|
Chris PeBenito |
0fbfa5 |
#DESC Passwd - Password utilities
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
# Authors: Stephen Smalley <sds@epoch.ncsc.mil> and Timothy Fraser
|
|
Chris PeBenito |
0fbfa5 |
# X-Debian-Packages: passwd
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
#################################
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
# Rules for the passwd_t domain.
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
define(`base_passwd_domain', `
|
|
Chris PeBenito |
0fbfa5 |
type $1_t, domain, privlog, $2;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# for SSP
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t urandom_device_t:chr_file read;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t self:process setrlimit;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
general_domain_access($1_t);
|
|
Chris PeBenito |
0fbfa5 |
uses_shlib($1_t);
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# Inherit and use descriptors from login.
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t privfd:fd use;
|
|
Chris PeBenito |
0fbfa5 |
ifdef(`gnome-pty-helper.te', `allow $1_t gphdomain:fd use;')
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
read_locale($1_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t fs_t:filesystem getattr;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# allow checking if a shell is executable
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t shell_exec_t:file execute;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# Obtain contexts
|
|
Chris PeBenito |
0fbfa5 |
can_getsecurity($1_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t etc_t:file create_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# read /etc/mtab
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t etc_runtime_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# Allow etc_t symlinks for /etc/alternatives on Debian.
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t etc_t:lnk_file read;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# Use capabilities.
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t self:capability { chown dac_override fsetid setuid setgid sys_resource };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# Access terminals.
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t { ttyfile ptyfile }:chr_file rw_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t devtty_t:chr_file rw_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
dontaudit $1_t devpts_t:dir getattr;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# /usr/bin/passwd asks for w access to utmp, but it will operate
|
|
Chris PeBenito |
0fbfa5 |
# correctly without it. Do not audit write denials to utmp.
|
|
Chris PeBenito |
0fbfa5 |
dontaudit $1_t initrc_var_run_t:file { read write };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# user generally runs this from their home directory, so do not audit a search
|
|
Chris PeBenito |
0fbfa5 |
# on user home dir
|
|
Chris PeBenito |
0fbfa5 |
dontaudit $1_t { user_home_dir_type user_home_type }:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# When the wrong current passwd is entered, passwd, for some reason,
|
|
Chris PeBenito |
0fbfa5 |
# attempts to access /proc and /dev, but handles failure appropriately. So
|
|
Chris PeBenito |
0fbfa5 |
# do not audit those denials.
|
|
Chris PeBenito |
0fbfa5 |
dontaudit $1_t { proc_t device_t }:dir { search read };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t device_t:dir getattr;
|
|
Chris PeBenito |
0fbfa5 |
')
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
#################################
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
# Rules for the passwd_t domain.
|
|
Chris PeBenito |
0fbfa5 |
#
|
|
Chris PeBenito |
0fbfa5 |
define(`passwd_domain', `
|
|
Chris PeBenito |
0fbfa5 |
base_passwd_domain($1, `auth_write, privowner')
|
|
Chris PeBenito |
0fbfa5 |
# Update /etc/shadow and /etc/passwd
|
|
Chris PeBenito |
0fbfa5 |
file_type_auto_trans($1_t, etc_t, shadow_t, file)
|
|
Chris PeBenito |
0fbfa5 |
allow $1_t { etc_t shadow_t }:file { relabelfrom relabelto };
|
|
Chris PeBenito |
0fbfa5 |
can_setfscreate($1_t)
|
|
Chris PeBenito |
0fbfa5 |
')
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
passwd_domain(passwd)
|
|
Chris PeBenito |
0fbfa5 |
passwd_domain(sysadm_passwd)
|
|
Chris PeBenito |
0fbfa5 |
base_passwd_domain(chfn, `auth_chkpwd, etc_writer, privowner')
|
|
Chris PeBenito |
0fbfa5 |
can_setfscreate(chfn_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# can exec /sbin/unix_chkpwd
|
|
Chris PeBenito |
0fbfa5 |
allow chfn_t { bin_t sbin_t }:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# uses unix_chkpwd for checking passwords
|
|
Chris PeBenito |
0fbfa5 |
dontaudit chfn_t shadow_t:file read;
|
|
Chris PeBenito |
0fbfa5 |
allow chfn_t etc_t:dir rw_dir_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow chfn_t etc_t:file create_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow chfn_t proc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
allow chfn_t self:file write;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
in_user_role(passwd_t)
|
|
Chris PeBenito |
0fbfa5 |
in_user_role(chfn_t)
|
|
Chris PeBenito |
0fbfa5 |
role sysadm_r types passwd_t;
|
|
Chris PeBenito |
0fbfa5 |
role sysadm_r types sysadm_passwd_t;
|
|
Chris PeBenito |
0fbfa5 |
role sysadm_r types chfn_t;
|
|
Chris PeBenito |
0fbfa5 |
role system_r types passwd_t;
|
|
Chris PeBenito |
0fbfa5 |
role system_r types chfn_t;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
type admin_passwd_exec_t, file_type, sysadmfile;
|
|
Chris PeBenito |
0fbfa5 |
type passwd_exec_t, file_type, sysadmfile, exec_type;
|
|
Chris PeBenito |
0fbfa5 |
type chfn_exec_t, file_type, sysadmfile, exec_type;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
domain_auto_trans({ userdomain ifdef(`firstboot.te', `firstboot_t') }, passwd_exec_t, passwd_t)
|
|
Chris PeBenito |
0fbfa5 |
domain_auto_trans({ userdomain ifdef(`firstboot.te', `firstboot_t') }, chfn_exec_t, chfn_t)
|
|
Chris PeBenito |
0fbfa5 |
domain_auto_trans(sysadm_t, admin_passwd_exec_t, sysadm_passwd_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
dontaudit chfn_t var_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
ifdef(`crack.te', `
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t var_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
dontaudit passwd_t var_run_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t crack_db_t:dir r_dir_perms;
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t crack_db_t:file r_file_perms;
|
|
Chris PeBenito |
0fbfa5 |
', `
|
|
Chris PeBenito |
0fbfa5 |
dontaudit passwd_t var_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
')
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# allow vipw to exec the editor
|
|
Chris PeBenito |
0fbfa5 |
allow sysadm_passwd_t { root_t bin_t sbin_t }:dir search;
|
|
Chris PeBenito |
0fbfa5 |
allow sysadm_passwd_t bin_t:lnk_file read;
|
|
Chris PeBenito |
0fbfa5 |
can_exec(sysadm_passwd_t, { shell_exec_t bin_t })
|
|
Chris PeBenito |
0fbfa5 |
r_dir_file(sysadm_passwd_t, usr_t)
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# allow vipw to create temporary files under /var/tmp/vi.recover
|
|
Chris PeBenito |
0fbfa5 |
allow sysadm_passwd_t var_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
tmp_domain(sysadm_passwd)
|
|
Chris PeBenito |
0fbfa5 |
# for vipw - vi looks in the root home directory for config
|
|
Chris PeBenito |
0fbfa5 |
dontaudit sysadm_passwd_t sysadm_home_dir_t:dir { getattr search };
|
|
Chris PeBenito |
0fbfa5 |
# for /etc/alternatives/vi
|
|
Chris PeBenito |
0fbfa5 |
allow sysadm_passwd_t etc_t:lnk_file read;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# for nscd lookups
|
|
Chris PeBenito |
0fbfa5 |
dontaudit sysadm_passwd_t var_run_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# for /proc/meminfo
|
|
Chris PeBenito |
0fbfa5 |
allow sysadm_passwd_t proc_t:file { getattr read };
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
dontaudit { chfn_t passwd_t sysadm_passwd_t } selinux_config_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
dontaudit sysadm_passwd_t devpts_t:dir search;
|
|
Chris PeBenito |
0fbfa5 |
|
|
Chris PeBenito |
0fbfa5 |
# make sure that getcon succeeds
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t userdomain:dir search;
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t userdomain:file read;
|
|
Chris PeBenito |
0fbfa5 |
allow passwd_t userdomain:process getattr;
|
|
Chris PeBenito |
0fbfa5 |
|