b43f464
policy_module(mta, 2.5.0)
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Declarations
1ec3d1a
#
1ec3d1a
1ec3d1a
attribute mailcontent_type;
1ec3d1a
attribute mta_exec_type;
1ec3d1a
attribute mta_user_agent;
1ec3d1a
attribute mailserver_delivery;
1ec3d1a
attribute mailserver_domain;
1ec3d1a
attribute mailserver_sender;
1ec3d1a
1ec3d1a
attribute user_mail_domain;
1ec3d1a
1ec3d1a
type etc_aliases_t;
1ec3d1a
files_type(etc_aliases_t)
1ec3d1a
1ec3d1a
type etc_mail_t;
1ec3d1a
files_config_file(etc_mail_t)
1ec3d1a
1ec3d1a
type mail_home_t alias mail_forward_t;
1ec3d1a
userdom_user_home_content(mail_home_t)
1ec3d1a
1ec3d1a
type mail_home_rw_t;
1ec3d1a
userdom_user_home_content(mail_home_rw_t)
1ec3d1a
1ec3d1a
type mqueue_spool_t;
1ec3d1a
files_mountpoint(mqueue_spool_t)
1ec3d1a
files_spool_file(mqueue_spool_t)
1ec3d1a
1ec3d1a
type mail_spool_t;
1ec3d1a
files_mountpoint(mail_spool_t)
1ec3d1a
files_spool_file(mail_spool_t)
1ec3d1a
1ec3d1a
type sendmail_exec_t;
1ec3d1a
mta_agent_executable(sendmail_exec_t)
1ec3d1a
1ec3d1a
mta_base_mail_template(system)
1ec3d1a
role system_r types system_mail_t;
1ec3d1a
1ec3d1a
mta_base_mail_template(user)
1ec3d1a
typealias user_mail_t alias { staff_mail_t sysadm_mail_t };
1ec3d1a
typealias user_mail_t alias { auditadm_mail_t secadm_mail_t };
1ec3d1a
typealias user_mail_tmp_t alias { staff_mail_tmp_t sysadm_mail_tmp_t };
1ec3d1a
typealias user_mail_tmp_t alias { auditadm_mail_tmp_t secadm_mail_tmp_t };
b43f464
userdom_user_application_type(user_mail_t)
Chris PeBenito 66b26ac
userdom_user_tmp_file(user_mail_tmp_t)
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
b43f464
# System mail local policy
1ec3d1a
#
1ec3d1a
b43f464
# newalias required this, not sure if it is needed in 'if' file
1ec3d1a
allow system_mail_t self:capability { dac_override fowner };
1ec3d1a
1ec3d1a
allow system_mail_t mail_home_t:file manage_file_perms;
1ec3d1a
1ec3d1a
read_files_pattern(system_mail_t, mailcontent_type, mailcontent_type)
1ec3d1a
1ec3d1a
corecmd_exec_shell(system_mail_t)
1ec3d1a
1ec3d1a
dev_read_sysfs(system_mail_t)
Chris PeBenito 9401ae1
dev_read_rand(system_mail_t)
b43f464
dev_read_urand(system_mail_t)
b43f464
1ec3d1a
1ec3d1a
fs_rw_anon_inodefs_files(system_mail_t)
1ec3d1a
1ec3d1a
term_dontaudit_use_unallocated_ttys(system_mail_t)
1ec3d1a
1ec3d1a
init_use_script_ptys(system_mail_t)
1ec3d1a
init_dontaudit_rw_stream_socket(system_mail_t)
1ec3d1a
1ec3d1a
userdom_use_inherited_user_terminals(system_mail_t)
1ec3d1a
userdom_dontaudit_search_user_home_dirs(system_mail_t)
1ec3d1a
userdom_dontaudit_list_admin_dir(system_mail_t)
1ec3d1a
1ec3d1a
manage_dirs_pattern(system_mail_t, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
manage_files_pattern(system_mail_t, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
1ec3d1a
allow system_mail_t mail_home_t:file manage_file_perms;
1ec3d1a
userdom_admin_home_dir_filetrans(system_mail_t, mail_home_t, file)
1ec3d1a
1ec3d1a
1ec3d1a
logging_append_all_logs(system_mail_t)
1ec3d1a
1ec3d1a
logging_send_syslog_msg(system_mail_t)
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	apache_read_squirrelmail_data(system_mail_t)
1ec3d1a
	apache_append_squirrelmail_data(system_mail_t)
b43f464
b43f464
	# apache should set close-on-exec
1ec3d1a
	apache_dontaudit_append_log(system_mail_t)
1ec3d1a
	apache_dontaudit_rw_stream_sockets(system_mail_t)
1ec3d1a
	apache_dontaudit_rw_tcp_sockets(system_mail_t)
1ec3d1a
	apache_dontaudit_rw_sys_script_stream_sockets(system_mail_t)
1ec3d1a
	apache_dontaudit_rw_tmp_files(system_mail_t)
1ec3d1a
d1ba9e0
	apache_dontaudit_rw_fifo_file(user_mail_domain)
d1ba9e0
	apache_dontaudit_rw_fifo_file(mta_user_agent)
1ec3d1a
	# apache should set close-on-exec
1ec3d1a
	apache_dontaudit_rw_stream_sockets(mta_user_agent)
1ec3d1a
	apache_dontaudit_rw_sys_script_stream_sockets(mta_user_agent)
1ec3d1a
	apache_append_log(mta_user_agent)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	arpwatch_manage_tmp_files(system_mail_t)
bde701d
bde701d
        ifdef(`hide_broken_symptoms', `
bde701d
                arpwatch_dontaudit_rw_packet_sockets(system_mail_t)
bde701d
        ')
bde701d
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	bugzilla_search_content(system_mail_t)
1ec3d1a
	bugzilla_dontaudit_rw_stream_sockets(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	courier_stream_connect_authdaemon(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	cron_read_system_job_tmp_files(system_mail_t)
1ec3d1a
	cron_dontaudit_write_pipes(system_mail_t)
1ec3d1a
	cron_rw_system_job_stream_sockets(system_mail_t)
1ec3d1a
	cron_rw_inherited_spool_files(system_mail_t)
1ec3d1a
	cron_rw_inherited_user_spool_files(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	courier_manage_spool_dirs(system_mail_t)
1ec3d1a
	courier_manage_spool_files(system_mail_t)
1ec3d1a
	courier_rw_spool_pipes(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	cvs_read_data(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	fail2ban_append_log(system_mail_t)
1ec3d1a
	fail2ban_dontaudit_leaks(system_mail_t)
1ec3d1a
	fail2ban_rw_inherited_tmp_files(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	logrotate_read_tmp_files(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	logwatch_read_tmp_files(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
b43f464
	# newaliases runs as system_mail_t when the sendmail initscript does a restart
1ec3d1a
	milter_getattr_all_sockets(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	munin_dontaudit_leaks(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	nagios_read_tmp_files(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	manage_dirs_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
1ec3d1a
	manage_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
1ec3d1a
	manage_lnk_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
1ec3d1a
	manage_fifo_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
1ec3d1a
	manage_sock_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
1ec3d1a
	files_etc_filetrans(system_mail_t, etc_aliases_t, { file lnk_file sock_file fifo_file })
1ec3d1a
1ec3d1a
	domain_use_interactive_fds(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	qmail_domtrans_inject(system_mail_t)
1ec3d1a
	qmail_manage_spool_dirs(system_mail_t)
1ec3d1a
	qmail_manage_spool_files(system_mail_t)
1ec3d1a
	qmail_rw_spool_pipes(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	sxid_read_log(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	userdom_dontaudit_use_user_ptys(system_mail_t)
1ec3d1a
1ec3d1a
	optional_policy(`
1ec3d1a
		cron_dontaudit_append_system_job_tmp_files(system_mail_t)
1ec3d1a
	')
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	spamd_stream_connect(system_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	smartmon_read_tmp_files(system_mail_t)
1ec3d1a
')
1ec3d1a
b43f464
# should break this up among sections:
1ec3d1a
1ec3d1a
optional_policy(`
b43f464
	# why is mail delivered to a directory of type arpwatch_data_t?
b43f464
	arpwatch_search_data(mailserver_delivery)
1ec3d1a
	arpwatch_manage_tmp_files(mta_user_agent)
1ec3d1a
1ec3d1a
	optional_policy(`
1ec3d1a
		cron_read_system_job_tmp_files(mta_user_agent)
1ec3d1a
	')
1ec3d1a
')
1ec3d1a
1ec3d1a
ifdef(`hide_broken_symptoms',`
1ec3d1a
	domain_dontaudit_leaks(user_mail_domain)
1ec3d1a
	domain_dontaudit_leaks(mta_user_agent)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Mailserver delivery local policy
1ec3d1a
#
1ec3d1a
181d642
allow mailserver_delivery self:fifo_file rw_inherited_fifo_file_perms;
181d642
1ec3d1a
allow mailserver_delivery mail_spool_t:dir list_dir_perms;
1ec3d1a
create_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
1ec3d1a
read_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
1ec3d1a
append_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
1ec3d1a
create_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
1ec3d1a
read_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
1ec3d1a
1ec3d1a
userdom_search_admin_dir(mailserver_delivery)
1ec3d1a
read_files_pattern(mailserver_delivery, mail_home_t, mail_home_t)
1ec3d1a
1ec3d1a
manage_dirs_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
manage_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
f1e9818
manage_lnk_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
1ec3d1a
read_files_pattern(mailserver_delivery, system_mail_tmp_t, system_mail_tmp_t)
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	dovecot_manage_spool(mailserver_delivery)
1ec3d1a
	dovecot_domtrans_deliver(mailserver_delivery)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	logwatch_search_cache_dir(mailserver_delivery)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	# so MTA can access /var/lib/mailman/mail/wrapper
1ec3d1a
	files_search_var_lib(mailserver_delivery)
1ec3d1a
1ec3d1a
	mailman_domtrans(mailserver_delivery)
1ec3d1a
	mailman_read_data_symlinks(mailserver_delivery)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1f86dac
	postfix_rw_inherited_master_pipes(mailserver_delivery)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	uucp_domtrans_uux(mailserver_delivery)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
b43f464
# User send mail local policy
1ec3d1a
#
1ec3d1a
b43f464
domain_use_interactive_fds(user_mail_t)
1ec3d1a
1ec3d1a
userdom_use_inherited_user_terminals(user_mail_t)
1ec3d1a
# Write to the user domain tty. cjp: why?
1ec3d1a
userdom_use_inherited_user_terminals(mta_user_agent)
1ec3d1a
# Create dead.letter in user home directories.
1ec3d1a
userdom_manage_user_home_content_files(user_mail_t)
1ec3d1a
userdom_user_home_dir_filetrans_user_home_content(user_mail_t, file)
1ec3d1a
# for reading .forward - maybe we need a new type for it?
1ec3d1a
# also for delivering mail to maildir
1ec3d1a
userdom_manage_user_home_content_dirs(mailserver_delivery)
1ec3d1a
userdom_manage_user_home_content_files(mailserver_delivery)
1ec3d1a
userdom_manage_user_home_content_symlinks(mailserver_delivery)
1ec3d1a
userdom_manage_user_home_content_pipes(mailserver_delivery)
1ec3d1a
userdom_manage_user_home_content_sockets(mailserver_delivery)
1ec3d1a
userdom_user_home_dir_filetrans_user_home_content(mailserver_delivery, { dir file lnk_file fifo_file sock_file })
2c77cdc
allow mailserver_delivery mailserver_delivery:fifo_file rw_inherited_fifo_file_perms;
2c77cdc
1ec3d1a
# Read user temporary files.
1ec3d1a
userdom_read_user_tmp_files(user_mail_t)
1ec3d1a
userdom_dontaudit_append_user_tmp_files(user_mail_t)
1ec3d1a
# cjp: this should probably be read all user tmp
1ec3d1a
# files in an appropriate place for mta_user_agent
1ec3d1a
userdom_read_user_tmp_files(mta_user_agent)
1ec3d1a
1ec3d1a
dev_read_sysfs(user_mail_t)
1ec3d1a
1ec3d1a
tunable_policy(`use_samba_home_dirs',`
1ec3d1a
	fs_manage_cifs_files(user_mail_t)
1ec3d1a
	fs_manage_cifs_symlinks(user_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
Chris PeBenito 9401ae1
	allow user_mail_t self:capability dac_override;
Chris PeBenito 9401ae1
b43f464
	# Read user temporary files.
b43f464
	# postfix seems to need write access if the file handle is opened read/write
1ec3d1a
	userdom_rw_user_tmp_files(user_mail_t)
1ec3d1a
1ec3d1a
	postfix_read_config(user_mail_t)
1ec3d1a
	postfix_list_spool(user_mail_t)
1ec3d1a
')
1ec3d1a
1ec3d1a
########################################
1ec3d1a
#
1ec3d1a
# Comman user_mail_domain policy
1ec3d1a
#
1ec3d1a
1ec3d1a
allow user_mail_domain self:capability { setuid setgid chown };
1ec3d1a
allow user_mail_domain self:process { signal_perms setrlimit };
1ec3d1a
allow user_mail_domain self:tcp_socket create_socket_perms;
1ec3d1a
allow user_mail_domain self:fifo_file rw_fifo_file_perms;
1ec3d1a
allow user_mail_domain mta_exec_type:file entrypoint;
1ec3d1a
1ec3d1a
append_files_pattern(user_mail_domain, mail_home_t, mail_home_t)
1ec3d1a
read_files_pattern(user_mail_domain, mail_home_t, mail_home_t)
1ec3d1a
1ec3d1a
manage_dirs_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
manage_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
1ec3d1a
1ec3d1a
read_files_pattern(user_mail_domain, etc_aliases_t, etc_aliases_t)
1ec3d1a
1ec3d1a
can_exec(user_mail_domain, mta_exec_type)
1ec3d1a
1ec3d1a
allow system_mail_t user_mail_domain:file read_file_perms;
1ec3d1a
1ec3d1a
read_files_pattern(user_mail_domain, etc_mail_t, etc_mail_t)
1ec3d1a
1ec3d1a
kernel_read_network_state(user_mail_domain)
1ec3d1a
kernel_request_load_module(user_mail_domain)
1ec3d1a
1ec3d1a
dev_read_urand(user_mail_domain)
1ec3d1a
1ec3d1a
1ec3d1a
# Write to /var/spool/mail and /var/spool/mqueue.
1ec3d1a
manage_files_pattern(user_mail_domain, mail_spool_t, mail_spool_t)
1ec3d1a
manage_files_pattern(user_mail_domain, mqueue_spool_t, mqueue_spool_t)
1ec3d1a
read_lnk_files_pattern(user_mail_domain, mail_spool_t, mail_spool_t)
1ec3d1a
read_lnk_files_pattern(user_mail_domain, mqueue_spool_t, mqueue_spool_t)
1ec3d1a
1ec3d1a
# re-exec itself
1ec3d1a
can_exec(user_mail_domain, sendmail_exec_t)
1ec3d1a
allow user_mail_domain sendmail_exec_t:lnk_file read_lnk_file_perms;
1ec3d1a
1ec3d1a
kernel_read_kernel_sysctls(user_mail_domain)
1ec3d1a
1ec3d1a
corenet_tcp_sendrecv_generic_if(user_mail_domain)
1ec3d1a
corenet_tcp_sendrecv_generic_node(user_mail_domain)
1ec3d1a
corenet_tcp_sendrecv_all_ports(user_mail_domain)
1ec3d1a
corenet_tcp_connect_all_ports(user_mail_domain)
1ec3d1a
corenet_tcp_connect_smtp_port(user_mail_domain)
1ec3d1a
corenet_sendrecv_smtp_client_packets(user_mail_domain)
1ec3d1a
1ec3d1a
corecmd_exec_bin(user_mail_domain)
1ec3d1a
1ec3d1a
files_search_spool(user_mail_domain)
1ec3d1a
# It wants to check for nscd
1ec3d1a
files_dontaudit_search_pids(user_mail_domain)
1ec3d1a
allow user_mail_domain etc_mail_t:dir search_dir_perms;
1ec3d1a
1ec3d1a
files_read_etc_runtime_files(user_mail_domain)
1ec3d1a
1ec3d1a
# Check available space.
1ec3d1a
fs_getattr_xattr_fs(user_mail_domain)
1ec3d1a
1ec3d1a
init_dontaudit_rw_utmp(user_mail_domain)
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	courier_manage_spool_dirs(user_mail_domain)
1ec3d1a
	courier_manage_spool_files(user_mail_domain)
1ec3d1a
	courier_rw_spool_pipes(user_mail_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	exim_domtrans(user_mail_domain)
1ec3d1a
	exim_manage_log(user_mail_domain)
1ec3d1a
	exim_manage_spool_files(user_mail_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	# postfix needs this for newaliases
1ec3d1a
	files_getattr_tmp_dirs(user_mail_domain)
1ec3d1a
1ec3d1a
	postfix_exec_master(user_mail_domain)
1ec3d1a
	postfix_read_config(user_mail_domain)
1ec3d1a
	postfix_search_spool(user_mail_domain)
1f86dac
	postfix_rw_inherited_master_pipes(user_mail_domain)
1ec3d1a
1ec3d1a
	ifdef(`distro_redhat',`
1ec3d1a
		# compatability for old default main.cf
1ec3d1a
		postfix_config_filetrans(user_mail_domain, etc_aliases_t, { dir file lnk_file sock_file fifo_file })
1ec3d1a
	')
1ec3d1a
')
1ec3d1a
82bef4c
optional_policy(`
82bef4c
	openshift_rw_inherited_content(mta_user_agent)
82bef4c
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	procmail_exec(user_mail_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	qmail_domtrans_inject(user_mail_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	# Write to /var/log/sendmail.st
1ec3d1a
	sendmail_manage_log(user_mail_domain)
1ec3d1a
	sendmail_create_log(user_mail_domain)
1ec3d1a
')
1ec3d1a
1ec3d1a
optional_policy(`
1ec3d1a
	uucp_manage_spool(user_mail_domain)
1ec3d1a
')
0fd9290
0fd9290
optional_policy(`
0fd9290
	clamav_stream_connect(user_mail_domain)
0fd9290
	clamav_stream_connect(mta_user_agent)
0fd9290
')