## An ident daemon with IP masq/NAT support and the ability to specify responses. ######################################## ## ## Role access for oident. ## ## ## ## Role allowed access. ## ## ## ## ## User domain for the role. ## ## # interface(`oident_role',` refpolicywarn(`$0($*) has been deprecated') ') ######################################## ## ## Read oidentd user home content. ## ## ## ## Domain allowed access. ## ## # interface(`oident_read_user_content', ` gen_require(` type oidentd_home_t; ') userdom_search_user_home_dirs($1) allow $1 oidentd_home_t:file read_file_perms; ') ######################################## ## ## Create, read, write, and delete ## oidentd user home content. ## ## ## ## Domain allowed access. ## ## # interface(`oident_manage_user_content', ` gen_require(` type oidentd_home_t; ') userdom_search_user_home_dirs($1) allow $1 oidentd_home_t:file manage_file_perms; ') ######################################## ## ## Relabel oidentd user home content. ## ## ## ## Domain allowed access. ## ## # interface(`oident_relabel_user_content', ` gen_require(` type oidentd_home_t; ') userdom_search_user_home_dirs($1) allow $1 oidentd_home_t:file relabel_file_perms; ') ######################################## ## ## Create objects in user home ## directories with the oidentd home type. ## ## ## ## Domain allowed access. ## ## ## ## ## Class of the object being created. ## ## ## ## ## The name of the object being created. ## ## # interface(`oident_home_filetrans_oidentd_home',` gen_require(` type oidentd_home_t; ') userdom_user_home_dir_filetrans($1, oidentd_home_t, $2, $3) ') ######################################## ## ## All of the rules required to ## administrate an oident environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`oident_admin',` gen_require(` type oidentd_t, oidentd_initrc_exec_t, oidentd_config_t; ') allow $1 oidentd_t:process { ptrace signal_perms }; ps_process_pattern($1, oidentd_t) init_labeled_script_domtrans($1, oidentd_initrc_exec_t) domain_system_change_exemption($1) role_transition $2 oidentd_initrc_exec_t system_r; allow $2 system_r; files_list_etc($1) admin_pattern($1, oidentd_config_t) ')