xwindows login user. +</summary> +<desc> +<p> +The template for creating a unprivileged xwindows login user. +</p> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, home directories, +tmp, and tmpfs files. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="userdom_unpriv_user_template" lineno="943"> +<summary> +The template for creating a unprivileged user roughly +equivalent to a regular linux user. +</summary> +<desc> +<p> +The template for creating a unprivileged user roughly +equivalent to a regular linux user. +</p> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, home directories, +tmp, and tmpfs files. +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., user +is the prefix for user_t). +</summary> +</param> +</template> +<template name="userdom_admin_user_template" lineno="1040"> +<summary> +The template for creating an administrative user. +</summary> +<desc> +<p> +This template creates a user domain, types, and +rules for the user's tty, pty, home directories, +tmp, and tmpfs files. +</p> +<p> +The privileges given to administrative users are: +<ul> +<li>Raw disk access</li> +<li>Set all sysctls</li> +<li>All kernel ring buffer controls</li> +<li>Create, read, write, and delete all files but shadow</li> +<li>Manage source and binary format SELinux policy</li> +<li>Run insmod</li> +</ul> +</p> +</desc> +<param name="userdomain_prefix"> +<summary> +The prefix of the user domain (e.g., sysadm +is the prefix for sysadm_t). +</summary> +</param> +</template> +<template name="userdom_security_admin_template" lineno="1204"> +<summary> +Allow user to run as a secadm +</summary> +<desc> +<p> +Create objects in a user home directory +with an automatic type transition to +a specified private type. +</p> +<p> +This is a templated interface, and should only +be called from a per-userdomain template. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="role"> +<summary> +The role of the object to create. +</summary> +</param> +</template> +<interface name="userdom_user_application_type" lineno="1279"> +<summary> +Make the specified type usable as +a user application domain type. +</summary> +<param name="type"> +<summary> +Type to be used as a user application domain. +</summary> +</param> +</interface> +<interface name="userdom_user_application_domain" lineno="1300"> +<summary> +Make the specified type usable as +a user application domain. +</summary> +<param name="type"> +<summary> +Type to be used as a user application domain. +</summary> +</param> +<param name="type"> +<summary> +Type to be used as the domain entry point. +</summary> +</param> +</interface> +<interface name="userdom_user_home_content" lineno="1317"> +<summary> +Make the specified type usable in a +user home directory. +</summary> +<param name="type"> +<summary> +Type to be used as a file in the +user home directory. +</summary> +</param> +</interface> +<interface name="userdom_user_tmp_file" lineno="1340"> +<summary> +Make the specified type usable as a +user temporary file. +</summary> +<param name="type"> +<summary> +Type to be used as a file in the +temporary directories. +</summary> +</param> +</interface> +<interface name="userdom_user_tmpfs_file" lineno="1357"> +<summary> +Make the specified type usable as a +user tmpfs file. +</summary> +<param name="type"> +<summary> +Type to be used as a file in +tmpfs directories. +</summary> +</param> +</interface> +<interface name="userdom_attach_admin_tun_iface" lineno="1372"> +<summary> +Allow domain to attach to TUN devices created by administrative users. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_setattr_user_ptys" lineno="1391"> +<summary> +Set the attributes of a user pty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_create_user_pty" lineno="1409"> +<summary> +Create a user pty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_getattr_user_home_dirs" lineno="1427"> +<summary> +Get the attributes of user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_getattr_user_home_dirs" lineno="1446"> +<summary> +Do not audit attempts to get the attributes of user home directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_search_user_home_dirs" lineno="1464"> +<summary> +Search user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_search_user_home_dirs" lineno="1491"> +<summary> +Do not audit attempts to search user home directories. +</summary> +<desc> +<p> +Do not audit attempts to search user home directories. +This will supress SELinux denial messages when the specified +domain is denied the permission to search these directories. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="userdom_list_user_home_dirs" lineno="1509"> +<summary> +List user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_list_user_home_dirs" lineno="1528"> +<summary> +Do not audit attempts to list user home subdirectories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_create_user_home_dirs" lineno="1546"> +<summary> +Create user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_dirs" lineno="1564"> +<summary> +Create user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_relabelto_user_home_dirs" lineno="1582"> +<summary> +Relabel to user home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_home_filetrans_user_home_dir" lineno="1601"> +<summary> +Create directories in the home dir root with +the user home directory type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_user_home_domtrans" lineno="1638"> +<summary> +Do a domain transition to the specified +domain when executing a program in the +user home directory. +</summary> +<desc> +<p> +Do a domain transition to the specified +domain when executing a program in the +user home directory. +</p> +<p> +No interprocess communication (signals, pipes, +etc.) is provided by this interface since +the domains are not owned by this module. +</p> +</desc> +<param name="source_domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +<param name="target_domain"> +<summary> +Domain to transition to. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_search_user_home_content" lineno="1658"> +<summary> +Do not audit attempts to search user home content directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_list_user_home_content" lineno="1676"> +<summary> +List contents of users home directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_content_dirs" lineno="1695"> +<summary> +Create, read, write, and delete directories +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_delete_user_home_content_dirs" lineno="1714"> +<summary> +Delete directories in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_setattr_user_home_content_files" lineno="1733"> +<summary> +Do not audit attempts to set the +attributes of user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_mmap_user_home_content_files" lineno="1751"> +<summary> +Mmap user home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_read_user_home_content_files" lineno="1770"> +<summary> +Read user home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_read_user_home_content_files" lineno="1789"> +<summary> +Do not audit attempts to read user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_append_user_home_content_files" lineno="1808"> +<summary> +Do not audit attempts to append user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_write_user_home_content_files" lineno="1826"> +<summary> +Do not audit attempts to write user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_delete_user_home_content_files" lineno="1844"> +<summary> +Delete files in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_relabel_user_home_content_files" lineno="1862"> +<summary> +Do not audit attempts to write user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_read_user_home_content_symlinks" lineno="1880"> +<summary> +Read user home subdirectory symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_exec_user_home_content_files" lineno="1900"> +<summary> +Execute user home files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<rolecap/> +</interface> +<interface name="userdom_dontaudit_exec_user_home_content_files" lineno="1927"> +<summary> +Do not audit attempts to execute user home files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_content_files" lineno="1946"> +<summary> +Create, read, write, and delete files +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_manage_user_home_content_dirs" lineno="1967"> +<summary> +Do not audit attempts to create, read, write, and delete directories +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_content_symlinks" lineno="1986"> +<summary> +Create, read, write, and delete symbolic links +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_delete_user_home_content_symlinks" lineno="2006"> +<summary> +Delete symbolic links in a user home directory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_content_pipes" lineno="2025"> +<summary> +Create, read, write, and delete named pipes +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_home_content_sockets" lineno="2046"> +<summary> +Create, read, write, and delete named sockets +in a user home subdirectory. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_user_home_dir_filetrans" lineno="2078"> +<summary> +Create objects in a user home directory +with an automatic type transition to +a specified private type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +The type of the object to create. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +</interface> +<interface name="userdom_user_home_content_filetrans" lineno="2109"> +<summary> +Create objects in a user home directory +with an automatic type transition to +a specified private type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +The type of the object to create. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +</interface> +<interface name="userdom_user_home_dir_filetrans_user_home_content" lineno="2136"> +<summary> +Create objects in a user home directory +with an automatic type transition to +the user home file type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +</interface> +<interface name="userdom_write_user_tmp_sockets" lineno="2155"> +<summary> +Write to user temporary named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_list_user_tmp" lineno="2174"> +<summary> +List user temporary directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_list_user_tmp" lineno="2194"> +<summary> +Do not audit attempts to list user +temporary directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_manage_user_tmp_dirs" lineno="2213"> +<summary> +Do not audit attempts to manage users +temporary directories. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_read_user_tmp_files" lineno="2231"> +<summary> +Read user temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_read_user_tmp_files" lineno="2252"> +<summary> +Do not audit attempts to read users +temporary files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_append_user_tmp_files" lineno="2271"> +<summary> +Do not audit attempts to append users +temporary files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_rw_user_tmp_files" lineno="2289"> +<summary> +Read and write user temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_manage_user_tmp_files" lineno="2310"> +<summary> +Do not audit attempts to manage users +temporary files. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_read_user_tmp_symlinks" lineno="2328"> +<summary> +Read user temporary symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_dirs" lineno="2349"> +<summary> +Create, read, write, and delete user +temporary directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_files" lineno="2369"> +<summary> +Create, read, write, and delete user +temporary files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_symlinks" lineno="2389"> +<summary> +Create, read, write, and delete user +temporary symbolic links. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_pipes" lineno="2409"> +<summary> +Create, read, write, and delete user +temporary named pipes. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmp_sockets" lineno="2429"> +<summary> +Create, read, write, and delete user +temporary named sockets. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_user_tmp_filetrans" lineno="2460"> +<summary> +Create objects in a user temporary directory +with an automatic type transition to +a specified private type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="private_type"> +<summary> +The type of the object to create. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +</interface> +<interface name="userdom_tmp_filetrans_user_tmp" lineno="2486"> +<summary> +Create objects in the temporary directory +with an automatic type transition to +the user temporary type. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<param name="object_class"> +<summary> +The class of the object to be created. +</summary> +</param> +</interface> +<interface name="userdom_read_user_tmpfs_files" lineno="2504"> +<summary> +Read user tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_rw_user_tmpfs_files" lineno="2524"> +<summary> +Read user tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_user_tmpfs_files" lineno="2545"> +<summary> +Create, read, write, and delete user tmpfs files. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_getattr_user_ttys" lineno="2565"> +<summary> +Get the attributes of a user domain tty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_getattr_user_ttys" lineno="2583"> +<summary> +Do not audit attempts to get the attributes of a user domain tty. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_setattr_user_ttys" lineno="2601"> +<summary> +Set the attributes of a user domain tty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_setattr_user_ttys" lineno="2619"> +<summary> +Do not audit attempts to set the attributes of a user domain tty. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_use_user_ttys" lineno="2637"> +<summary> +Read and write a user domain tty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_use_user_ptys" lineno="2655"> +<summary> +Read and write a user domain pty. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_use_user_terminals" lineno="2689"> +<summary> +Read and write a user TTYs and PTYs. +</summary> +<desc> +<p> +Allow the specified domain to read and write user +TTYs and PTYs. This will allow the domain to +interact with the user via the terminal. Typically +all interactive applications will require this +access. +</p> +<p> +However, this also allows the applications to spy +on user sessions or inject information into the +user session. Thus, this access should likely +not be allowed for non-interactive domains. +</p> +</desc> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +<infoflow type="both" weight="10"/> +</interface> +<interface name="userdom_dontaudit_use_user_terminals" lineno="2710"> +<summary> +Do not audit attempts to read and write +a user domain tty and pty. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_spec_domtrans_all_users" lineno="2731"> +<summary> +Execute a shell in all user domains. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="userdom_xsession_spec_domtrans_all_users" lineno="2754"> +<summary> +Execute an Xserver session in all unprivileged user domains. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="userdom_spec_domtrans_unpriv_users" lineno="2777"> +<summary> +Execute a shell in all unprivileged user domains. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="userdom_xsession_spec_domtrans_unpriv_users" lineno="2800"> +<summary> +Execute an Xserver session in all unprivileged user domains. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="userdom_rw_unpriv_user_semaphores" lineno="2821"> +<summary> +Read and write unpriviledged user SysV sempaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_unpriv_user_semaphores" lineno="2839"> +<summary> +Manage unpriviledged user SysV sempaphores. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_rw_unpriv_user_shared_mem" lineno="2858"> +<summary> +Read and write unpriviledged user SysV shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_manage_unpriv_user_shared_mem" lineno="2877"> +<summary> +Manage unpriviledged user SysV shared +memory segments. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_bin_spec_domtrans_unpriv_users" lineno="2897"> +<summary> +Execute bin_t in the unprivileged user domains. This +is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed to transition. +</summary> +</param> +</interface> +<interface name="userdom_entry_spec_domtrans_unpriv_users" lineno="2920"> +<summary> +Execute all entrypoint files in unprivileged user +domains. This is an explicit transition, requiring the +caller to use setexeccon(). +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_search_user_home_content" lineno="2941"> +<summary> +Search users home directories. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_signull_unpriv_users" lineno="2960"> +<summary> +Send signull to unprivileged user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_signal_unpriv_users" lineno="2978"> +<summary> +Send general signals to unprivileged user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_use_unpriv_users_fds" lineno="2996"> +<summary> +Inherit the file descriptors from unprivileged user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_use_unpriv_user_fds" lineno="3024"> +<summary> +Do not audit attempts to inherit the file descriptors +from unprivileged user domains. +</summary> +<desc> +<p> +Do not audit attempts to inherit the file descriptors +from unprivileged user domains. This will supress +SELinux denial messages when the specified domain is denied +the permission to inherit these file descriptors. +</p> +</desc> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +<infoflow type="none"/> +</interface> +<interface name="userdom_dontaudit_use_user_ptys" lineno="3042"> +<summary> +Do not audit attempts to use user ptys. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_relabelto_user_ptys" lineno="3060"> +<summary> +Relabel files to unprivileged user pty types. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_relabelfrom_user_ptys" lineno="3079"> +<summary> +Do not audit attempts to relabel files from +user pty types. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_write_user_tmp_files" lineno="3097"> +<summary> +Write all users files in /tmp +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_use_user_ttys" lineno="3115"> +<summary> +Do not audit attempts to use user ttys. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_read_all_users_state" lineno="3133"> +<summary> +Read the process state of all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_getattr_all_users" lineno="3152"> +<summary> +Get the attributes of all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_use_all_users_fds" lineno="3170"> +<summary> +Inherit the file descriptors from all user domains +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dontaudit_use_all_users_fds" lineno="3189"> +<summary> +Do not audit attempts to inherit the file +descriptors from any user domains. +</summary> +<param name="domain"> +<summary> +Domain to not audit. +</summary> +</param> +</interface> +<interface name="userdom_signal_all_users" lineno="3207"> +<summary> +Send general signals to all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_sigchld_all_users" lineno="3225"> +<summary> +Send a SIGCHLD signal to all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_create_all_users_keys" lineno="3243"> +<summary> +Create keys for all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<interface name="userdom_dbus_send_all_users" lineno="3261"> +<summary> +Send a dbus message to all user domains. +</summary> +<param name="domain"> +<summary> +Domain allowed access. +</summary> +</param> +</interface> +<tunable name="allow_user_mysql_connect" dftval="false"> +<desc> +<p> +Allow users to connect to mysql +</p> +</desc> +</tunable> +<tunable name="allow_user_postgresql_connect" dftval="false"> +<desc> +<p> +Allow users to connect to PostgreSQL +</p> +</desc> +</tunable> +<tunable name="user_direct_mouse" dftval="false"> +<desc> +<p> +Allow regular users direct mouse access +</p> +</desc> +</tunable> +<tunable name="user_dmesg" dftval="false"> +<desc> +<p> +Allow users to read system messages. +</p> +</desc> +</tunable> +<tunable name="user_rw_noexattrfile" dftval="false"> +<desc> +<p> +Allow user to r/w files on filesystems +that do not have extended attributes (FAT, CDROM, FLOPPY) +</p> +</desc> +</tunable> +<tunable name="user_ttyfile_stat" dftval="false"> +<desc> +<p> +Allow w to display everyone +</p> +</desc> +</tunable> +</module> +</layer> +<tunable name="allow_execheap" dftval="false"> +<desc> +<p> +Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla +</p> +</desc> +</tunable> +<tunable name="allow_execmem" dftval="false"> +<desc> +<p> +Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla") +</p> +</desc> +</tunable> +<tunable name="allow_execmod" dftval="false"> +<desc> +<p> +Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t") +</p> +</desc> +</tunable> +<tunable name="allow_execstack" dftval="false"> +<desc> +<p> +Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla") +</p> +</desc> +</tunable> +<tunable name="allow_polyinstantiation" dftval="false"> +<desc> +<p> +Enable polyinstantiated directory support. +</p> +</desc> +</tunable> +<tunable name="allow_ypbind" dftval="false"> +<desc> +<p> +Allow system to run with NIS +</p> +</desc> +</tunable> +<tunable name="console_login" dftval="true"> +<desc> +<p> +Allow logging in and using the system from /dev/console. +</p> +</desc> +</tunable> +<tunable name="global_ssp" dftval="false"> +<desc> +<p> +Enable reading of urandom for all domains. +</p> +<p> +This should be enabled when all programs +are compiled with ProPolice/SSP +stack smashing protection. All domains will +be allowed to read from /dev/urandom. +</p> +</desc> +</tunable> +<tunable name="mail_read_content" dftval="false"> +<desc> +<p> +Allow email client to various content. +nfs, samba, removable devices, and user temp +files +</p> +</desc> +</tunable> +<tunable name="nfs_export_all_rw" dftval="false"> +<desc> +<p> +Allow any files/directories to be exported read/write via NFS. +</p> +</desc> +</tunable> +<tunable name="nfs_export_all_ro" dftval="false"> +<desc> +<p> +Allow any files/directories to be exported read/only via NFS. +</p> +</desc> +</tunable> +<tunable name="use_nfs_home_dirs" dftval="false"> +<desc> +<p> +Support NFS home directories +</p> +</desc> +</tunable> +<tunable name="use_samba_home_dirs" dftval="false"> +<desc> +<p> +Support SAMBA home directories +</p> +</desc> +</tunable> +<tunable name="user_tcp_server" dftval="false"> +<desc> +<p> +Allow users to run TCP servers (bind to ports and accept connection from +the same domain and outside users) disabling this forces FTP passive mode +and may change other protocols. +</p> +</desc> +</tunable> +<bool name="secure_mode" dftval="false"> +<desc> +<p> +Enabling secure mode disallows programs, such as +newrole, from transitioning to administrative +user domains. +</p> +</desc> +</bool> +</policy> diff --git a/doc/templates/bool_list.html b/doc/templates/bool_list.html new file mode 100644 index 00000000..2d852da4 --- /dev/null +++ b/doc/templates/bool_list.html @@ -0,0 +1,23 @@ +<h3>Master boolean index:</h3> + +[[for bool in booleans]] +<div id="interfacesmall"> +[[if bool.has_key('mod_layer')]] +Module: <a href='[[bool['mod_layer']+ "_" + bool['mod_name'] + ".html#link_" + bool['bool_name']]]'> +[[bool['mod_name']]]</a><p/> +Layer: <a href='[[bool['mod_layer']]].html'> +[[bool['mod_layer']]]</a><p/> +[[else]] +Global +[[end]] +<div id="codeblock"> +[[bool['bool_name']]] +<small>(Default: [[bool['def_val']]])</small> +</div> +[[if bool['desc']]] +<div id="description"> +[[bool['desc']]] +</div> +[[end]] +</div> +[[end]] diff --git a/doc/templates/boolean.html b/doc/templates/boolean.html new file mode 100644 index 00000000..ea5a2604 --- /dev/null +++ b/doc/templates/boolean.html @@ -0,0 +1,13 @@ +[[for bool in booleans]] +<a name="link_[[bool['bool_name']]]"></a> +<div id="interface"> +<div id="codeblock">[[bool['bool_name']]]</div> +<div id="description"> +<h5>Default value</h5> +<p>[[bool['def_val']]]</p> +[[if bool['desc']]] +<h5>Description</h5> +[[bool['desc']]] +[[end]] +</div></div> +[[end]] diff --git a/doc/templates/global_bool_list.html b/doc/templates/global_bool_list.html new file mode 100644 index 00000000..a8065af8 --- /dev/null +++ b/doc/templates/global_bool_list.html @@ -0,0 +1,14 @@ +<h3>Global booleans:</h3> + +[[for bool in booleans]] +<div id="interface"> +<div id="codeblock">[[bool['bool_name']]]</div> +<div id="description"> +<h5>Default value</h5> +<p>[[bool['def_val']]]</p> +[[if bool['desc']]] +<h5>Description</h5> +[[bool['desc']]] +[[end]] +</div></div> +[[end]] diff --git a/doc/templates/global_tun_list.html b/doc/templates/global_tun_list.html new file mode 100644 index 00000000..6ed80133 --- /dev/null +++ b/doc/templates/global_tun_list.html @@ -0,0 +1,14 @@ +<h3>Global tunables:</h3> + +[[for tun in tunables]] +<div id="interface"> +<div id="codeblock">[[tun['tun_name']]]</div> +<div id="description"> +<h5>Default value</h5> +<p>[[tun['def_val']]]</p> +[[if tun['desc']]] +<h5>Description</h5> +[[tun['desc']]] +[[end]] +</div></div> +[[end]] diff --git a/doc/templates/header.html b/doc/templates/header.html new file mode 100644 index 00000000..9ef487cf --- /dev/null +++ b/doc/templates/header.html @@ -0,0 +1,15 @@ +<html> +<head> +<title> + Security Enhanced Linux Reference Policy + </title> +<style type="text/css" media="all">@import "style.css";</style> +</head> +<body> +<div id="Header">Security Enhanced Linux Reference Policy</div> +[[menu]] +<div id="Content"> +[[content]] +</div> +</body> +</html> diff --git a/doc/templates/int_list.html b/doc/templates/int_list.html new file mode 100644 index 00000000..b95c3435 --- /dev/null +++ b/doc/templates/int_list.html @@ -0,0 +1,33 @@ +<h3>Master interface index:</h3> + +[[for int in interfaces]] +<div id="interfacesmall"> +Module: <a href='[[int['mod_layer']+ "_" + int['mod_name'] + ".html#link_" + int['interface_name']]]'> +[[int['mod_name']]]</a><p/> +Layer: <a href='[[int['mod_layer']]].html'> +[[int['mod_layer']]]</a><p/> +<div id="codeblock"> +[[exec i = 0]] +<b>[[int['interface_name']]]</b>( + [[for arg in int['interface_parameters']]] + [[if i != 0]] + , + [[end]] + [[exec i = 1]] + [[if arg['optional'] == 'yes']] + [ + [[end]] + [[arg['name']]] + [[if arg['optional'] == 'yes']] + ] + [[end]] + [[end]] + )<br> +</div> +[[if int['interface_summary']]] +<div id="description"> +[[int['interface_summary']]] +</div> +[[end]] +</div> +[[end]] diff --git a/doc/templates/interface.html b/doc/templates/interface.html new file mode 100644 index 00000000..90eb4369 --- /dev/null +++ b/doc/templates/interface.html @@ -0,0 +1,50 @@ +[[for int in interfaces]] +<a name="link_[[int['interface_name']]]"></a> +<div id="interface"> +[[if int.has_key("mod_layer")]] + Layer: [[mod_layer]]<br> +[[end]] +[[if int.has_key("mod_name")]] + Module: [[mod_name]]<br> +[[end]] +<div id="codeblock"> +[[exec i = 0]] +<b>[[int['interface_name']]]</b>( + [[for arg in int['interface_parameters']]] + [[if i != 0]] + , + [[end]] + [[exec i = 1]] + [[if arg['optional'] == 'yes']] + [ + [[end]] + [[arg['name']]] + [[if arg['optional'] == 'yes']] + ] + [[end]] + [[end]] + )<br> +</div> +<div id="description"> +[[if int['interface_summary']]] +<h5>Summary</h5> +[[int['interface_summary']]] +[[end]] +[[if int['interface_desc']]] +<h5>Description</h5> +[[int['interface_desc']]] +[[end]] +<h5>Parameters</h5> +<table border="1" cellspacing="0" cellpadding="3" width="65%"> +<tr><th >Parameter:</th><th >Description:</th></tr> +[[for arg in int['interface_parameters']]] +<tr><td> +[[arg['name']]] +</td><td> +[[arg['desc']]] +</td></tr> +[[end]] +</table> +</div> +</div> +[[end]] diff --git a/doc/templates/menu.html b/doc/templates/menu.html new file mode 100644 index 00000000..9472b2c3 --- /dev/null +++ b/doc/templates/menu.html @@ -0,0 +1,26 @@ +<div id='Menu'> + [[for layer_name, layer_mods in menulist]] + <a href="[[layer_name]].html">+ + [[layer_name]]</a></br/> + <div id='subitem'> + [[for module, s in layer_mods]] + - <a href='[[layer_name + "_" + module]].html'> + [[module]]</a><br/> + [[end]] + </div> + [[end]] + <br/><p/> + <a href="global_booleans.html">* Global Booleans </a> + <br/><p/> + <a href="global_tunables.html">* Global Tunables </a> + <p/><br/><p/> + <a href="index.html">* Layer Index</a> + <br/><p/> + <a href="booleans.html">* Boolean Index</a> + <br/><p/> + <a href="tunables.html">* Tunable Index</a> + <br/><p/> + <a href="interfaces.html">* Interface Index</a> + <br/><p/> + <a href="templates.html">* Template Index</a> +</div> diff --git a/doc/templates/module.html b/doc/templates/module.html new file mode 100644 index 00000000..a8d008a8 --- /dev/null +++ b/doc/templates/module.html @@ -0,0 +1,52 @@ +<a name="top":></a> +<h1>Layer: [[mod_layer]]</h1><p/> +<h2>Module: [[mod_name]]</h2><p/> +[[if booleans]] +<a href=#booleans>Booleans</a> +[[end]] +[[if tunables]] +<a href=#tunables>Tunables</a> +[[end]] +[[if interfaces]] +<a href=#interfaces>Interfaces</a> +[[end]] +[[if templates]] +<a href=#templates>Templates</a> +[[end]] +<h3>Description:</h3> +[[if mod_desc]] +<p>[[mod_desc]]</p> +[[else]] +<p>[[mod_summary]]</p> +[[end]] +[[if mod_req]] +<p>This module is required to be included in all policies.</p> +[[end]] +<hr> +[[if booleans]] +<a name="booleans"></a> +<h3>Booleans: </h3> +[[booleans]] +<a href=#top>Return</a> +[[end]] +[[if tunables]] +<a name="tunables"></a> +<h3>Tunables: </h3> +[[tunables]] +<a href=#top>Return</a> +[[end]] +[[if interfaces]] +<a name="interfaces"></a> +<h3>Interfaces: </h3> +[[interfaces]] +<a href=#top>Return</a> +[[end]] +[[if templates]] +<a name="templates"></a> +<h3>Templates: </h3> +[[templates]] +<a href=#top>Return</a> +[[end]] +[[if not templates and not interfaces and not tunables]] +<h3>No booleans, tunables, interfaces, or templates.</h3> +[[end]] diff --git a/doc/templates/module_list.html b/doc/templates/module_list.html new file mode 100644 index 00000000..7317a6be --- /dev/null +++ b/doc/templates/module_list.html @@ -0,0 +1,19 @@ +[[if mod_layer]] +<h1>Layer: [[mod_layer]]</h1><p/> +[[if layer_summary]] +<p>[[layer_summary]]</p><br/> +[[end]] +[[end]] +<table border="1" cellspacing="0" cellpadding="3" width="75%"> +<tr><td class="title">Module:</td><td class="title">Description:</td></tr> + [[for layer_name, layer_mods in menulist]] + [[for module, s in layer_mods]] + <tr><td> + <a href='[[layer_name + "_" + module]].html'> + [[module]]</a></td> + <td>[[s]]</td> + [[end]] + </td></tr> + [[end]] +</table> +<p/><br/><br/> diff --git a/doc/templates/style.css b/doc/templates/style.css new file mode 100644 index 00000000..9bac0d96 --- /dev/null +++ b/doc/templates/style.css @@ -0,0 +1,216 @@ +body { + margin:0px; + padding:0px; + font-family:verdana, arial, helvetica, sans-serif; + color:#333; + background-color:white; + } +h1 { + margin:0px 0px 5px 0px; + padding:0px; + font-size:150% + line-height:28px; + font-weight:900; + color:#ccc; + } +h2 { + font-size:125%; + margin:0px; + padding:5px 0px 10px 0px; + } +h3 { + font-size:110%; + margin:0px; + padding:5px 0px 10px 5px; + } +h4 { + font-size:100%; + margin:0px; + padding:5px 0px 10px 5px; + } +h5 { + font-size:100%; + margin:0px; + font-weight:600; + padding:0px 0px 5px 0px; + margin:0px 0px 0px 5px; +} +li { + font:11px/20px verdana, arial, helvetica, sans-serif; + margin:0px 0px 0px 10px; + padding:0px; + } +p { + /* normal */ + font:11px/20px verdana, arial, helvetica, sans-serif; + margin:0px 0px 0px 10px; + padding:0px; + } + +tt { + /* inline code */ + font-family: monospace; + } + +table { + background-color:#efefef; + /*background-color: white;*/ + border-style:solid; + border-color:black; + border-width:0px 1px 1px 0px; + color: black; + text-align: left; + font:11px/20px verdana, arial, helvetica, sans-serif; + margin-left: 5%; + margin-right: 5%; +} + +th { + font-weight:500; + background-color: #eaeaef; + text-align: center; +} + +td.header { + font-weight: bold; +} + +#Content>p {margin:0px;} +#Content>p+p {text-indent:30px;} +a { + color:#09c; + font-size:11px; + text-decoration:none; + font-weight:600; + font-family:verdana, arial, helvetica, sans-serif; + } +a:link {color:#09c;} +a:visited {color:#07a;} +a:hover {background-color:#eee;} + +#Codeblock { + margin:5px 50px 5px 10px; + padding:5px 0px 5px 15px; + border-style:solid; + border-color:lightgrey; + border-width:1px 1px 1px 1px; + background-color:#f5f5ff; + font-size:100%; + font-weight:600; + text-decoration:none; + font-family:monospace; +} +#Interface { + margin:5px 0px 25px 5px; + padding:5px 0px 5px 5px; + border-style:solid; + border-color:black; + border-width:1px 1px 1px 1px; + background-color:#fafafa; + font-size:14px; + font-weight:400; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; +} +#Interfacesmall { + margin:0px 0px 5px 0px; + padding:5px 0px 0px 5px; + border-style:solid; + border-color:black; + border-width:1px 1px 1px 1px; + background-color:#fafafa; + font-size:14px; + font-weight:400; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; +} +#Template { + margin:5px 0px 25px 5px; + padding:5px 0px 5px 5px; + border-style:solid; + border-color:black; + border-width:1px 1px 1px 1px; + background-color:#fafafa; + font-size:14px; + font-weight:400; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; +} +#Templatesmall { + margin:0px 0px 5px 0px; + padding:5px 0px 0px 5px; + border-style:solid; + border-color:black; + border-width:1px 1px 1px 1px; + background-color:#fafafa; + font-size:14px; + font-weight:400; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; +} +#Description { + margin:0px 0px 0px 5px; + padding:0px 0px 0px 5px; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; + font-size:12px; + font-weight:400; +} +pre { + margin:0px; + padding:0px; + font-size:14px; + text-decoration:none; + font-family:verdana, arial, helvetica, sans-serif; +} +dl { + /* definition text block */ + font:11px/20px verdana, arial, helvetica, sans-serif; + margin:0px 0px 16px 0px; + padding:0px; + } +dt { + /* definition term */ + font-weight: bold; + } + +#Header { + margin:50px 0px 10px 0px; + padding:17px 0px 0px 20px; + /* For IE5/Win's benefit height = [correct height] + [top padding] + [top and bottom border widths] */ + height:33px; /* 14px + 17px + 2px = 33px */ + border-style:solid; + border-color:black; + border-width:1px 0px; /* top and bottom borders: 1px; left and right borders: 0px */ + line-height:11px; + font-size:110%; + background-color:#eee; + voice-family: "\"}\""; + voice-family:inherit; + height:14px; /* the correct height */ + } +body>#Header {height:14px;} +#Content { + margin:0px 50px 0px 200px; + padding:10px; + } + +#Menu { + position:absolute; + top:100px; + left:20px; + width:162px; + padding:10px; + background-color:#eee; + border:1px solid #aaa; + line-height:17px; + text-align:left; + voice-family: "\"}\""; + voice-family:inherit; + width:160px; + } +#Menu subitem { + font-size: 5px; +} + +body>#Menu {width:160px;} diff --git a/doc/templates/temp_list.html b/doc/templates/temp_list.html new file mode 100644 index 00000000..9d635d87 --- /dev/null +++ b/doc/templates/temp_list.html @@ -0,0 +1,33 @@ +<h3>Master template index:</h3> + +[[for temp in templates]] +<div id="templatesmall"> +Module: <a href='[[temp['mod_layer']+ "_" + temp['mod_name'] + ".html#link_" + temp['template_name']]]'> +[[temp['mod_name']]]</a><p/> +Layer: <a href='[[temp['mod_layer']]].html'> +[[temp['mod_layer']]]</a><p/> +<div id="codeblock"> +[[exec i = 0]] +<b>[[temp['template_name']]]</b>( + [[for arg in temp['template_parameters']]] + [[if i != 0]] + , + [[end]] + [[exec i = 1]] + [[if arg['optional'] == 'yes']] + [ + [[end]] + [[arg['name']]] + [[if arg['optional'] == 'yes']] + ] + [[end]] + [[end]] + )<br> +</div> +[[if temp['template_summary']]] +<div id="description"> +[[temp['template_summary']]] +</div> +[[end]] +</div> +[[end]] diff --git a/doc/templates/template.html b/doc/templates/template.html new file mode 100644 index 00000000..251d2277 --- /dev/null +++ b/doc/templates/template.html @@ -0,0 +1,50 @@ +[[for temp in templates]] +<a name="link_[[temp['template_name']]]"></a> +<div id="template"> +[[if temp.has_key("mod_layer")]] + Layer: [[mod_layer]]<br> +[[end]] +[[if temp.has_key("mod_name")]] + Module: [[mod_name]]<br> +[[end]] +<div id="codeblock"> +[[exec i = 0]] +<b>[[temp['template_name']]]</b>( + [[for arg in temp['template_parameters']]] + [[if i != 0]] + , + [[end]] + [[exec i = 1]] + [[if arg['optional'] == 'yes']] + [ + [[end]] + [[arg['name']]] + [[if arg['optional'] == 'yes']] + ] + [[end]] + [[end]] + )<br> +</div> +<div id="description"> +[[if temp['template_summary']]] +<h5>Summary</h5> +[[temp['template_summary']]] +[[end]] +[[if temp['template_desc']]] +<h5>Description</h5> +[[temp['template_desc']]] +[[end]] +<h5>Parameters</h5> +<table border="1" cellspacing="0" cellpadding="3" width="65%"> +<tr><th >Parameter:</th><th >Description:</th></tr> +[[for arg in temp['template_parameters']]] +<tr><td> +[[arg['name']]] +</td><td> +[[arg['desc']]] +</td></tr> +[[end]] +</table> +</div> +</div> +[[end]] diff --git a/doc/templates/tun_list.html b/doc/templates/tun_list.html new file mode 100644 index 00000000..278f284c --- /dev/null +++ b/doc/templates/tun_list.html @@ -0,0 +1,23 @@ +<h3>Master tunable index:</h3> + +[[for tun in tunables]] +<div id="interfacesmall"> +[[if tun.has_key('mod_layer')]] +Module: <a href='[[tun['mod_layer']+ "_" + tun['mod_name'] + ".html#link_" + tun['tun_name']]]'> +[[tun['mod_name']]]</a><p/> +Layer: <a href='[[tun['mod_layer']]].html'> +[[tun['mod_layer']]]</a><p/> +[[else]] +Global +[[end]] +<div id="codeblock"> +[[tun['tun_name']]] +<small>(Default: [[tun['def_val']]])</small> +</div> +[[if tun['desc']]] +<div id="description"> +[[tun['desc']]] +</div> +[[end]] +</div> +[[end]] diff --git a/doc/templates/tunable.html b/doc/templates/tunable.html new file mode 100644 index 00000000..9316779e --- /dev/null +++ b/doc/templates/tunable.html @@ -0,0 +1,13 @@ +[[for tun in tunables]] +<a name="link_[[tun['tun_name']]]"></a> +<div id="interface"> +<div id="codeblock">[[tun['tun_name']]]</div> +<div id="description"> +<h5>Default value</h5> +<p>[[tun['def_val']]]</p> +[[if tun['desc']]] +<h5>Description</h5> +[[tun['desc']]] +[[end]] +</div></div> +[[end]] |