diff options
Diffstat (limited to 'policy/modules/system/ipsec.te')
-rw-r--r-- | policy/modules/system/ipsec.te | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/policy/modules/system/ipsec.te b/policy/modules/system/ipsec.te index 97411bc9..968788c7 100644 --- a/policy/modules/system/ipsec.te +++ b/policy/modules/system/ipsec.te @@ -42,8 +42,8 @@ type ipsec_unit_t; init_unit_file(ipsec_unit_t) # type for runtime files, including pluto.ctl -type ipsec_var_run_t; -files_pid_file(ipsec_var_run_t) +type ipsec_runtime_t alias ipsec_var_run_t; +files_pid_file(ipsec_runtime_t) type ipsec_mgmt_t; type ipsec_mgmt_exec_t; @@ -54,8 +54,8 @@ role system_r types ipsec_mgmt_t; type ipsec_mgmt_lock_t; files_lock_file(ipsec_mgmt_lock_t) -type ipsec_mgmt_var_run_t; -files_pid_file(ipsec_mgmt_var_run_t) +type ipsec_mgmt_runtime_t alias ipsec_mgmt_var_run_t; +files_pid_file(ipsec_mgmt_runtime_t) type ipsec_supervisor_t; type ipsec_supervisor_exec_t; @@ -104,10 +104,10 @@ manage_dirs_pattern(ipsec_t, ipsec_tmp_t, ipsec_tmp_t) manage_files_pattern(ipsec_t, ipsec_tmp_t, ipsec_tmp_t) files_tmp_filetrans(ipsec_t, ipsec_tmp_t, { dir file }) -manage_dirs_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t) -manage_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t) -manage_sock_files_pattern(ipsec_t, ipsec_var_run_t, ipsec_var_run_t) -files_pid_filetrans(ipsec_t, ipsec_var_run_t, { dir file sock_file }) +manage_dirs_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t) +manage_files_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t) +manage_sock_files_pattern(ipsec_t, ipsec_runtime_t, ipsec_runtime_t) +files_pid_filetrans(ipsec_t, ipsec_runtime_t, { dir file sock_file }) can_exec(ipsec_t, ipsec_mgmt_exec_t) @@ -231,20 +231,20 @@ manage_dirs_pattern(ipsec_mgmt_t, ipsec_tmp_t, ipsec_tmp_t) manage_files_pattern(ipsec_mgmt_t, ipsec_tmp_t, ipsec_tmp_t) files_tmp_filetrans(ipsec_mgmt_t, ipsec_tmp_t, { dir file }) -allow ipsec_mgmt_t ipsec_mgmt_var_run_t:file manage_file_perms; -manage_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t) -manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t) -files_pid_filetrans(ipsec_mgmt_t, ipsec_mgmt_var_run_t, file) +allow ipsec_mgmt_t ipsec_mgmt_runtime_t:file manage_file_perms; +manage_files_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t) +manage_lnk_files_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t) +files_pid_filetrans(ipsec_mgmt_t, ipsec_mgmt_runtime_t, file) -allow ipsec_mgmt_t ipsec_var_run_t:sock_file manage_sock_file_perms; -files_pid_filetrans(ipsec_mgmt_t, ipsec_var_run_t, sock_file) +allow ipsec_mgmt_t ipsec_runtime_t:sock_file manage_sock_file_perms; +files_pid_filetrans(ipsec_mgmt_t, ipsec_runtime_t, sock_file) # logger, running in ipsec_mgmt_t needs to use sockets allow ipsec_mgmt_t self:unix_dgram_socket { create connect write }; allow ipsec_mgmt_t ipsec_t:unix_dgram_socket { create connect write }; # whack needs to connect to pluto -stream_connect_pattern(ipsec_mgmt_t, ipsec_var_run_t, ipsec_var_run_t, ipsec_t) +stream_connect_pattern(ipsec_mgmt_t, ipsec_runtime_t, ipsec_runtime_t, ipsec_t) can_exec(ipsec_mgmt_t, ipsec_mgmt_exec_t) allow ipsec_mgmt_t ipsec_mgmt_exec_t:lnk_file read; @@ -366,9 +366,9 @@ can_exec(racoon_t, racoon_exec_t) can_exec(racoon_t, setkey_exec_t) # manage pid file -manage_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t) -manage_sock_files_pattern(racoon_t, ipsec_var_run_t, ipsec_var_run_t) -files_pid_filetrans(racoon_t, ipsec_var_run_t, file) +manage_files_pattern(racoon_t, ipsec_runtime_t, ipsec_runtime_t) +manage_sock_files_pattern(racoon_t, ipsec_runtime_t, ipsec_runtime_t) +files_pid_filetrans(racoon_t, ipsec_runtime_t, file) allow racoon_t ipsec_conf_file_t:dir list_dir_perms; read_files_pattern(racoon_t, ipsec_conf_file_t, ipsec_conf_file_t) @@ -478,10 +478,10 @@ manage_files_pattern(ipsec_supervisor_t, ipsec_key_file_t, ipsec_key_file_t) allow ipsec_supervisor_t ipsec_t:unix_stream_socket { connectto }; allow ipsec_supervisor_t ipsec_t:process { signal signull }; -allow ipsec_supervisor_t ipsec_var_run_t:sock_file { rw_sock_file_perms unlink }; -manage_dirs_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) -manage_files_pattern(ipsec_supervisor_t, ipsec_var_run_t, ipsec_var_run_t) -files_pid_filetrans(ipsec_supervisor_t, ipsec_var_run_t, { dir file sock_file }) +allow ipsec_supervisor_t ipsec_runtime_t:sock_file { rw_sock_file_perms unlink }; +manage_dirs_pattern(ipsec_supervisor_t, ipsec_runtime_t, ipsec_runtime_t) +manage_files_pattern(ipsec_supervisor_t, ipsec_runtime_t, ipsec_runtime_t) +files_pid_filetrans(ipsec_supervisor_t, ipsec_runtime_t, { dir file sock_file }) domtrans_pattern(ipsec_supervisor_t, ipsec_exec_t, ipsec_t) |