diff --git a/policy/modules/system/iptables.fc b/policy/modules/system/iptables.fc index ac6c789..13f62a6 100644 --- a/policy/modules/system/iptables.fc +++ b/policy/modules/system/iptables.fc @@ -1,7 +1,13 @@ -/sbin/ip6tables.* -- gen_context(system_u:object_r:iptables_exec_t,s0) -/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) -/sbin/iptables.* -- gen_context(system_u:object_r:iptables_exec_t,s0) +/etc/rc\.d/init\.d/ip6?tables -- gen_context(system_u:object_r:iptables_initrc_exec_t,s0) +/etc/sysconfig/ip6?tables.* -- gen_context(system_u:object_r:iptables_conf_t,s0) +/etc/sysconfig/system-config-firewall.* -- gen_context(system_u:object_r:iptables_conf_t,s0) -/usr/sbin/ip6tables.* -- gen_context(system_u:object_r:iptables_exec_t,s0) -/usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) -/usr/sbin/iptables.* -- gen_context(system_u:object_r:iptables_exec_t,s0) +/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) +/sbin/ip6?tables -- gen_context(system_u:object_r:iptables_exec_t,s0) +/sbin/ip6?tables-restore -- gen_context(system_u:object_r:iptables_exec_t,s0) +/sbin/ip6?tables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) + +/usr/sbin/ipchains.* -- gen_context(system_u:object_r:iptables_exec_t,s0) +/usr/sbin/iptables -- gen_context(system_u:object_r:iptables_exec_t,s0) +/usr/sbin/iptables-multi -- gen_context(system_u:object_r:iptables_exec_t,s0) +/usr/sbin/iptables-restore -- gen_context(system_u:object_r:iptables_exec_t,s0) diff --git a/policy/modules/system/iptables.if b/policy/modules/system/iptables.if index 9012783..6aca04d 100644 --- a/policy/modules/system/iptables.if +++ b/policy/modules/system/iptables.if @@ -69,3 +69,99 @@ interface(`iptables_exec',` corecmd_search_bin($1) can_exec($1, iptables_exec_t) ') + +##################################### +## +## Execute iptables in the iptables domain. +## +## +## +## The type of the process performing this action. +## +## +# +interface(`iptables_initrc_domtrans',` + gen_require(` + type iptables_initrc_exec_t; + ') + + init_labeled_script_domtrans($1, iptables_initrc_exec_t) +') + +##################################### +## +## Set the attributes of iptables config files. +## +## +## +## Domain allowed access. +## +## +# +interface(`iptables_setattr_config',` + gen_require(` + type iptables_conf_t; + ') + + files_search_etc($1) + allow $1 iptables_conf_t:file setattr; +') + +##################################### +## +## Read iptables config files. +## +## +## +## Domain allowed access. +## +## +# +interface(`iptables_read_config',` + gen_require(` + type iptables_conf_t; + ') + + files_search_etc($1) + allow $1 iptables_conf_t:dir list_dir_perms; + read_files_pattern($1, iptables_conf_t, iptables_conf_t) +') + +##################################### +## +## Create files in /etc with the type used for +## the iptables config files. +## +## +## +## The type of the process performing this action. +## +## +# +interface(`iptables_etc_filetrans_config',` + gen_require(` + type iptables_conf_t; + ') + + files_etc_filetrans($1, iptables_conf_t, file) +') + +################################### +## +## Manage iptables config files. +## +## +## +## Domain allowed access. +## +## +# +interface(`iptables_manage_config',` + gen_require(` + type iptables_conf_t; + type etc_t; + ') + + files_search_etc($1) + manage_files_pattern($1, iptables_conf_t, iptables_conf_t) +') diff --git a/policy/modules/system/iptables.te b/policy/modules/system/iptables.te index 7ad2544..7626034 100644 --- a/policy/modules/system/iptables.te +++ b/policy/modules/system/iptables.te @@ -1,5 +1,5 @@ -policy_module(iptables, 1.10.0) +policy_module(iptables, 1.10.1) ######################################## # @@ -11,6 +11,12 @@ type iptables_exec_t; init_system_domain(iptables_t, iptables_exec_t) role system_r types iptables_t; +type iptables_initrc_exec_t; +init_script_file(iptables_initrc_exec_t) + +type iptables_conf_t; +files_config_file(iptables_conf_t) + type iptables_tmp_t; files_tmp_file(iptables_tmp_t) @@ -27,6 +33,9 @@ dontaudit iptables_t self:capability sys_tty_config; allow iptables_t self:process { sigchld sigkill sigstop signull signal }; allow iptables_t self:rawip_socket create_socket_perms; +manage_files_pattern(iptables_t, iptables_conf_t, iptables_conf_t) +files_etc_filetrans(iptables_t, iptables_conf_t, file) + manage_files_pattern(iptables_t, iptables_var_run_t, iptables_var_run_t) files_pid_filetrans(iptables_t, iptables_var_run_t, file) @@ -36,6 +45,7 @@ allow iptables_t iptables_tmp_t:dir manage_dir_perms; allow iptables_t iptables_tmp_t:file manage_file_perms; files_tmp_filetrans(iptables_t, iptables_tmp_t, { file dir }) +kernel_request_load_module(iptables_t) kernel_read_system_state(iptables_t) kernel_read_network_state(iptables_t) kernel_read_kernel_sysctls(iptables_t) @@ -100,6 +110,10 @@ optional_policy(` ') optional_policy(` + psad_rw_tmp_files(iptables_t) +') + +optional_policy(` rhgb_dontaudit_use_ptys(iptables_t) ') diff --git a/policy/modules/system/modutils.fc b/policy/modules/system/modutils.fc index 688afeb..532181a 100644 --- a/policy/modules/system/modutils.fc +++ b/policy/modules/system/modutils.fc @@ -1,6 +1,7 @@ /etc/modules\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0) /etc/modprobe\.conf.* -- gen_context(system_u:object_r:modules_conf_t,s0) +/etc/modprobe\.d(/.*)? gen_context(system_u:object_r:modules_conf_t,s0) ifdef(`distro_gentoo',` # gentoo init scripts still manage this file diff --git a/policy/modules/system/modutils.if b/policy/modules/system/modutils.if index ce4ac17..e1057e3 100644 --- a/policy/modules/system/modutils.if +++ b/policy/modules/system/modutils.if @@ -1,5 +1,23 @@ ## Policy for kernel module utilities +###################################### +## +## Getattr the dependencies of kernel modules. +## +## +## +## Domain allowed access. +## +## +# +interface(`modutils_getattr_module_deps',` + gen_require(` + type modules_dep_t; + ') + + getattr_files_pattern($1, modules_object_t, modules_dep_t) +') + ######################################## ## ## Read the dependencies of kernel modules. @@ -41,8 +59,8 @@ interface(`modutils_read_module_config',` files_search_etc($1) files_search_boot($1) - allow $1 modules_conf_t:file read_file_perms; - allow $1 modules_conf_t:lnk_file read_lnk_file_perms; + read_files_pattern($1, modules_conf_t, modules_conf_t) + read_lnk_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## @@ -61,7 +79,7 @@ interface(`modutils_rename_module_config',` type modules_conf_t; ') - allow $1 modules_conf_t:file rename_file_perms; + rename_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## @@ -80,7 +98,26 @@ interface(`modutils_delete_module_config',` type modules_conf_t; ') - allow $1 modules_conf_t:file unlink; + delete_files_pattern($1, modules_conf_t, modules_conf_t) +') + +######################################## +## +## Manage files with the configuration options used when +## loading modules. +## +## +## +## Domain allowed access. +## +## +# +interface(`modutils_manage_module_config',` + gen_require(` + type modules_conf_t; + ') + + manage_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## diff --git a/policy/modules/system/modutils.te b/policy/modules/system/modutils.te index 87b8b7e..20f4fa8 100644 --- a/policy/modules/system/modutils.te +++ b/policy/modules/system/modutils.te @@ -1,5 +1,5 @@ -policy_module(modutils, 1.9.0) +policy_module(modutils, 1.9.1) gen_require(` bool secure_mode_insmod; @@ -45,7 +45,7 @@ files_tmp_file(update_modules_tmp_t) can_exec(depmod_t, depmod_exec_t) # Read conf.modules. -allow depmod_t modules_conf_t:file read_file_perms; +read_files_pattern(depmod_t, modules_conf_t, modules_conf_t) allow depmod_t modules_dep_t:file manage_file_perms; files_kernel_modules_filetrans(depmod_t, modules_dep_t, file) @@ -82,8 +82,22 @@ ifdef(`distro_ubuntu',` ') ') +tunable_policy(`use_nfs_home_dirs',` + fs_read_nfs_files(depmod_t) +') + +tunable_policy(`use_samba_home_dirs',` + fs_read_cifs_files(depmod_t) +') + optional_policy(` rpm_rw_pipes(depmod_t) + rpm_manage_script_tmp_files(depmod_t) +') + +optional_policy(` + # Read System.map from home directories. + unconfined_domain(depmod_t) ') ######################################## @@ -91,19 +105,23 @@ optional_policy(` # insmod local policy # -allow insmod_t self:capability { dac_override net_raw sys_tty_config }; +allow insmod_t self:capability { dac_override net_raw sys_nice sys_tty_config }; allow insmod_t self:process { execmem sigchld sigkill sigstop signull signal }; -allow insmod_t self:udp_socket create_socket_perms; -allow insmod_t self:rawip_socket create_socket_perms; +allow insmod_t self:udp_socket create_socket_perms; +allow insmod_t self:rawip_socket create_socket_perms; # Read module config and dependency information -allow insmod_t { modules_conf_t modules_dep_t }:file read_file_perms; +list_dirs_pattern(insmod_t, modules_conf_t, modules_conf_t) +read_files_pattern(insmod_t, modules_conf_t, modules_conf_t) +list_dirs_pattern(insmod_t, modules_dep_t, modules_dep_t) +read_files_pattern(insmod_t, modules_dep_t, modules_dep_t) can_exec(insmod_t, insmod_exec_t) kernel_load_module(insmod_t) kernel_read_system_state(insmod_t) +kernel_read_network_state(insmod_t) kernel_write_proc_files(insmod_t) kernel_mount_debugfs(insmod_t) kernel_mount_kvmfs(insmod_t) @@ -112,6 +130,7 @@ kernel_read_debugfs(insmod_t) kernel_read_kernel_sysctls(insmod_t) kernel_rw_kernel_sysctl(insmod_t) kernel_read_hotplug_sysctls(insmod_t) +kernel_setsched(insmod_t) corecmd_exec_bin(insmod_t) corecmd_exec_shell(insmod_t) @@ -124,9 +143,6 @@ dev_rw_agp(insmod_t) dev_read_sound(insmod_t) dev_write_sound(insmod_t) dev_rw_apm_bios(insmod_t) -# cjp: why is this needed? insmod cannot mounton any dir -# and it also transitions to mount -dev_mount_usbfs(insmod_t) domain_signal_all_domains(insmod_t) domain_use_interactive_fds(insmod_t) @@ -159,17 +175,26 @@ seutil_read_file_contexts(insmod_t) userdom_use_user_terminals(insmod_t) -ifdef(`distro_ubuntu',` - optional_policy(` - unconfined_domain(insmod_t) - ') -') +userdom_dontaudit_search_user_home_dirs(insmod_t) if( ! secure_mode_insmod ) { kernel_domtrans_to(insmod_t, insmod_exec_t) } optional_policy(` + alsa_domtrans(insmod_t) +') + +optional_policy(` + firstboot_dontaudit_rw_pipes(insmod_t) + firstboot_dontaudit_rw_stream_sockets(insmod_t) +') + +optional_policy(` + hal_write_log(insmod_t) +') + +optional_policy(` hotplug_search_config(insmod_t) ') @@ -205,7 +230,7 @@ optional_policy(` ') optional_policy(` - unconfined_dontaudit_rw_pipes(insmod_t) + unconfined_domain(insmod_t) ') optional_policy(` @@ -228,7 +253,7 @@ can_exec(update_modules_t, insmod_exec_t) can_exec(update_modules_t, update_modules_exec_t) # manage module loading configuration -allow update_modules_t modules_conf_t:file manage_file_perms; +manage_files_pattern(update_modules_t, modules_conf_t, modules_conf_t) files_kernel_modules_filetrans(update_modules_t, modules_conf_t, file) files_etc_filetrans(update_modules_t, modules_conf_t, file)