# # This file is for the declaration of global tunables. # To change the default value at build time, the booleans.conf # file should be used. # ######################################## # # Common tunables # ## ##

## Allow cvs daemon to read shadow ##

##
# gen_tunable(allow_cvs_read_shadow,false) ## ##

## Allow making the heap executable. ##

##
gen_tunable(allow_execheap,false) ## ##

## Allow making anonymous memory executable, e.g. ## for runtime-code generation or executable stack. ##

##
gen_tunable(allow_execmem,false) ## ##

## Allow making a modified private file ## mapping executable (text relocation). ##

##
gen_tunable(allow_execmod,false) ## ##

## Allow making the stack executable via mprotect. ## Also requires allow_execmem. ##

##
gen_tunable(allow_execstack,false) ## ##

## Allow ftp servers to modify public files ## used for public file transfer services. ##

##
gen_tunable(allow_ftpd_anon_write,false) ## ##

## Allow gssd to read temp directory. ##

##
gen_tunable(allow_gssd_read_tmp,true) ## ##

## Allow Apache to modify public files ## used for public file transfer services. ##

##
gen_tunable(allow_httpd_anon_write,false) ## ##

## Allow java executable stack ##

##
gen_tunable(allow_java_execstack,false) ## ##

## Allow system to run with kerberos ##

##
gen_tunable(allow_kerberos,false) ## ##

## Allow rsync to modify public files ## used for public file transfer services. ##

##
gen_tunable(allow_rsync_anon_write,false) ## ##

## Allow sasl to read shadow ##

##
gen_tunable(allow_saslauthd_read_shadow,false) ## ##

## Allow samba to modify public files ## used for public file transfer services. ##

##
gen_tunable(allow_smbd_anon_write,false) ## ##

## Allow sysadm to ptrace all processes ##

##
gen_tunable(allow_ptrace,false) ## ##

## Allow system to run with NIS ##

##
gen_tunable(allow_ypbind,false) ## ##

## Enable extra rules in the cron domain ## to support fcron. ##

##
gen_tunable(fcron_crond,false) ## ##

## Allow ftp to read and write files in the user home directories ##

##
gen_tunable(ftp_home_dir,false) ## ##

## Allow ftpd to run directly without inetd ##

##
gen_tunable(ftpd_is_daemon,false) ## ##

## Allow httpd to use built in scripting (usually php) ##

##
gen_tunable(httpd_builtin_scripting,false) ## ##

## Allow http daemon to tcp connect ##

##
gen_tunable(httpd_can_network_connect,false) ## ##

## Allow httpd to connect to mysql/posgresql ##

##
gen_tunable(httpd_can_network_connect_db, false) ## ##

## Allow httpd to act as a relay ##

##
gen_tunable(httpd_can_network_relay, false) ## ##

## Allow httpd cgi support ##

##
gen_tunable(httpd_enable_cgi,false) ## ##

## Allow httpd to act as a FTP server by ## listening on the ftp port. ##

##
gen_tunable(httpd_enable_ftp_server,false) ## ##

## Allow httpd to read home directories ##

##
gen_tunable(httpd_enable_homedirs,false) ## ##

## Run SSI execs in system CGI script domain. ##

##
gen_tunable(httpd_ssi_exec,false) ## ##

## Allow http daemon to communicate with the TTY ##

##
gen_tunable(httpd_tty_comm,false) ## ##

## Run CGI in the main httpd domain ##

##
gen_tunable(httpd_unified,false) ## ##

## Allow BIND to write the master zone files. ## Generally this is used for dynamic DNS. ##

##
gen_tunable(named_write_master_zones,false) ## ##

## Allow nfs to be exported read/write. ##

##
gen_tunable(nfs_export_all_rw,false) ## ##

## Allow nfs to be exported read only ##

##
gen_tunable(nfs_export_all_ro,false) ## ##

## Allow pppd to load kernel modules for certain modems ##

##
gen_tunable(pppd_can_insmod,false) ## ##

## Allow reading of default_t files. ##

##
gen_tunable(read_default_t,false) ## ##

## Allow ssh to run from inetd instead of as a daemon. ##

##
gen_tunable(run_ssh_inetd,false) ## ##

## Allow samba to export user home directories. ##

##
gen_tunable(samba_enable_home_dirs,false) ## ##

## Allow spamassassin to do DNS lookups ##

##
gen_tunable(spamassasin_can_network,false) ## ##

## Allow squid to connect to all ports, not just ## HTTP, FTP, and Gopher ports. ##

##
gen_tunable(squid_connect_any,false) ## ##

## Allow ssh logins as sysadm_r:sysadm_t ##

##
gen_tunable(ssh_sysadm_login,false) ## ##

## Configure stunnel to be a standalone daemon or ## inetd service. ##

##
gen_tunable(stunnel_is_daemon,false) ## ##

## Support NFS home directories ##

##
gen_tunable(use_nfs_home_dirs,false) ## ##

## Support SAMBA home directories ##

##
gen_tunable(use_samba_home_dirs,false) ## ##

## Control users use of ping and traceroute ##

##
gen_tunable(user_ping,false) ######################################## # # Strict policy specific # ifdef(`strict_policy',` ## ##

## Allow gpg executable stack ##

##
gen_tunable(allow_gpg_execstack,false) ## ##

## Allow mplayer executable stack ##

##
gen_tunable(allow_mplayer_execstack,false) ## ##

## allow host key based authentication ##

##
gen_tunable(allow_ssh_keysign,false) ## ##

## Allow users to connect to mysql ##

##
gen_tunable(allow_user_mysql_connect,false) ## ##

## Allows clients to write to the X server shared ## memory segments. ##

##
gen_tunable(allow_write_xshm,false) ## ##

## Allow cdrecord to read various content. ## nfs, samba, removable devices, user temp ## and untrusted content files ##

##
gen_tunable(cdrecord_read_content,false) ## ##

## Allow system cron jobs to relabel filesystem ## for restoring file contexts. ##

##
gen_tunable(cron_can_relabel,false) ## ##

## Disable transitions to evolution domains. ##

##
gen_tunable(disable_evolution_trans,false) ## ##

## Disable transitions to user mozilla domains ##

##
gen_tunable(disable_mozilla_trans,false) ## ##

## Disable transitions to user thunderbird domains ##

##
gen_tunable(disable_thunderbird_trans,false) ## ##

## Allow email client to various content. ## nfs, samba, removable devices, user temp ## and untrusted content files ##

##
gen_tunable(mail_read_content,false) ## ##

## Control mozilla content access ##

##
gen_tunable(mozilla_read_content,false) ## ##

## Allow pppd to be run for a regular user ##

##
gen_tunable(pppd_for_user,false) ## ##

## Allow applications to read untrusted content ## If this is disallowed, Internet content has ## to be manually relabeled for read access to be granted ##

##
gen_tunable(read_untrusted_content,false) ## ##

## Allow user spamassassin clients to use the network. ##

##
gen_tunable(spamassassin_can_network,false) ## ##

## Allow staff_r users to search the sysadm home ## dir and read files (such as ~/.bashrc) ##

##
gen_tunable(staff_read_sysadm_file,false) ## ##

## Allow regular users direct mouse access ##

##
gen_tunable(user_direct_mouse,false) ## ##

## Allow users to read system messages. ##

##
gen_tunable(user_dmesg,false) ## ##

## Allow users to control network interfaces ## (also needs USERCTL=true) ##

##
gen_tunable(user_net_control,false) ## ##

## Allow user to r/w files on filesystems ## that do not have extended attributes (FAT, CDROM, FLOPPY) ##

##
gen_tunable(user_rw_noexattrfile,false) ## ##

## Allow users to rw usb devices ##

##
gen_tunable(user_rw_usb,false) ## ##

## Allow users to run TCP servers (bind to ports and accept connection from ## the same domain and outside users) disabling this forces FTP passive mode ## and may change other protocols. ##

##
gen_tunable(user_tcp_server,false) ## ##

## Allow w to display everyone ##

##
gen_tunable(user_ttyfile_stat,false) ## ##

## Allow applications to write untrusted content ## If this is disallowed, no Internet content ## will be stored. ##

##
gen_tunable(write_untrusted_content,false) ## ##

## Allow xdm logins as sysadm ##

##
gen_tunable(xdm_sysadm_login,false) ') ######################################## # # Targeted policy specific # ifdef(`targeted_policy',` ## ##

## Allow spammd to read/write user home directories. ##

##
gen_tunable(spamd_enable_home_dirs,true) ')