## Name service cache daemon. ######################################## ## ## Send generic signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_signal',` gen_require(` type nscd_t; ') allow $1 nscd_t:process signal; ') ######################################## ## ## Send kill signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_kill',` gen_require(` type nscd_t; ') allow $1 nscd_t:process sigkill; ') ######################################## ## ## Send null signals to nscd. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_signull',` gen_require(` type nscd_t; ') allow $1 nscd_t:process signull; ') ######################################## ## ## Execute nscd in the nscd domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`nscd_domtrans',` gen_require(` type nscd_t, nscd_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, nscd_exec_t, nscd_t) ') ######################################## ## ## Execute nscd in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_exec',` gen_require(` type nscd_exec_t; ') corecmd_search_bin($1) can_exec($1, nscd_exec_t) ') ######################################## ## ## Use nscd services by connecting using ## a unix domain stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_socket_use',` gen_require(` type nscd_t, nscd_var_run_t; class nscd { getserv getpwd getgrp gethost shmempwd shmemgrp shmemhost shmemserv }; ') allow $1 self:unix_stream_socket create_socket_perms; allow $1 nscd_t:nscd { getpwd getgrp gethost }; dontaudit $1 nscd_t:fd use; dontaudit $1 nscd_t:nscd { getserv shmempwd shmemgrp shmemhost shmemserv }; files_search_pids($1) stream_connect_pattern($1, nscd_var_run_t, nscd_var_run_t, nscd_t) dontaudit $1 nscd_var_run_t:file read_file_perms; ') ######################################## ## ## Use nscd services by mapping the ## database from an inherited nscd ## file descriptor. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_shm_use',` gen_require(` type nscd_t, nscd_var_run_t; class nscd { getpwd getgrp gethost shmempwd shmemgrp shmemhost }; ') allow $1 self:unix_stream_socket create_stream_socket_perms; allow $1 nscd_t:nscd { getpwd getgrp gethost shmempwd shmemgrp shmemhost }; allow $1 nscd_t:fd use; files_search_pids($1) stream_connect_pattern($1, nscd_var_run_t, nscd_var_run_t, nscd_t) dontaudit $1 nscd_var_run_t:file read_file_perms; allow $1 nscd_var_run_t:sock_file read_sock_file_perms; allow $1 nscd_var_run_t:dir list_dir_perms; dontaudit $1 nscd_var_run_t:file read_file_perms; ') ######################################## ## ## Do not audit attempts to search ## nscd pid directories. ## ## ## ## Domain to not audit. ## ## # interface(`nscd_dontaudit_search_pid',` gen_require(` type nscd_var_run_t; ') dontaudit $1 nscd_var_run_t:dir search_dir_perms; ') ######################################## ## ## Read nscd pid files. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_read_pid',` gen_require(` type nscd_var_run_t; ') files_search_pids($1) read_files_pattern($1, nscd_var_run_t, nscd_var_run_t) ') ######################################## ## ## Unconfined access to nscd services. ## ## ## ## Domain allowed access. ## ## # interface(`nscd_unconfined',` gen_require(` type nscd_t; class nscd all_nscd_perms; ') allow $1 nscd_t:nscd *; ') ######################################## ## ## Execute nscd in the nscd domain, and ## allow the specified role the nscd domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## Role allowed access. ## ## # interface(`nscd_run',` gen_require(` attribute_role nscd_roles; ') nscd_domtrans($1) roleattribute $2 nscd_roles; ') ######################################## ## ## Execute the nscd server init ## script in the initrc domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`nscd_initrc_domtrans',` gen_require(` type nscd_initrc_exec_t; ') init_labeled_script_domtrans($1, nscd_initrc_exec_t) ') ######################################## ## ## All of the rules required to ## administrate an nscd environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`nscd_admin',` gen_require(` type nscd_t, nscd_log_t, nscd_var_run_t; type nscd_initrc_exec_t; ') allow $1 nscd_t:process { ptrace signal_perms }; ps_process_pattern($1, nscd_t) init_labeled_script_domtrans($1, nscd_initrc_exec_t) domain_system_change_exemption($1) role_transition $2 nscd_initrc_exec_t system_r; allow $2 system_r; logging_list_logs($1) admin_pattern($1, nscd_log_t) files_list_pids($1) admin_pattern($1, nscd_var_run_t) nscd_run($1, $2) ')