forked from pool/selinux-policy
Hu
fade960df6
* Use new kanidm interfaces * Initial module for kanidm * Update bootupd policy * Allow rhsmcertd read/write access to /dev/papr-sysparm * Label /dev/papr-sysparm and /dev/papr-vpd * Allow abrt-dump-journal-core connect to winbindd * Allow systemd-hostnamed shut down nscd * Allow systemd-pstore send a message to syslogd over a unix domain * Allow postfix_domain map postfix_etc_t files * Allow microcode create /sys/devices/system/cpu/microcode/reload * Allow rhsmcertd read, write, and map ica tmpfs files * Support SGX devices * Allow initrc_t transition to passwd_t * Update fstab and cryptsetup generators policy * Allow xdm_t read and write the dma device * Update stalld policy for bpf usage * Allow systemd_gpt_generator to getattr on DOS directories * Make cgroup_memory_pressure_t a part of the file_type attribute * Allow ssh_t to change role to system_r * Update policy for coreos generators * Allow init_t nnp domain transition to firewalld_t * Label /run/modprobe.d with modules_conf_t * Allow virtnodedevd run udev with a domain transition * Allow virtnodedev_t create and use virtnodedev_lock_t * Allow virtstoraged manage files with virt_content_t type * Allow virtqemud unmount a filesystem with extended attributes * Allow svirt_t connect to unconfined_t over a unix domain socket * Update afterburn file transition policy * Allow systemd_generator read attributes of all filesystems * Allow fstab-generator read and write cryptsetup-generator unit file * Allow cryptsetup-generator read and write fstab-generator unit file * Allow systemd_generator map files in /etc * Allow systemd_generator read init's process state * Allow coreos-installer-generator read sssd public files * Allow coreos-installer-generator work with partitions * Label /etc/mdadm.conf.d with mdadm_conf_t * Confine coreos generators * Label /run/metadata with afterburn_runtime_t * Allow afterburn list ssh home directory * Label samba certificates with samba_cert_t * Label /run/coreos-installer-reboot with coreos_installer_var_run_t * Allow virtqemud read virt-dbus process state * Allow staff user dbus chat with virt-dbus * Allow staff use watch /run/systemd * Allow systemd_generator to write kmsg * Allow virtqemud connect to sanlock over a unix stream socket * Allow virtqemud relabel virt_var_run_t directories * Allow svirt_tcg_t read vm sysctls * Allow virtnodedevd connect to systemd-userdbd over a unix socket * Allow svirt read virtqemud fifo files * Allow svirt attach_queue to a virtqemud tun_socket * Allow virtqemud run ssh client with a transition * Allow virt_dbus_t connect to virtqemud_t over a unix stream socket * Update keyutils policy * Allow sshd_keygen_t connect to userdbd over a unix stream socket * Allow postfix-smtpd read mysql config files * Allow locate stream connect to systemd-userdbd * Allow the staff user use wireshark * Allow updatedb connect to userdbd over a unix stream socket * Allow gpg_t set attributes of public-keys.d * Allow gpg_t get attributes of login_userdomain stream * Allow systemd_getty_generator_t read /proc/1/environ * Allow systemd_getty_generator_t to read and write to tty_device_t * Drop publicfile module * Remove permissive domain for systemd_nsresourced_t * Change fs_dontaudit_write_cgroup_files() to apply to cgroup_t * Label /usr/bin/samba-gpupdate with samba_gpupdate_exec_t * Allow to create and delete socket files created by rhsm.service * Allow virtnetworkd exec shell when virt_hooks_unconfined is on * Allow unconfined_service_t transition to passwd_t * Support /var is empty * Allow abrt-dump-journal read all non_security socket files * Allow timemaster write to sysfs files * Dontaudit domain write cgroup files * Label /usr/lib/node_modules/npm/bin with bin_t * Allow ip the setexec permission * Allow systemd-networkd write files in /var/lib/systemd/network * Fix typo in systemd_nsresourced_prog_run_bpf() OBS-URL: https://build.opensuse.org/package/show/security:SELinux/selinux-policy?expand=0&rev=248
233 lines
4.8 KiB
Plaintext
233 lines
4.8 KiB
Plaintext
# Allow making anonymous memory executable, e.g.for runtime-code generation or executable stack.
|
|
#
|
|
allow_execmem = false
|
|
|
|
# Allow making a modified private filemapping executable (text relocation).
|
|
#
|
|
selinuxuser_execmod = false
|
|
|
|
# Allow making the stack executable via mprotect.Also requires allow_execmem.
|
|
#
|
|
selinuxuser_execstack = false
|
|
|
|
# Allow ftpd to read cifs directories.
|
|
#
|
|
ftpd_use_cifs = false
|
|
|
|
# Allow ftpd to read nfs directories.
|
|
#
|
|
ftpd_use_nfs = false
|
|
|
|
# Allow ftp servers to modify public filesused for public file transfer services.
|
|
#
|
|
allow_ftpd_anon_write = false
|
|
|
|
# Allow gssd to read temp directory.
|
|
#
|
|
gssd_read_tmp = true
|
|
|
|
# Allow Apache to modify public filesused for public file transfer services.
|
|
#
|
|
allow_httpd_anon_write = false
|
|
|
|
# Allow Apache to use mod_auth_pam module
|
|
#
|
|
httpd_mod_auth_pam = false
|
|
|
|
# Allow system to run with kerberos
|
|
#
|
|
allow_kerberos = true
|
|
|
|
# Allow rsync to modify public filesused for public file transfer services.
|
|
#
|
|
allow_rsync_anon_write = false
|
|
|
|
# Allow sasl to read shadow
|
|
#
|
|
saslauthd_read_shadow = false
|
|
|
|
# Allow samba to modify public filesused for public file transfer services.
|
|
#
|
|
allow_smbd_anon_write = false
|
|
|
|
# Allow system to run with NIS
|
|
#
|
|
allow_ypbind = false
|
|
|
|
# Allow zebra to write it own configuration files
|
|
#
|
|
zebra_write_config = false
|
|
|
|
# Enable extra rules in the cron domainto support fcron.
|
|
#
|
|
fcron_crond = false
|
|
|
|
#
|
|
# allow httpd to connect to mysql/posgresql
|
|
httpd_can_network_connect_db = false
|
|
|
|
#
|
|
# allow httpd to send dbus messages to avahi
|
|
httpd_dbus_avahi = true
|
|
|
|
#
|
|
# allow httpd to network relay
|
|
httpd_can_network_relay = false
|
|
|
|
# Allow httpd to use built in scripting (usually php)
|
|
#
|
|
httpd_builtin_scripting = true
|
|
|
|
# Allow http daemon to tcp connect
|
|
#
|
|
httpd_can_network_connect = false
|
|
|
|
# Allow httpd cgi support
|
|
#
|
|
httpd_enable_cgi = true
|
|
|
|
# Allow httpd to act as a FTP server bylistening on the ftp port.
|
|
#
|
|
httpd_enable_ftp_server = false
|
|
|
|
# Allow httpd to read home directories
|
|
#
|
|
httpd_enable_homedirs = false
|
|
|
|
# Run SSI execs in system CGI script domain.
|
|
#
|
|
httpd_ssi_exec = false
|
|
|
|
# Allow http daemon to communicate with the TTY
|
|
#
|
|
httpd_tty_comm = false
|
|
|
|
# Run CGI in the main httpd domain
|
|
#
|
|
httpd_unified = false
|
|
|
|
# Allow BIND to write the master zone files.Generally this is used for dynamic DNS.
|
|
#
|
|
named_write_master_zones = false
|
|
|
|
# Allow nfs to be exported read/write.
|
|
#
|
|
nfs_export_all_rw = true
|
|
|
|
# Allow nfs to be exported read only
|
|
#
|
|
nfs_export_all_ro = true
|
|
|
|
# Allow pppd to load kernel modules for certain modems
|
|
#
|
|
pppd_can_insmod = false
|
|
|
|
# Allow reading of default_t files.
|
|
#
|
|
read_default_t = false
|
|
|
|
# Allow samba to export user home directories.
|
|
#
|
|
samba_enable_home_dirs = false
|
|
|
|
# Allow squid to connect to all ports, not justHTTP, FTP, and Gopher ports.
|
|
#
|
|
squid_connect_any = false
|
|
|
|
# Support NFS home directories
|
|
#
|
|
use_nfs_home_dirs = true
|
|
|
|
# Support SAMBA home directories
|
|
#
|
|
use_samba_home_dirs = false
|
|
|
|
# Control users use of ping and traceroute
|
|
#
|
|
user_ping = false
|
|
|
|
# allow host key based authentication
|
|
#
|
|
ssh_keysign = false
|
|
|
|
# Allow pppd to be run for a regular user
|
|
#
|
|
pppd_for_user = false
|
|
|
|
# Allow spamd to write to users homedirs
|
|
#
|
|
spamd_enable_home_dirs = false
|
|
|
|
# Allow user to r/w files on filesystemsthat do not have extended attributes (FAT, CDROM, FLOPPY)
|
|
#
|
|
user_rw_noexattrfile = true
|
|
|
|
# Allow users to run TCP servers (bind to ports and accept connection fromthe same domain and outside users) disabling this forces FTP passive modeand may change other protocols.
|
|
#
|
|
user_tcp_server = false
|
|
|
|
# Allow all domains to talk to ttys
|
|
#
|
|
daemons_use_tty = false
|
|
|
|
# Allow login domains to polyinstatiate directories
|
|
#
|
|
polyinstantiation_enabled = false
|
|
|
|
# Allow all domains to dump core
|
|
#
|
|
daemons_dump_core = true
|
|
|
|
# Allow samba to act as the domain controller
|
|
#
|
|
samba_domain_controller = false
|
|
|
|
# Allow samba to export user home directories.
|
|
#
|
|
samba_run_unconfined = false
|
|
|
|
# Allows XServer to execute writable memory
|
|
#
|
|
xserver_execmem = false
|
|
|
|
# disallow guest accounts to execute files that they can create
|
|
#
|
|
guest_exec_content = false
|
|
xguest_exec_content = false
|
|
|
|
# Allow postfix locat to write to mail spool
|
|
#
|
|
postfix_local_write_mail_spool = false
|
|
|
|
# Allow common users to read/write noexattrfile systems
|
|
#
|
|
user_rw_noexattrfile = true
|
|
|
|
# Allow qemu to connect fully to the network
|
|
#
|
|
qemu_full_network = true
|
|
|
|
# System uses init upstart program
|
|
#
|
|
init_upstart = true
|
|
|
|
# Allow mount to mount any file/dir
|
|
#
|
|
mount_anyfile = true
|
|
|
|
# Allow all domains to mmap files
|
|
#
|
|
domain_can_mmap_files = true
|
|
|
|
# Allow confined applications to use nscd shared memory
|
|
#
|
|
nscd_use_shm = true
|
|
|
|
# allow unconfined users to transition to the chrome sandbox domains when running chrome-sandbox
|
|
#
|
|
unconfined_chrome_sandbox_transition = false
|
|
|
|
# Allow unconfined users to transition to the Mozilla plugin domain when running xulrunner plugin-container.
|
|
#
|
|
unconfined_mozilla_plugin_transition = false
|