policy_module(mta,1.1.3) ######################################## # # Declarations # attribute mta_user_agent; attribute mailserver_delivery; attribute mailserver_domain; attribute mailserver_sender; attribute user_mail_domain; type etc_aliases_t; files_type(etc_aliases_t) type etc_mail_t; files_config_file(etc_mail_t) type mqueue_spool_t; files_type(mqueue_spool_t) type mail_spool_t; files_type(mail_spool_t) type sendmail_exec_t; files_type(sendmail_exec_t) mta_base_mail_template(system) role system_r types system_mail_t; # cjp: need to resolve this, but require{} # does not work in the else part of the optional #ifdef(`strict_policy',` # optional_policy(`sendmail',`',` # init_system_domain(system_mail_t,sendmail_exec_t) # ') #') ######################################## # # System mail local policy # allow system_mail_t etc_mail_t:dir { getattr search }; allow system_mail_t etc_mail_t:file r_file_perms; kernel_read_system_state(system_mail_t) kernel_read_network_state(system_mail_t) dev_read_rand(system_mail_t) dev_read_urand(system_mail_t) init_use_script_pty(system_mail_t) userdom_use_sysadm_terms(system_mail_t) ifdef(`targeted_policy',` typealias system_mail_t alias sysadm_mail_t; allow system_mail_t mail_spool_t:dir create_dir_perms; allow system_mail_t mail_spool_t:file create_file_perms; allow system_mail_t mail_spool_t:lnk_file create_lnk_perms; allow system_mail_t mail_spool_t:fifo_file rw_file_perms; allow system_mail_t mqueue_spool_t:dir create_dir_perms; allow system_mail_t mqueue_spool_t:file create_file_perms; allow system_mail_t mqueue_spool_t:lnk_file create_lnk_perms; # for reading .forward - maybe we need a new type for it? # also for delivering mail to maildir # cjp: fix this to generic_user interfaces userdom_manage_user_home_subdirs(user,mailserver_delivery) userdom_manage_user_home_subdir_files(user,mailserver_delivery) userdom_manage_user_home_subdir_symlinks(user,mailserver_delivery) userdom_manage_user_home_subdir_pipes(user,mailserver_delivery) userdom_manage_user_home_subdir_sockets(user,mailserver_delivery) userdom_create_user_home(user,mailserver_delivery,{ dir file lnk_file fifo_file sock_file }) # cjp: another require-in-else to resolve # optional_policy(`postfix',`',` corecmd_exec_bin(system_mail_t) corecmd_exec_sbin(system_mail_t) domain_exec_all_entry_files(system_mail_t) files_exec_etc_files(system_mail_t) libs_exec_ld_so(system_mail_t) libs_exec_lib_files(system_mail_t) # ') ') optional_policy(`apache',` apache_read_squirrelmail_data(system_mail_t) apache_append_squirrelmail_data(system_mail_t) # apache should set close-on-exec apache_dontaudit_append_log(system_mail_t) apache_dontaudit_rw_stream_socket(system_mail_t) apache_dontaudit_rw_tcp_socket(system_mail_t) apache_dontaudit_rw_sys_script_stream_socket(system_mail_t) ') optional_policy(`arpwatch',` arpwatch_manage_tmp_files(system_mail_t) ifdef(`hide_broken_symptoms', ` arpwatch_dontaudit_rw_packet_socket(system_mail_t) ') ') optional_policy(`cron',` cron_read_system_job_tmp_files(system_mail_t) cron_dontaudit_write_pipe(system_mail_t) ') optional_policy(`cvs',` cvs_read_data(system_mail_t) ') optional_policy(`logrotate',` logrotate_read_tmp_files(system_mail_t) ') optional_policy(`logwatch',` logwatch_read_tmp_files(system_mail_t) ') optional_policy(`sendmail',` files_filetrans_etc(sendmail_t,etc_aliases_t, file) ') optional_policy(`postfix',` allow system_mail_t etc_aliases_t:dir create_dir_perms; allow system_mail_t etc_aliases_t:file create_file_perms; allow system_mail_t etc_aliases_t:lnk_file create_lnk_perms; allow system_mail_t etc_aliases_t:sock_file create_file_perms; allow system_mail_t etc_aliases_t:fifo_file create_file_perms; files_filetrans_etc(system_mail_t,etc_aliases_t,{ file lnk_file sock_file fifo_file }) domain_use_wide_inherit_fd(system_mail_t) # postfix needs this for newaliases files_getattr_tmp_dir(system_mail_t) postfix_exec_master(system_mail_t) ifdef(`distro_redhat',` # compatability for old default main.cf postfix_filetrans_config(system_mail_t,etc_aliases_t,{ dir file lnk_file sock_file fifo_file }) ') optional_policy(`cron',` cron_crw_tcp_socket(system_mail_t) ') ') optional_policy(`sendmail',` userdom_dontaudit_use_unpriv_user_pty(system_mail_t) optional_policy(`cron',` cron_dontaudit_append_system_job_tmp_files(system_mail_t) ') ') optional_policy(`smartmon',` smartmon_read_tmp(system_mail_t) ') # should break this up among sections: optional_policy(`arpwatch',` # why is mail delivered to a directory of type arpwatch_data_t? arpwatch_search_data(mailserver_delivery) arpwatch_manage_tmp_files(mta_user_agent) ifdef(`hide_broken_symptoms', ` arpwatch_dontaudit_rw_packet_socket(mta_user_agent) ') optional_policy(`cron',` cron_read_system_job_tmp_files(mta_user_agent) ') ') ifdef(`TODO',` # for the start script to run make -C /etc/mail allow initrc_t etc_mail_t:dir rw_dir_perms; allow initrc_t etc_mail_t:file create_file_perms; ')