aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'policy/booleans.conf')
-rw-r--r--policy/booleans.conf793
1 files changed, 793 insertions, 0 deletions
diff --git a/policy/booleans.conf b/policy/booleans.conf
new file mode 100644
index 00000000..5dd0bf5a
--- /dev/null
+++ b/policy/booleans.conf
@@ -0,0 +1,793 @@
+#
+# Disable kernel module loading.
+#
+secure_mode_insmod = false
+
+#
+# Boolean to determine whether the system permits loading policy, setting
+# enforcing mode, and changing boolean values. Set this to true and you
+# have to reboot to set it back.
+#
+secure_mode_policyload = false
+
+#
+# Enabling secure mode disallows programs, such as
+# newrole, from transitioning to administrative
+# user domains.
+#
+secure_mode = false
+
+#
+# Control users use of ping and traceroute
+#
+user_ping = false
+
+#
+# Allow Apache to modify public files
+# used for public file transfer services. Directories/Files must
+# be labeled public_content_rw_t.
+#
+allow_httpd_anon_write = false
+
+#
+# Allow Apache to use mod_auth_pam
+#
+allow_httpd_mod_auth_pam = false
+
+#
+# Allow httpd to use built in scripting (usually php)
+#
+httpd_builtin_scripting = false
+
+#
+# Allow HTTPD scripts and modules to connect to the network using TCP.
+#
+httpd_can_network_connect = false
+
+#
+# Allow HTTPD scripts and modules to connect to databases over the network.
+#
+httpd_can_network_connect_db = false
+
+#
+# Allow httpd to act as a relay
+#
+httpd_can_network_relay = false
+
+#
+# Allow http daemon to send mail
+#
+httpd_can_sendmail = false
+
+#
+# Allow Apache to communicate with avahi service via dbus
+#
+httpd_dbus_avahi = false
+
+#
+# Allow httpd cgi support
+#
+httpd_enable_cgi = false
+
+#
+# Allow httpd to act as a FTP server by
+# listening on the ftp port.
+#
+httpd_enable_ftp_server = false
+
+#
+# Allow httpd to read home directories
+#
+httpd_enable_homedirs = false
+
+#
+# Allow HTTPD to run SSI executables in the same domain as system CGI scripts.
+#
+httpd_ssi_exec = false
+
+#
+# Unify HTTPD to communicate with the terminal.
+# Needed for entering the passphrase for certificates at
+# the terminal.
+#
+httpd_tty_comm = false
+
+#
+# Unify HTTPD handling of all content files.
+#
+httpd_unified = false
+
+#
+# Allow httpd to access cifs file systems
+#
+httpd_use_cifs = false
+
+#
+# Allow httpd to run gpg
+#
+httpd_use_gpg = false
+
+#
+# Allow httpd to access nfs file systems
+#
+httpd_use_nfs = false
+
+#
+# Allow BIND to write the master zone files.
+# Generally this is used for dynamic DNS or zone transfers.
+#
+named_write_master_zones = false
+
+#
+# Allow cdrecord to read various content.
+# nfs, samba, removable devices, user temp
+# and untrusted content files
+#
+cdrecord_read_content = false
+
+#
+# Allow clamd to use JIT compiler
+#
+clamd_use_jit = false
+
+#
+# Allow Cobbler to modify public files
+# used for public file transfer services.
+#
+cobbler_anon_write = false
+
+#
+# Allow system cron jobs to relabel filesystem
+# for restoring file contexts.
+#
+cron_can_relabel = false
+
+#
+# Enable extra rules in the cron domain
+# to support fcron.
+#
+fcron_crond = false
+
+#
+# Allow cvs daemon to read shadow
+#
+allow_cvs_read_shadow = false
+
+#
+# Allow dbadm to manage files in users home directories
+#
+dbadm_manage_user_files = false
+
+#
+# Allow dbadm to read files in users home directories
+#
+dbadm_read_user_files = false
+
+#
+# Allow the use of the audio devices as the source for the entropy feeds
+#
+entropyd_use_audio = false
+
+#
+# Allow exim to connect to databases (postgres, mysql)
+#
+exim_can_connect_db = false
+
+#
+# Allow exim to read unprivileged user files.
+#
+exim_read_user_files = false
+
+#
+# Allow exim to create, read, write, and delete
+# unprivileged user files.
+#
+exim_manage_user_files = false
+
+#
+# Allow ftp servers to upload files, used for public file
+# transfer services. Directories must be labeled
+# public_content_rw_t.
+#
+allow_ftpd_anon_write = false
+
+#
+# Allow ftp servers to login to local users and
+# read/write all files on the system, governed by DAC.
+#
+allow_ftpd_full_access = false
+
+#
+# Allow ftp servers to use cifs
+# used for public file transfer services.
+#
+allow_ftpd_use_cifs = false
+
+#
+# Allow ftp servers to use nfs
+# used for public file transfer services.
+#
+allow_ftpd_use_nfs = false
+
+#
+# Allow ftp to read and write files in the user home directories
+#
+ftp_home_dir = false
+
+#
+# Allow anon internal-sftp to upload files, used for
+# public file transfer services. Directories must be labeled
+# public_content_rw_t.
+#
+sftpd_anon_write = false
+
+#
+# Allow sftp-internal to read and write files
+# in the user home directories
+#
+sftpd_enable_homedirs = false
+
+#
+# Allow sftp-internal to login to local users and
+# read/write all files on the system, governed by DAC.
+#
+sftpd_full_access = false
+
+#
+# Determine whether Git CGI
+# can search home directories.
+#
+git_cgi_enable_homedirs = false
+
+#
+# Determine whether Git CGI
+# can access cifs file systems.
+#
+git_cgi_use_cifs = false
+
+#
+# Determine whether Git CGI
+# can access nfs file systems.
+#
+git_cgi_use_nfs = false
+
+#
+# Determine whether calling user domains
+# can execute Git daemon in the
+# git_session_t domain.
+#
+git_session_users = false
+
+#
+# Determine whether Git session daemons
+# can send syslog messages.
+#
+git_session_send_syslog_msg = false
+
+#
+# Determine whether Git system daemon
+# can search home directories.
+#
+git_system_enable_homedirs = false
+
+#
+# Determine whether Git system daemon
+# can access cifs file systems.
+#
+git_system_use_cifs = false
+
+#
+# Determine whether Git system daemon
+# can access nfs file systems.
+#
+git_system_use_nfs = false
+
+#
+# Allow usage of the gpg-agent --write-env-file option.
+# This also allows gpg-agent to manage user files.
+#
+gpg_agent_env_file = false
+
+#
+# Allow java executable stack
+#
+allow_java_execstack = false
+
+#
+# Allow confined applications to run with kerberos.
+#
+allow_kerberos = false
+
+#
+# Use lpd server instead of cups
+#
+use_lpd_server = false
+
+#
+# Allow confined web browsers to read home directory content
+#
+mozilla_read_content = false
+
+#
+# Allow mplayer executable stack
+#
+allow_mplayer_execstack = false
+
+#
+# Allow mysqld to connect to all ports
+#
+mysql_connect_any = false
+
+#
+# Allow openvpn to read home directories
+#
+openvpn_enable_homedirs = false
+
+#
+# Allow the portage domains to use NFS mounts (regular nfs_t)
+#
+portage_use_nfs = false
+
+#
+# Allow pppd to load kernel modules for certain modems
+#
+pppd_can_insmod = false
+
+#
+# Allow pppd to be run for a regular user
+#
+pppd_for_user = false
+
+#
+# Allow privoxy to connect to all ports, not just
+# HTTP, FTP, and Gopher ports.
+#
+privoxy_connect_any = false
+
+#
+# Allow Puppet client to manage all file
+# types.
+#
+puppet_manage_all_files = false
+
+#
+# Allow qemu to connect fully to the network
+#
+qemu_full_network = false
+
+#
+# Allow qemu to use cifs/Samba file systems
+#
+qemu_use_cifs = true
+
+#
+# Allow qemu to use serial/parallel communication ports
+#
+qemu_use_comm = false
+
+#
+# Allow qemu to use nfs file systems
+#
+qemu_use_nfs = true
+
+#
+# Allow qemu to use usb devices
+#
+qemu_use_usb = true
+
+#
+# Allow rgmanager domain to connect to the network using TCP.
+#
+rgmanager_can_network_connect = false
+
+#
+# Allow fenced domain to connect to the network using TCP.
+#
+fenced_can_network_connect = false
+
+#
+# Allow gssd to read temp directory. For access to kerberos tgt.
+#
+allow_gssd_read_tmp = true
+
+#
+# Allow nfs servers to modify public files
+# used for public file transfer services. Files/Directories must be
+# labeled public_content_rw_t.
+#
+allow_nfsd_anon_write = false
+
+#
+# Allow rsync to export any files/directories read only.
+#
+rsync_export_all_ro = false
+
+#
+# Allow rsync to modify public files
+# used for public file transfer services. Files/Directories must be
+# labeled public_content_rw_t.
+#
+allow_rsync_anon_write = false
+
+#
+# Allow samba to modify public files used for public file
+# transfer services. Files/Directories must be labeled
+# public_content_rw_t.
+#
+allow_smbd_anon_write = false
+
+#
+# Allow samba to create new home directories (e.g. via PAM)
+#
+samba_create_home_dirs = false
+
+#
+# Allow samba to act as the domain controller, add users,
+# groups and change passwords.
+#
+samba_domain_controller = false
+
+#
+# Allow samba to share users home directories.
+#
+samba_enable_home_dirs = false
+
+#
+# Allow samba to share any file/directory read only.
+#
+samba_export_all_ro = false
+
+#
+# Allow samba to share any file/directory read/write.
+#
+samba_export_all_rw = false
+
+#
+# Allow samba to run unconfined scripts
+#
+samba_run_unconfined = false
+
+#
+# Allow samba to export NFS volumes.
+#
+samba_share_nfs = false
+
+#
+# Allow samba to export ntfs/fusefs volumes.
+#
+samba_share_fusefs = false
+
+#
+# Allow confined virtual guests to manage nfs files
+#
+sanlock_use_nfs = false
+
+#
+# Allow confined virtual guests to manage cifs files
+#
+sanlock_use_samba = false
+
+#
+# Allow sasl to read shadow
+#
+allow_saslauthd_read_shadow = false
+
+#
+# Enable additional permissions needed to support
+# devices on 3ware controllers.
+#
+smartmon_3ware = false
+
+#
+# Allow user spamassassin clients to use the network.
+#
+spamassassin_can_network = false
+
+#
+# Allow spamd to read/write user home directories.
+#
+spamd_enable_home_dirs = true
+
+#
+# Allow squid to connect to all ports, not just
+# HTTP, FTP, and Gopher ports.
+#
+squid_connect_any = false
+
+#
+# Allow squid to run as a transparent proxy (TPROXY)
+#
+squid_use_tproxy = false
+
+#
+# Allow the Telepathy connection managers
+# to connect to any generic TCP port.
+#
+telepathy_tcp_connect_generic_network_ports = false
+
+#
+# Allow the Telepathy connection managers
+# to connect to any network port.
+#
+telepathy_connect_all_ports = false
+
+#
+# Allow tftp to modify public files
+# used for public file transfer services.
+#
+tftp_anon_write = false
+
+#
+# Allow tor daemon to bind
+# tcp sockets to all unreserved ports.
+#
+tor_bind_all_unreserved_ports = false
+
+#
+# Allow varnishd to connect to all ports,
+# not just HTTP.
+#
+varnishd_connect_any = false
+
+#
+# Ignore vbetool mmap_zero errors.
+#
+vbetool_mmap_zero_ignore = false
+
+#
+# Allow virt to use serial/parallell communication ports
+#
+virt_use_comm = false
+
+#
+# Allow virt to read fuse files
+#
+virt_use_fusefs = false
+
+#
+# Allow virt to manage nfs files
+#
+virt_use_nfs = false
+
+#
+# Allow virt to manage cifs files
+#
+virt_use_samba = false
+
+#
+# Allow virt to manage device configuration, (pci)
+#
+virt_use_sysfs = false
+
+#
+# Allow virt to use usb devices
+#
+virt_use_usb = true
+
+#
+# Allow webadm to manage files in users home directories
+#
+webadm_manage_user_files = false
+
+#
+# Allow webadm to read files in users home directories
+#
+webadm_read_user_files = false
+
+#
+# Ignore wine mmap_zero errors.
+#
+wine_mmap_zero_ignore = false
+
+#
+# Allow xend to run blktapctrl/tapdisk.
+# Not required if using dedicated logical volumes for disk images.
+#
+xend_run_blktap = true
+
+#
+# Allow xend to run qemu-dm.
+# Not required if using paravirt and no vfb.
+#
+xend_run_qemu = true
+
+#
+# Allow xen to manage nfs files
+#
+xen_use_nfs = false
+
+#
+# Allow xguest users to mount removable media
+#
+xguest_mount_media = true
+
+#
+# Allow xguest to configure Network Manager
+#
+xguest_connect_network = true
+
+#
+# Allow xguest to use blue tooth devices
+#
+xguest_use_bluetooth = true
+
+#
+# Allow zebra daemon to write it configuration files
+#
+allow_zebra_write_config = false
+
+#
+# Control the ability to mmap a low area of the address space,
+# as configured by /proc/sys/kernel/mmap_min_addr.
+#
+mmap_low_allowed = false
+
+#
+# Allow sysadm to debug or ptrace all processes.
+#
+allow_ptrace = false
+
+#
+# Allow unprived users to execute DDL statement
+#
+sepgsql_enable_users_ddl = true
+
+#
+# Allow database admins to execute DML statement
+#
+sepgsql_unconfined_dbadm = true
+
+#
+# allow host key based authentication
+#
+allow_ssh_keysign = false
+
+#
+# Allow ssh logins as sysadm_r:sysadm_t
+#
+ssh_sysadm_login = false
+
+#
+# Allows clients to write to the X server shared
+# memory segments.
+#
+allow_write_xshm = false
+
+#
+# Allow xdm logins as sysadm
+#
+xdm_sysadm_login = false
+
+#
+# Support X userspace object manager
+#
+xserver_object_manager = false
+
+#
+# Enable support for upstart as the init program.
+#
+init_upstart = false
+
+#
+# Allow racoon to read shadow
+#
+racoon_read_shadow = false
+
+#
+# Allow the mount command to mount any directory or file.
+#
+allow_mount_anyfile = false
+
+#
+# Allow users to connect to mysql
+#
+allow_user_mysql_connect = false
+
+#
+# Allow users to connect to PostgreSQL
+#
+allow_user_postgresql_connect = false
+
+#
+# Allow regular users direct mouse access
+#
+user_direct_mouse = false
+
+#
+# Allow users to read system messages.
+#
+user_dmesg = false
+
+#
+# Allow user to r/w files on filesystems
+# that do not have extended attributes (FAT, CDROM, FLOPPY)
+#
+user_rw_noexattrfile = false
+
+#
+# Allow w to display everyone
+#
+user_ttyfile_stat = false
+
+#
+# Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
+#
+allow_execheap = false
+
+#
+# Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")
+#
+allow_execmem = false
+
+#
+# Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")
+#
+allow_execmod = false
+
+#
+# Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")
+#
+allow_execstack = false
+
+#
+# Enable polyinstantiated directory support.
+#
+allow_polyinstantiation = false
+
+#
+# Allow system to run with NIS
+#
+allow_ypbind = false
+
+#
+# Allow logging in and using the system from /dev/console.
+#
+console_login = true
+
+#
+# Enable reading of urandom for all domains.
+#
+#
+#
+#
+# This should be enabled when all programs
+# are compiled with ProPolice/SSP
+# stack smashing protection. All domains will
+# be allowed to read from /dev/urandom.
+#
+global_ssp = false
+
+#
+# Allow email client to various content.
+# nfs, samba, removable devices, and user temp
+# files
+#
+mail_read_content = false
+
+#
+# Allow any files/directories to be exported read/write via NFS.
+#
+nfs_export_all_rw = false
+
+#
+# Allow any files/directories to be exported read/only via NFS.
+#
+nfs_export_all_ro = false
+
+#
+# Support NFS home directories
+#
+use_nfs_home_dirs = false
+
+#
+# Support SAMBA home directories
+#
+use_samba_home_dirs = false
+
+#
+# Allow users to run TCP servers (bind to ports and accept connection from
+# the same domain and outside users) disabling this forces FTP passive mode
+# and may change other protocols.
+#
+user_tcp_server = false
+