policy_module(milter, 1.4.2) ######################################## # # Declarations # attribute milter_domains; attribute milter_data_type; milter_template(greylist) milter_template(regex) milter_template(spamass) type spamass_milter_state_t; files_type(spamass_milter_state_t) ####################################### # # Common local policy # allow milter_domains self:fifo_file rw_fifo_file_perms; allow milter_domains self:tcp_socket { accept listen }; kernel_dontaudit_read_system_state(milter_domains) corenet_all_recvfrom_unlabeled(milter_domains) corenet_all_recvfrom_netlabel(milter_domains) corenet_tcp_sendrecv_generic_if(milter_domains) corenet_tcp_sendrecv_generic_node(milter_domains) corenet_tcp_bind_generic_node(milter_domains) corenet_tcp_bind_milter_port(milter_domains) corenet_tcp_sendrecv_all_ports(milter_domains) miscfiles_read_localization(milter_domains) logging_send_syslog_msg(milter_domains) ######################################## # # greylist local policy # allow greylist_milter_t self:capability { chown dac_override setgid setuid sys_nice }; allow greylist_milter_t self:process { setsched getsched }; files_pid_filetrans(greylist_milter_t, greylist_milter_data_t, file) kernel_read_kernel_sysctls(greylist_milter_t) corenet_sendrecv_movaz_ssc_server_packets(greylist_milter_t) corenet_tcp_bind_movaz_ssc_port(greylist_milter_t) corenet_sendrecv_movaz_ssc_client_packets(greylist_milter_t) corenet_tcp_connect_movaz_ssc_port(greylist_milter_t) corenet_tcp_sendrecv_movaz_ssc_port(greylist_milter_t) corenet_sendrecv_kismet_server_packets(greylist_milter_t) corenet_tcp_bind_kismet_port(greylist_milter_t) corenet_tcp_sendrecv_kismet_port(greylist_milter_t) corecmd_exec_bin(greylist_milter_t) corecmd_exec_shell(greylist_milter_t) dev_read_rand(greylist_milter_t) dev_read_urand(greylist_milter_t) files_read_usr_files(greylist_milter_t) files_search_var_lib(greylist_milter_t) mta_read_config(greylist_milter_t) miscfiles_read_localization(greylist_milter_t) optional_policy(` mysql_stream_connect(greylist_milter_t) ') ######################################## # # regex local policy # allow regex_milter_t self:capability { setuid setgid dac_override }; files_search_spool(regex_milter_t) mta_read_config(regex_milter_t) ######################################## # # spamass local policy # allow spamass_milter_t spamass_milter_state_t:dir search_dir_perms; kernel_read_system_state(spamass_milter_t) corecmd_exec_shell(spamass_milter_t) files_search_var_lib(spamass_milter_t) mta_send_mail(spamass_milter_t) optional_policy(` spamassassin_domtrans_client(spamass_milter_t) ')