|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
# Macros for chkpwd domains.
|
|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
# chkpwd_domain(domain_prefix)
|
|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
# Define a derived domain for the *_chkpwd program when executed
|
|
Chris PeBenito |
31b7c0 |
# by a user domain.
|
|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
# The type declaration for the executable type for this program is
|
|
Chris PeBenito |
31b7c0 |
# provided separately in domains/program/su.te.
|
|
Chris PeBenito |
31b7c0 |
#
|
|
Chris PeBenito |
31b7c0 |
undefine(`chkpwd_domain')
|
|
Chris PeBenito |
31b7c0 |
ifdef(`chkpwd.te', `
|
|
Chris PeBenito |
31b7c0 |
define(`chkpwd_domain',`
|
|
Chris PeBenito |
31b7c0 |
# Derived domain based on the calling user domain and the program.
|
|
Chris PeBenito |
31b7c0 |
type $1_chkpwd_t, domain, privlog, nscd_client_domain, auth;
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
role $1_r types $1_chkpwd_t;
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# read /selinux/mls
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t security_t:dir search;
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t security_t:file read;
|
|
Chris PeBenito |
31b7c0 |
# is_selinux_enabled
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t proc_t:file read;
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
can_getcon($1_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
authentication_domain($1_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
ifelse($1, system, `
|
|
Chris PeBenito |
31b7c0 |
domain_auto_trans(auth_chkpwd, chkpwd_exec_t, system_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
dontaudit system_chkpwd_t { user_tty_type tty_device_t }:chr_file rw_file_perms;
|
|
Chris PeBenito |
31b7c0 |
authentication_domain(auth_chkpwd)
|
|
Chris PeBenito |
31b7c0 |
', `
|
|
Chris PeBenito |
31b7c0 |
domain_auto_trans($1_t, chkpwd_exec_t, $1_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# Write to the user domain tty.
|
|
Chris PeBenito |
31b7c0 |
access_terminal($1_chkpwd_t, $1)
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t privfd:fd use;
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# Inherit and use descriptors from gnome-pty-helper.
|
|
Chris PeBenito |
31b7c0 |
ifdef(`gnome-pty-helper.te',`allow $1_chkpwd_t $1_gph_t:fd use;')
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# Inherit and use descriptors from newrole.
|
|
Chris PeBenito |
31b7c0 |
ifdef(`newrole.te', `allow $1_chkpwd_t newrole_t:fd use;')
|
|
Chris PeBenito |
31b7c0 |
')
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
uses_shlib($1_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t etc_t:file { getattr read };
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t self:unix_dgram_socket create_socket_perms;
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t self:unix_stream_socket create_socket_perms;
|
|
Chris PeBenito |
31b7c0 |
read_locale($1_chkpwd_t)
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# Use capabilities.
|
|
Chris PeBenito |
31b7c0 |
allow $1_chkpwd_t self:capability setuid;
|
|
Chris PeBenito |
31b7c0 |
r_dir_file($1_chkpwd_t, selinux_config_t)
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
# for nscd
|
|
Chris PeBenito |
31b7c0 |
ifdef(`nscd.te', `', `
|
|
Chris PeBenito |
31b7c0 |
dontaudit $1_chkpwd_t var_t:dir search;
|
|
Chris PeBenito |
31b7c0 |
')
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
dontaudit $1_chkpwd_t fs_t:filesystem getattr;
|
|
Chris PeBenito |
31b7c0 |
')
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
', `
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
define(`chkpwd_domain',`')
|
|
Chris PeBenito |
31b7c0 |
|
|
Chris PeBenito |
31b7c0 |
')
|