diff --git a/www/api-docs/admin.html b/www/api-docs/admin.html
index 86b55dd..7d12965 100644
--- a/www/api-docs/admin.html
+++ b/www/api-docs/admin.html
@@ -16,15 +16,24 @@
-
acct
+ -
+ anaconda
+
-
consoletype
-
dmesg
+ -
+ dmidecode
+
-
firstboot
+ -
+ kudzu
+
-
logrotate
@@ -112,6 +121,11 @@
Berkeley process accounting
Policy for the Anaconda installer.
@@ -124,6 +138,11 @@ Determine of the console connected to the controlling terminal.
Policy for dmesg.
Decode DMI data for x86/ia64 bioses.
@@ -132,6 +151,11 @@ after installation of Red Hat/Fedora systems.
Hardware detection and configuration tools
Rotate and archive system logs
Policy for the Anaconda installer.
+ + + + + +Decode DMI data for x86/ia64 bioses.
+ + + + ++Execute dmidecode in the dmidecode domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +Domain allowed access. + + | +No + |
+Execute dmidecode in the dmidecode domain, and +allow the specified role the dmidecode domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+role + | + +The role to be allowed the dmidecode domain. + + | +No + |
+terminal + | + +The type of the terminal allow the dmidecode domain to use. + + | +No + |
Hardware detection and configuration tools
+ + + + ++Execute kudzu in the kudzu domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+Execute kudzu in the kudzu domain, and +allow the specified role the kudzu domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+role + | + +The role to be allowed the kudzu domain. + + | +No + |
+terminal + | + +The type of the terminal allow the kudzu domain to use. + + | +No + |
+Inherit and use logrotate file descriptors. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +Domain allowed access. + + | +No + |
+Conditionally execute ping in the ping domain, and +allow the specified role the ping domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+role + | + +The role to be allowed the ping domain. + + | +No + |
+terminal + | + +The type of the terminal allow the ping domain to use. + + | +No + |
+Conditionally execute traceroute in the traceroute domain, and +allow the specified role the traceroute domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+role + | + +The role to be allowed the traceroute domain. + + | +No + |
+terminal + | + +The type of the terminal allow the traceroute domain to use. + + | +No + |
Run shells with substitute user and group
+ ++Execute su in the caller domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +Domain allowed access. + + | +No + |
+Execute password admin functions in +the admin passwd domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +Domain allowed access. + + | +No + |
Load keyboard mappings.
Web server log analysis
Web server log analysis
+ + + + ++Execute webalizer in the webalizer domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+Execute webalizer in the webalizer domain, and +allow the specified role the webalizer domain. +
+ + +Parameter: | Description: | Optional: |
---|---|---|
+domain + | + +The type of the process performing this action. + + | +No + |
+role + | + +The role to be allowed the webalizer domain. + + | +No + |
+terminal + | + +The type of the terminal allow the webalizer domain to use. + + | +No + |
-Enabling secure mode disallows programs, such as -newrole, from transitioning to administrative -user domains. -
+Enabling secure mode disallows programs, such asnewrole, from transitioning to administrativeuser domains.-Allow making anonymous memory executable, e.g. -for runtime-code generation or executable stack. -
+Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.-Allow making a modified private file -mapping executable (text relocation). -
+Allow making a modified private filemapping executable (text relocation). @@ -358,9 +399,19 @@ mapping executable (text relocation).-Allow making the stack executable via mprotect. -Also requires allow_execmem. -
+Allow making the stack executable via mprotect.Also requires allow_execmem. + + + +false
+ ++Allow ftp servers to modify public filesused for public file transfer services.
-Allow gpg executable stack -
+Allow gpg executable stack + + + +false
+ ++Allow Apache to modify public filesused for public file transfer services.
-Allow system to run with kerberos -
+Allow system to run with kerberos + + + +false
+ ++Allow sysadm to ptrace all processes
+ +false
+ ++Allow sasl to read shadow
-allow host key based authentication -
+allow host key based authentication @@ -411,8 +495,7 @@ allow host key based authentication-Allow users to connect to mysql -
+Allow users to connect to mysql @@ -424,8 +507,7 @@ Allow users to connect to mysql-Allow system to run with NIS -
+Allow system to run with NIS @@ -437,9 +519,7 @@ Allow system to run with NIS-Allow system cron jobs to relabel filesystem -for restoring file contexts. -
+Allow system cron jobs to relabel filesystemfor restoring file contexts. @@ -451,9 +531,115 @@ for restoring file contexts.-Enable extra rules in the cron domain -to support fcron. -
+Enable extra rules in the cron domainto support fcron. + + + +false
+ ++Allow ftp to read and write files in the user home directories
+ +false
+ ++Allow ftpd to run directly without inetd
+ +false
+ ++Allow httpd to use built in scripting (usually php)
+ +false
+ ++Allow http daemon to tcp connect
+ +false
+ ++Allow httpd cgi support
+ +false
+ ++Allow httpd to read home directories
+ +false
+ ++Run SSI execs in system CGI script domain.
+ +false
+ ++Allow http daemon to communicate with the TTY
+ +false
+ ++Run CGI in the main httpd domain
-Allow BIND to write the master zone files. -Generally this is used for dynamic DNS. -
+Allow BIND to write the master zone files.Generally this is used for dynamic DNS. + + + +false
+ ++Allow pppd to load kernel modules for certain modems
+ +false
+ ++Allow pppd to be run for a regular user
-Allow reading of default_t files. -
+Allow reading of default_t files. @@ -492,10 +699,7 @@ Allow reading of default_t files.-Allow applications to read untrusted content -If this is disallowed, Internet content has -to be manually relabeled for read access to be granted -
+Allow applications to read untrusted contentIf this is disallowed, Internet content hasto be manually relabeled for read access to be granted @@ -507,8 +711,7 @@ to be manually relabeled for read access to be granted-Allow ssh to run from inetd instead of as a daemon. -
+Allow ssh to run from inetd instead of as a daemon. @@ -520,9 +723,7 @@ Allow ssh to run from inetd instead of as a daemon.-Allow squid to connect to all ports, not just -HTTP, FTP, and Gopher ports. -
+Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports. @@ -534,8 +735,7 @@ HTTP, FTP, and Gopher ports.-Allow ssh logins as sysadm_r:sysadm_t -
+Allow ssh logins as sysadm_r:sysadm_t @@ -547,9 +747,7 @@ Allow ssh logins as sysadm_r:sysadm_t-Allow staff_r users to search the sysadm home -dir and read files (such as ~/.bashrc) -
+Allow staff_r users to search the sysadm homedir and read files (such as ~/.bashrc) @@ -561,8 +759,7 @@ dir and read files (such as ~/.bashrc)-Support NFS home directories -
+Support NFS home directories @@ -574,8 +771,7 @@ Support NFS home directories-Support SAMBA home directories -
+Support SAMBA home directories @@ -587,8 +783,7 @@ Support SAMBA home directories-Allow regular users direct mouse access -
+Allow regular users direct mouse access @@ -600,8 +795,7 @@ Allow regular users direct mouse access-Allow users to read system messages. -
+Allow users to read system messages. @@ -613,9 +807,7 @@ Allow users to read system messages.-Allow users to control network interfaces -(also needs USERCTL=true) -
+Allow users to control network interfaces(also needs USERCTL=true) @@ -627,8 +819,7 @@ Allow users to control network interfaces-Control users use of ping and traceroute -
+Control users use of ping and traceroute @@ -640,8 +831,7 @@ Control users use of ping and traceroute-Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY) -
+Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY) @@ -653,8 +843,7 @@ Allow user to r/w noextattrfile (FAT, CDROM, FLOPPY)-Allow users to rw usb devices -
+Allow users to rw usb devices @@ -666,10 +855,7 @@ Allow users to rw usb devices-Allow users to run TCP servers (bind to ports and accept connection from -the same domain and outside users) disabling this forces FTP passive mode -and may change other protocols. -
+Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols. @@ -681,8 +867,7 @@ and may change other protocols.-Allow w to display everyone -
+Allow w to display everyone @@ -694,10 +879,7 @@ Allow w to display everyone-Allow applications to write untrusted content -If this is disallowed, no Internet content -will be stored. -
+Allow applications to write untrusted contentIf this is disallowed, no Internet contentwill be stored. diff --git a/www/api-docs/index.html b/www/api-docs/index.html index 5fca52d..81c9363 100644 --- a/www/api-docs/index.html +++ b/www/api-docs/index.html @@ -16,15 +16,24 @@ - acctBerkeley process accounting
Policy for the Anaconda installer.
@@ -349,6 +399,11 @@ Determine of the console connected to the controlling terminal.
Policy for dmesg.
Decode DMI data for x86/ia64 bioses.
@@ -357,6 +412,11 @@ after installation of Red Hat/Fedora systems.
Hardware detection and configuration tools
Rotate and archive system logs
Multilevel security policy
@@ -519,6 +584,11 @@ Policy for kernel security interface, in particular, selinuxfs. loadkeys
Load keyboard mappings.
Web server log analysis
Apache web server
Advanced power management daemon
Ethernet activity monitor.
Berkeley internet name domain DNS server.
Bluetooth tools and system services.
Comsat, a biff server.
Dictionary daemon
Finger user information service.
File transfer protocol service
General Purpose Mouse driver
OpenLDAP directory server
Mailman is for managing electronic mail discussion and e-newsletter lists
Policy common to all email tranfer agents.
PostgreSQL relational database
Point to Point Protocol daemon creates links in ppp networks
Privacy enhancing web proxy.
IPv6 router advertisement daemon
Policy for rshd, rlogind, and telnetd.
SMB and CIFS client/server programs for UNIX
+SMB and CIFS client/server programs for UNIX and +name Service Switch daemon for resolving names +from Windows NT servers. +
SASL authentication server
-Append to the login failure log. +Allow the specified domain to append +apache squirrelmail data.
-Summary is missing! +Transition to apache.
-Delete pam_console data. +Execute all user scripts in the user +script domain.
-Delete pam PID files. +Execute the Apache helper program with +a domain transition.
-Run unix_chkpwd to check a password. +Execute all web scripts in the system +script domain.
-Execute a login_program in the target domain. +Do not audit attempts to append to the +Apache logs.
-Execute pam programs in the pam domain. +Do not audit attempts to read and write Apache +unix domain stream sockets.
-Summary is missing! +Do not audit attempts to read and write Apache +system script unix domain stream sockets.
-Execute utempter programs in the utempter domain. +Do not audit attempts to read and write Apache +TCP sockets.
-Do not audit attempts to get the attributes -of the shadow passwords file. +Allow the specified domain to list +the contents of the apache modules +directory.
-Do not audit attempts to read the shadow -password file (/etc/shadow). +Allow the specified domain to manage +apache system content files.
-Summary is missing! +Allow the specified domain to read +apache configuration files.
-Execute the pam program. +Allow the specified domain to read +apache log files.
-Get the attributes of the shadow passwords file. +Allow the specified domain to read +apache squirrelmail data.
-Summary is missing! -
--Use the login program as an entry point program. +Execute all user scripts in the user +script domain. Add user script domains +to the specified role.
-Manage all files on the filesystem, except -the shadow passwords and listed exceptions. +Execute the Apache helper program with +a domain transition, and allow the +specified role the dmidecode domain.
-Summary is missing! +Send a SIGCHLD signal to apache.
-Summary is missing! +Send a null signal to apache.
-Summary is missing! +Inherit and use file descriptors from Apache.
-Summary is missing! +Append to apm's log file.
-Summary is missing! +Execute APM in the apm domain.
-Summary is missing! +Read and write to an apm unix stream socket.
-Read the shadow passwords file (/etc/shadow) +Use file descriptors for apmd.
-Relabel all files on the filesystem, except -the shadow passwords and listed exceptions. +Write to apmd unnamed pipes.
-Summary is missing! +Do not audit attempts to read and write +arpwatch packet sockets.
-Execute pam programs in the PAM domain. +Create arpwatch data files.
+Read and write arpwatch temporary files. +
+-Execute utempter programs in the utempter domain. +Search arpwatch's data file directories.
-Summary is missing! +Append to the login failure log.
-Summary is missing! +Append only to the last logins log.
-Summary is missing! +Append to login records (wtmp).
-Read and write the shadow password file (/etc/shadow). +Summary is missing!
-Unconfined access to the authlogin module. +Delete pam_console data.
-Execute ndc in the ndc domain. +Delete pam PID files.
-Create, read, write, and delete -BIND configuration directories. +Run unix_chkpwd to check a password.
-Read BIND named configuration files. +Execute a login_program in the target domain.
-Read DNSSEC keys. +Execute pam programs in the pam domain.
-Execute ndc in the ndc domain, and -allow the specified role the ndc domain. +Summary is missing!
-Do not audit attempts to set the attributes -of the BIND pid directory. +Execute utempter programs in the utempter domain.
-Write BIND named configuration files. +Do not audit attempts to get the attributes +of the shadow passwords file.
-Install a kernel into the /boot directory. +Do not audit attempts to read the shadow +password file (/etc/shadow).
-Install a system.map into the /boot directory. +Summary is missing!
-Summary is missing! +Execute the pam program.
-Read and write the bootloader -temporary data in /tmp. +Get the attributes of the shadow passwords file.
-Delete a kernel from /boot. +Summary is missing!
-Delete a system.map in the /boot directory. +Use the login program as an entry point program.
-Execute bootloader in the bootloader domain. +Manage all files on the filesystem, except +the shadow passwords and listed exceptions.
-Do not audit attempts to get attributes -of the /boot directory. +Summary is missing!
-Do not audit attempts to search the /boot directory. +Summary is missing!
-Get the attributes of kernel module files. +Summary is missing!
-List the contents of the kernel module directories. +Read the last logins log.
-Create, read, write, and delete -kernel module files. +Summary is missing!
-Read the bootloader configuration file. +Summary is missing!
-Read kernel module files. +Summary is missing!
-Read system.map in the /boot directory. +Read the shadow passwords file (/etc/shadow)
-Execute bootloader interactively and do -a domain transition to the bootloader domain. +Relabel all files on the filesystem, except +the shadow passwords and listed exceptions.
-Read and write symbolic links -in the /boot directory. +Summary is missing!
-Read and write the bootloader -configuration file. +Execute pam programs in the PAM domain.
-Read and write the bootloader -temporary data in /tmp. +Execute utempter programs in the utempter domain.
-Search the /boot directory. +Summary is missing!
-Write kernel module files. +Read and write to the last logins log.
-Execute hwclock in the clock domain. +Summary is missing!
- Execute hwclock in the caller domain. -
+Read and write the shadow password file (/etc/shadow). +-Execute hwclock in the clock domain, and -allow the specified role the hwclock domain. +Unconfined access to the authlogin module.
- Allow executing domain to modify clock drift -
+Use nsswitch to look up uid-username mappings. +-Execute consoletype in the consoletype domain. +Write to login records (wtmp).
-Execute consoletype in the caller domain. +Execute bind in the named domain.
-Execute a file in a bin directory -in the specified domain. +Execute ndc in the ndc domain.
-Summary is missing! +Create, read, write, and delete +BIND configuration directories.
-Summary is missing! +Read BIND named configuration files.
-Summary is missing! +Read DNSSEC keys.
-Summary is missing! +Execute ndc in the ndc domain, and +allow the specified role the ndc domain.
-Summary is missing! +Do not audit attempts to set the attributes +of the BIND pid directory.
-Summary is missing! +Write BIND named configuration files.
-Get the attributes of files in bin directories. +Install a kernel into the /boot directory.
-Summary is missing! +Install a system.map into the /boot directory.
-Summary is missing! +Read and write the bootloader +temporary data in /tmp.
-Read files in bin directories. +Delete a kernel from /boot.
-Read pipes in bin directories. +Delete a system.map in the /boot directory.
-Read named sockets in bin directories. +Execute bootloader in the bootloader domain.
-Read symbolic links in bin directories. +Do not audit attempts to get attributes +of the /boot directory.
-Read files in sbin directories. +Do not audit attempts to search the /boot directory.
-Read named pipes in sbin directories. +Get the attributes of kernel module files.
-Read named sockets in sbin directories. +List the contents of the kernel module directories.
-Read symbolic links in sbin directories. +Create, read, write, and delete +kernel module files.
-Execute a file in a sbin directory -in the specified domain. +Read the bootloader configuration file.
-Summary is missing! +Read kernel module files.
-Summary is missing! +Read system.map in the /boot directory.
-Execute a shell in the specified domain. +Execute bootloader interactively and do +a domain transition to the bootloader domain.
-Make the shell an entrypoint for the specified domain. +Read and write symbolic links +in the /boot directory.
-Execute a shell in the target domain. This -is an explicit transition, requiring the -caller to use setexeccon(). +Read and write the bootloader +configuration file.
-Do not audit attempts to bind TCP sockets to all reserved ports. +Read and write the bootloader +temporary data in /tmp.
-Do not audit attempts to connect TCP sockets -all reserved ports. +Search the /boot directory.
-Do not audit attempts to bind UDP sockets to all reserved ports. +Search the contents of the kernel module directories.
-Receive raw IP packets on all interfaces. +Write kernel module files.
-Receive raw IP packets on all nodes. +Execute hwclock in the clock domain.
-Receive raw IP packets on the compat_ipv4 node. +Execute hwclock in the caller domain.
-Receive raw IP packets on generic interfaces. +Execute hwclock in the clock domain, and +allow the specified role the hwclock domain.
-Receive raw IP packets on generic nodes. +Allow executing domain to modify clock drift
-Receive raw IP packets on the inaddr_any node. +Execute consoletype in the consoletype domain.
-Receive raw IP packets on the link_local node. +Execute consoletype in the caller domain.
-Receive raw IP packets on the lo node. +Execute a file in a bin directory +in the specified domain.
-Receive raw IP packets on the mapped_ipv4 node. +Summary is missing!
-Receive raw IP packets on the multicast node. +Summary is missing!
-Receive raw IP packets on the site_local node. +Summary is missing!
-Receive raw IP packets on the unspec node. +Summary is missing!
-Send raw IP packets on all interfaces. +Summary is missing!
-Send raw IP packets on all nodes. +Summary is missing!
-Send raw IP packets on the compat_ipv4 node. +Get the attributes of files in bin directories.
-Send raw IP packets on generic interfaces. +Summary is missing!
-Send raw IP packets on generic nodes. +Summary is missing!
-Send raw IP packets on the inaddr_any node. +Summary is missing!
-Send raw IP packets on the link_local node. +Read files in bin directories.
-Send raw IP packets on the lo node. +Read pipes in bin directories.
-Send raw IP packets on the mapped_ipv4 node. +Read named sockets in bin directories.
-Send raw IP packets on the multicast node. +Read symbolic links in bin directories.
-Send raw IP packets on the site_local node. +Read files in sbin directories.
-Send raw IP packets on the unspec node. +Read named pipes in sbin directories.
-Send and receive raw IP packets on all interfaces. +Read named sockets in sbin directories.
-Send and receive raw IP packets on all nodes. +Read symbolic links in sbin directories.
-Send and receive raw IP packets on the compat_ipv4 node. +Execute a file in a sbin directory +in the specified domain.
-Send and receive raw IP packets on generic interfaces. +Summary is missing!
-Send and receive raw IP packets on generic nodes. +Summary is missing!
-Send and receive raw IP packets on the inaddr_any node. +Execute a shell in the specified domain.
-Send and receive raw IP packets on the link_local node. +Make the shell an entrypoint for the specified domain.
-Send and receive raw IP packets on the lo node. +Execute a shell in the target domain. This +is an explicit transition, requiring the +caller to use setexeccon().
-Send and receive raw IP packets on the mapped_ipv4 node. +Do not audit attempts to bind TCP sockets to all reserved ports.
-Send and receive raw IP packets on the multicast node. +Do not audit attempts to connect TCP sockets +all reserved ports.
-Send and receive raw IP packets on the site_local node. +Do not audit attempts to bind UDP sockets to all reserved ports.
-Send and receive raw IP packets on the unspec node. +Receive raw IP packets on all interfaces.
-Bind TCP sockets to the afs_bos port. +Receive raw IP packets on all nodes.
-Bind TCP sockets to the afs_fs port. +Receive raw IP packets on the compat_ipv4 node.
-Bind TCP sockets to the afs_ka port. +Receive raw IP packets on generic interfaces.
-Bind TCP sockets to the afs_pt port. +Receive raw IP packets on generic nodes.
-Bind TCP sockets to the afs_vl port. +Receive raw IP packets on the inaddr_any node.
-Bind TCP sockets to all nodes. +Receive raw IP packets on the link_local node.
-Bind TCP sockets to all ports. +Receive raw IP packets on the lo node.
-Bind TCP sockets to all reserved ports. +Receive raw IP packets on the mapped_ipv4 node.
-Bind TCP sockets to the amanda port. +Receive raw IP packets on the multicast node.
-Bind TCP sockets to the amavisd_recv port. +Receive raw IP packets on the site_local node.
-Bind TCP sockets to the amavisd_send port. +Receive raw IP packets on the unspec node.
-Bind TCP sockets to the asterisk port. +Send raw IP packets on all interfaces.
-Bind TCP sockets to the auth port. +Send raw IP packets on all nodes.
-Bind TCP sockets to the clamd port. +Send raw IP packets on the compat_ipv4 node.
-Bind TCP sockets to the clockspeed port. +Send raw IP packets on generic interfaces.
-Bind TCP sockets to node compat_ipv4. +Send raw IP packets on generic nodes.
-Bind TCP sockets to the cvs port. +Send raw IP packets on the inaddr_any node.
-Bind TCP sockets to the dbskkd port. +Send raw IP packets on the link_local node.
-Bind TCP sockets to the dcc port. +Send raw IP packets on the lo node.
-Bind TCP sockets to the dhcpc port. +Send raw IP packets on the mapped_ipv4 node.
-Bind TCP sockets to the dhcpd port. +Send raw IP packets on the multicast node.
-Bind TCP sockets to the dict port. +Send raw IP packets on the site_local node.
-Bind TCP sockets to the dns port. +Send raw IP packets on the unspec node.
-Bind TCP sockets to the fingerd port. +Send and receive raw IP packets on all interfaces.
-Bind TCP sockets to the ftp_data port. +Send and receive raw IP packets on all nodes.
-Bind TCP sockets to the ftp port. +Send and receive raw IP packets on the compat_ipv4 node.
-Bind TCP sockets to generic nodes. +Send and receive raw IP packets on generic interfaces.
-Bind TCP sockets to generic ports. +Send and receive raw IP packets on generic nodes.
-Bind TCP sockets to the giftd port. +Send and receive raw IP packets on the inaddr_any node.
-Bind TCP sockets to the gopher port. +Send and receive raw IP packets on the link_local node.
-Bind TCP sockets to the howl port. +Send and receive raw IP packets on the lo node.
-Bind TCP sockets to the hplip port. +Send and receive raw IP packets on the mapped_ipv4 node.
-Bind TCP sockets to the http_cache port. +Send and receive raw IP packets on the multicast node.
-Bind TCP sockets to the http port. +Send and receive raw IP packets on the site_local node.
-Bind TCP sockets to the imaze port. +Send and receive raw IP packets on the unspec node.
-Bind TCP sockets to node inaddr_any. +Bind TCP sockets to the afs_bos port.
-Bind TCP sockets to the inetd_child port. +Bind TCP sockets to the afs_fs port.
-Bind TCP sockets to the innd port. +Bind TCP sockets to the afs_ka port.
-Bind TCP sockets to the ipp port. +Bind TCP sockets to the afs_pt port.
-Bind TCP sockets to the ircd port. +Bind TCP sockets to the afs_vl port.
-Bind TCP sockets to the isakmp port. +Bind TCP sockets to all nodes.
-Bind TCP sockets to the jabber_client port. +Bind TCP sockets to all ports.
-Bind TCP sockets to the jabber_interserver port. +Bind TCP sockets to all reserved ports.
-Bind TCP sockets to the kerberos_admin port. +Bind TCP sockets to the amanda port.
-Bind TCP sockets to the kerberos_master port. +Bind TCP sockets to the amavisd_recv port.
-Bind TCP sockets to the kerberos port. +Bind TCP sockets to the amavisd_send port.
-Bind TCP sockets to the ktalkd port. +Bind TCP sockets to the asterisk port.
-Bind TCP sockets to the ldap port. +Bind TCP sockets to the auth port.
-Bind TCP sockets to node link_local. +Bind TCP sockets to the clamd port.
-Bind TCP sockets to node lo. +Bind TCP sockets to the clockspeed port.
-Bind TCP sockets to the mail port. +Bind TCP sockets to node compat_ipv4.
-Bind TCP sockets to node mapped_ipv4. +Bind TCP sockets to the cvs port.
-Bind TCP sockets to the monopd port. +Bind TCP sockets to the dbskkd port.
-Bind TCP sockets to node multicast. +Bind TCP sockets to the dcc port.
-Bind TCP sockets to the mysqld port. +Bind TCP sockets to the dhcpc port.
-Bind TCP sockets to the nessus port. +Bind TCP sockets to the dhcpd port.
-Bind TCP sockets to the nmbd port. +Bind TCP sockets to the dict port.
-Bind TCP sockets to the ntp port. +Bind TCP sockets to the dns port.
-Bind TCP sockets to the openvpn port. +Bind TCP sockets to the fingerd port.
-Bind TCP sockets to the pop port. +Bind TCP sockets to the ftp_data port.
-Bind TCP sockets to the portmap port. +Bind TCP sockets to the ftp port.
-Bind TCP sockets to the postgresql port. +Bind TCP sockets to generic nodes.
-Bind TCP sockets to the postgrey port. +Bind TCP sockets to generic ports.
-Bind TCP sockets to the printer port. +Bind TCP sockets to the giftd port.
-Bind TCP sockets to the ptal port. +Bind TCP sockets to the gopher port.
-Bind TCP sockets to the pxe port. +Bind TCP sockets to the howl port.
-Bind TCP sockets to the pyzor port. +Bind TCP sockets to the hplip port.
-Bind TCP sockets to the radacct port. +Bind TCP sockets to the http_cache port.
-Bind TCP sockets to the radius port. +Bind TCP sockets to the http port.
-Bind TCP sockets to the razor port. +Bind TCP sockets to the imaze port.
-Bind TCP sockets to generic reserved ports. +Bind TCP sockets to node inaddr_any.
-Bind TCP sockets to the rndc port. +Bind TCP sockets to the inetd_child port.
-Bind TCP sockets to the rsh port. +Bind TCP sockets to the innd port.
-Bind TCP sockets to the rsync port. +Bind TCP sockets to the ipp port.
-Bind TCP sockets to node site_local. +Bind TCP sockets to the ircd port.
-Bind TCP sockets to the smbd port. +Bind TCP sockets to the isakmp port.
-Bind TCP sockets to the smtp port. +Bind TCP sockets to the jabber_client port.
-Bind TCP sockets to the snmp port. +Bind TCP sockets to the jabber_interserver port.
-Bind TCP sockets to the soundd port. +Bind TCP sockets to the kerberos_admin port.
-Bind TCP sockets to the spamd port. +Bind TCP sockets to the kerberos_master port.
-Bind TCP sockets to the ssh port. +Bind TCP sockets to the kerberos port.
-Bind TCP sockets to the swat port. +Bind TCP sockets to the ktalkd port.
-Bind TCP sockets to the syslogd port. +Bind TCP sockets to the ldap port.
-Bind TCP sockets to the telnetd port. +Bind TCP sockets to node link_local.
-Bind TCP sockets to the tftp port. +Bind TCP sockets to node lo.
-Bind TCP sockets to the transproxy port. +Bind TCP sockets to the mail port.
-Bind TCP sockets to node unspec. +Bind TCP sockets to node mapped_ipv4.
-Bind TCP sockets to the uucpd port. +Bind TCP sockets to the monopd port.
-Bind TCP sockets to the vnc port. +Bind TCP sockets to node multicast.
-Bind TCP sockets to the xserver port. +Bind TCP sockets to the mysqld port.
-Bind TCP sockets to the zebra port. +Bind TCP sockets to the nessus port.
-Bind TCP sockets to the zope port. +Bind TCP sockets to the nmbd port.
-Make a TCP connection to the afs_bos port. +Bind TCP sockets to the ntp port.
-Make a TCP connection to the afs_fs port. +Bind TCP sockets to the openvpn port.
-Make a TCP connection to the afs_ka port. +Bind TCP sockets to the pegasus_http port.
-Make a TCP connection to the afs_pt port. +Bind TCP sockets to the pegasus_https port.
-Make a TCP connection to the afs_vl port. +Bind TCP sockets to the pop port.
-Connect TCP sockets to all ports. +Bind TCP sockets to the portmap port.
-Make a TCP connection to the amanda port. +Bind TCP sockets to the postgresql port.
-Make a TCP connection to the amavisd_recv port. +Bind TCP sockets to the postgrey port.
-Make a TCP connection to the amavisd_send port. +Bind TCP sockets to the printer port.
-Make a TCP connection to the asterisk port. +Bind TCP sockets to the ptal port.
-Make a TCP connection to the auth port. +Bind TCP sockets to the pxe port.
-Make a TCP connection to the clamd port. +Bind TCP sockets to the pyzor port.
-Make a TCP connection to the clockspeed port. +Bind TCP sockets to the radacct port.
-Make a TCP connection to the cvs port. +Bind TCP sockets to the radius port.
-Make a TCP connection to the dbskkd port. +Bind TCP sockets to the razor port.
-Make a TCP connection to the dcc port. +Bind TCP sockets to generic reserved ports.
-Make a TCP connection to the dhcpc port. +Bind TCP sockets to the rndc port.
-Make a TCP connection to the dhcpd port. +Bind TCP sockets to the rsh port.
-Make a TCP connection to the dict port. +Bind TCP sockets to the rsync port.
-Make a TCP connection to the dns port. +Bind TCP sockets to node site_local.
-Make a TCP connection to the fingerd port. +Bind TCP sockets to the smbd port.
-Make a TCP connection to the ftp_data port. +Bind TCP sockets to the smtp port.
-Make a TCP connection to the ftp port. +Bind TCP sockets to the snmp port.
-Connect TCP sockets to generic ports. +Bind TCP sockets to the soundd port.
-Make a TCP connection to the giftd port. +Bind TCP sockets to the spamd port.
-Make a TCP connection to the gopher port. +Bind TCP sockets to the ssh port.
-Make a TCP connection to the howl port. +Bind TCP sockets to the swat port.
-Make a TCP connection to the hplip port. +Bind TCP sockets to the syslogd port.
-Make a TCP connection to the http_cache port. +Bind TCP sockets to the telnetd port.
-Make a TCP connection to the http port. +Bind TCP sockets to the tftp port.
-Make a TCP connection to the imaze port. +Bind TCP sockets to the transproxy port.
-Make a TCP connection to the inetd_child port. +Bind TCP sockets to node unspec.
-Make a TCP connection to the innd port. +Bind TCP sockets to the uucpd port.
-Make a TCP connection to the ipp port. +Bind TCP sockets to the vnc port.
-Make a TCP connection to the ircd port. +Bind TCP sockets to the xserver port.
-Make a TCP connection to the isakmp port. +Bind TCP sockets to the zebra port.
-Make a TCP connection to the jabber_client port. +Bind TCP sockets to the zope port.
-Make a TCP connection to the jabber_interserver port. +Make a TCP connection to the afs_bos port.
-Make a TCP connection to the kerberos_admin port. +Make a TCP connection to the afs_fs port.
-Make a TCP connection to the kerberos_master port. +Make a TCP connection to the afs_ka port.
-Make a TCP connection to the kerberos port. +Make a TCP connection to the afs_pt port.
-Make a TCP connection to the ktalkd port. +Make a TCP connection to the afs_vl port.
-Make a TCP connection to the ldap port. +Connect TCP sockets to all ports.