aboutsummaryrefslogtreecommitdiff
blob: b1ed1bf4d4ead0cbd1aa8d322db0573c7dd7152d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
policy_module(radius, 1.12.0)

########################################
#
# Declarations
#

type radiusd_t;
type radiusd_exec_t;
init_daemon_domain(radiusd_t, radiusd_exec_t)

type radiusd_etc_t;
files_config_file(radiusd_etc_t)

type radiusd_etc_rw_t;
files_type(radiusd_etc_rw_t)

type radiusd_initrc_exec_t;
init_script_file(radiusd_initrc_exec_t)

type radiusd_log_t;
logging_log_file(radiusd_log_t)

type radiusd_var_lib_t;
files_type(radiusd_var_lib_t)

type radiusd_var_run_t;
files_pid_file(radiusd_var_run_t)

########################################
#
# Local policy
#

# fsetid is for gzip which needs it when run from scripts
# gzip also needs chown access to preserve GID for radwtmp files
allow radiusd_t self:capability { chown dac_override fsetid kill setgid setuid sys_resource sys_tty_config };
dontaudit radiusd_t self:capability sys_tty_config;
allow radiusd_t self:process { getsched setrlimit setsched sigkill signal };
allow radiusd_t self:fifo_file rw_fifo_file_perms;
allow radiusd_t self:unix_stream_socket create_stream_socket_perms;
allow radiusd_t self:tcp_socket create_stream_socket_perms;
allow radiusd_t self:udp_socket create_socket_perms;

allow radiusd_t radiusd_etc_t:dir list_dir_perms;
read_files_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_t)
read_lnk_files_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_t)
files_search_etc(radiusd_t)

manage_dirs_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
manage_files_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
manage_lnk_files_pattern(radiusd_t, radiusd_etc_rw_t, radiusd_etc_rw_t)
filetrans_pattern(radiusd_t, radiusd_etc_t, radiusd_etc_rw_t, { dir file lnk_file })

manage_dirs_pattern(radiusd_t, radiusd_log_t, radiusd_log_t)
manage_files_pattern(radiusd_t, radiusd_log_t, radiusd_log_t)
logging_log_filetrans(radiusd_t, radiusd_log_t, { file dir })

manage_files_pattern(radiusd_t, radiusd_var_lib_t, radiusd_var_lib_t)

manage_sock_files_pattern(radiusd_t, radiusd_var_run_t, radiusd_var_run_t)
manage_dirs_pattern(radiusd_t, radiusd_var_run_t, radiusd_var_run_t)
manage_files_pattern(radiusd_t, radiusd_var_run_t, radiusd_var_run_t)
files_pid_filetrans(radiusd_t, radiusd_var_run_t, { file sock_file dir })

kernel_read_kernel_sysctls(radiusd_t)
kernel_read_system_state(radiusd_t)

corenet_all_recvfrom_unlabeled(radiusd_t)
corenet_all_recvfrom_netlabel(radiusd_t)
corenet_tcp_sendrecv_generic_if(radiusd_t)
corenet_udp_sendrecv_generic_if(radiusd_t)
corenet_tcp_sendrecv_generic_node(radiusd_t)
corenet_udp_sendrecv_generic_node(radiusd_t)
corenet_tcp_sendrecv_all_ports(radiusd_t)
corenet_udp_sendrecv_all_ports(radiusd_t)
corenet_udp_bind_generic_node(radiusd_t)
corenet_udp_bind_radacct_port(radiusd_t)
corenet_udp_bind_radius_port(radiusd_t)
corenet_tcp_connect_mysqld_port(radiusd_t)
corenet_tcp_connect_snmp_port(radiusd_t)
corenet_sendrecv_radius_server_packets(radiusd_t)
corenet_sendrecv_radacct_server_packets(radiusd_t)
corenet_sendrecv_mysqld_client_packets(radiusd_t)
corenet_sendrecv_snmp_client_packets(radiusd_t)
# for RADIUS proxy port
corenet_udp_bind_generic_port(radiusd_t)
corenet_dontaudit_udp_bind_all_ports(radiusd_t)
corenet_sendrecv_generic_server_packets(radiusd_t)

dev_read_sysfs(radiusd_t)

fs_getattr_all_fs(radiusd_t)
fs_search_auto_mountpoints(radiusd_t)

corecmd_exec_bin(radiusd_t)
corecmd_exec_shell(radiusd_t)

domain_use_interactive_fds(radiusd_t)

files_read_usr_files(radiusd_t)
files_read_etc_files(radiusd_t)
files_read_etc_runtime_files(radiusd_t)

auth_use_nsswitch(radiusd_t)
auth_read_shadow(radiusd_t)
auth_domtrans_chk_passwd(radiusd_t)

libs_exec_lib_files(radiusd_t)

logging_send_syslog_msg(radiusd_t)

miscfiles_read_localization(radiusd_t)
miscfiles_read_generic_certs(radiusd_t)

userdom_dontaudit_use_unpriv_user_fds(radiusd_t)
userdom_dontaudit_search_user_home_dirs(radiusd_t)

optional_policy(`
	cron_system_entry(radiusd_t, radiusd_exec_t)
')

optional_policy(`
	logrotate_exec(radiusd_t)
')

optional_policy(`
	mysql_read_config(radiusd_t)
	mysql_stream_connect(radiusd_t)
')

optional_policy(`
	samba_domtrans_winbind_helper(radiusd_t)
	samba_read_var_files(radiusd_t)
')

optional_policy(`
	seutil_sigchld_newrole(radiusd_t)
')

optional_policy(`
	udev_read_db(radiusd_t)
')