Oreon-Lime-R2/selinux-policy/selinux-policy-d9f4a2b/selinux-policy-d9f4a2bbeb91fd95d0c35a90936efb9ea99d2455/policy/modules/contrib/mta.te

514 lines
14 KiB
Text
Raw Permalink Normal View History

policy_module(mta, 2.7.3)
########################################
#
# Declarations
#
attribute mailcontent_type;
attribute mta_exec_type;
attribute mta_user_agent;
attribute mailserver_delivery;
attribute mailserver_domain;
attribute mailserver_sender;
attribute user_mail_domain;
type etc_aliases_t;
files_type(etc_aliases_t)
type etc_mail_t;
files_config_file(etc_mail_t)
type mail_home_t alias mail_forward_t;
userdom_user_home_content(mail_home_t)
type mail_home_rw_t;
userdom_user_home_content(mail_home_rw_t)
type mqueue_spool_t;
files_mountpoint(mqueue_spool_t)
files_spool_file(mqueue_spool_t)
type mail_spool_t;
files_mountpoint(mail_spool_t)
files_spool_file(mail_spool_t)
type sendmail_exec_t;
mta_agent_executable(sendmail_exec_t)
mta_base_mail_template(system)
role system_r types system_mail_t;
mta_base_mail_template(user)
typealias user_mail_t alias { staff_mail_t sysadm_mail_t };
typealias user_mail_t alias { auditadm_mail_t secadm_mail_t };
typealias user_mail_tmp_t alias { staff_mail_tmp_t sysadm_mail_tmp_t };
typealias user_mail_tmp_t alias { auditadm_mail_tmp_t secadm_mail_tmp_t };
userdom_user_application_type(user_mail_t)
userdom_user_tmp_file(user_mail_tmp_t)
########################################
#
# Common base mail policy
#
allow user_mail_domain self:capability { setuid setgid chown };
allow user_mail_domain self:process { signal_perms setrlimit };
allow user_mail_domain self:fifo_file rw_fifo_file_perms;
allow user_mail_domain mta_exec_type:file entrypoint;
manage_files_pattern(user_mail_domain, mail_home_t, mail_home_t)
manage_dirs_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
manage_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
manage_lnk_files_pattern(user_mail_domain, mail_home_rw_t, mail_home_rw_t)
manage_files_pattern(user_mail_domain, { etc_mail_t etc_aliases_t }, { etc_mail_t etc_aliases_t })
manage_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
read_lnk_files_pattern(user_mail_domain, { mqueue_spool_t mail_spool_t }, { mqueue_spool_t mail_spool_t })
allow user_mail_domain sendmail_exec_t:lnk_file read_lnk_file_perms;
allow user_mail_domain etc_aliases_t:file map;
can_exec(user_mail_domain, { mta_exec_type sendmail_exec_t })
kernel_read_crypto_sysctls(user_mail_domain)
kernel_read_kernel_sysctls(user_mail_domain)
kernel_read_network_state(user_mail_domain)
kernel_request_load_module(user_mail_domain)
corenet_tcp_sendrecv_generic_if(user_mail_domain)
corenet_tcp_sendrecv_generic_node(user_mail_domain)
corenet_sendrecv_all_client_packets(user_mail_domain)
corenet_tcp_connect_all_ports(user_mail_domain)
corenet_tcp_sendrecv_all_ports(user_mail_domain)
corecmd_exec_bin(user_mail_domain)
dev_read_urand(user_mail_domain)
domain_use_interactive_fds(user_mail_domain)
files_read_etc_runtime_files(user_mail_domain)
files_read_usr_files(user_mail_domain)
files_search_spool(user_mail_domain)
files_dontaudit_search_pids(user_mail_domain)
fs_getattr_all_fs(user_mail_domain)
init_dontaudit_rw_utmp(user_mail_domain)
tunable_policy(`use_samba_home_dirs',`
fs_manage_cifs_dirs(user_mail_domain)
fs_manage_cifs_files(user_mail_domain)
fs_read_cifs_symlinks(user_mail_domain)
')
tunable_policy(`use_nfs_home_dirs',`
fs_manage_nfs_dirs(user_mail_domain)
fs_manage_nfs_files(user_mail_domain)
fs_read_nfs_symlinks(user_mail_domain)
')
optional_policy(`
antivirus_stream_connect(user_mail_domain)
antivirus_stream_connect(mta_user_agent)
')
optional_policy(`
arpwatch_data_filetrans(system_mail_t, mail_home_rw_t, dir, ".esmtp_queue")
')
optional_policy(`
courier_manage_spool_dirs(user_mail_domain)
courier_manage_spool_files(user_mail_domain)
courier_rw_spool_pipes(user_mail_domain)
')
optional_policy(`
ddclient_var_filetrans(system_mail_t, mail_home_rw_t, dir, ".esmtp_queue")
')
optional_policy(`
exim_domtrans(user_mail_domain)
exim_manage_log(user_mail_domain)
exim_manage_spool_files(user_mail_domain)
exim_read_var_lib_files(user_mail_domain)
')
optional_policy(`
files_getattr_tmp_dirs(user_mail_domain)
postfix_exec_master(user_mail_domain)
postfix_read_config(user_mail_domain)
postfix_search_spool(user_mail_domain)
postfix_rw_inherited_master_pipes(user_mail_domain)
ifdef(`distro_redhat',`
postfix_config_filetrans(user_mail_domain, etc_aliases_t, { dir file lnk_file sock_file fifo_file })
')
')
optional_policy(`
openshift_rw_inherited_content(mta_user_agent)
openshift_dontaudit_rw_inherited_fifo_files(mta_user_agent)
')
optional_policy(`
procmail_exec(user_mail_domain)
')
optional_policy(`
qmail_domtrans_inject(user_mail_domain)
')
optional_policy(`
sendmail_manage_log(user_mail_domain)
sendmail_log_filetrans_sendmail_log(user_mail_domain, file)
')
optional_policy(`
uucp_manage_spool(user_mail_domain)
')
mta_filetrans_admin_home_content(user_mail_domain)
mta_filetrans_home_content(user_mail_domain)
########################################
#
# System local policy
#
# newalias required this, not sure if it is needed in 'if' file
allow system_mail_t self:capability { dac_read_search dac_override fowner };
dontaudit system_mail_t self:capability net_admin;
allow system_mail_t mail_home_t:file manage_file_perms;
read_files_pattern(system_mail_t, mailcontent_type, mailcontent_type)
kernel_read_net_sysctls(system_mail_t)
corecmd_exec_shell(system_mail_t)
dev_read_sysfs(system_mail_t)
dev_read_rand(system_mail_t)
dev_read_urand(system_mail_t)
term_dontaudit_use_unallocated_ttys(system_mail_t)
init_use_script_ptys(system_mail_t)
init_dontaudit_rw_stream_socket(system_mail_t)
userdom_use_inherited_user_terminals(system_mail_t)
userdom_dontaudit_list_user_home_dirs(system_mail_t)
userdom_dontaudit_list_admin_dir(system_mail_t)
userdom_dontaudit_list_user_tmp(system_mail_t)
userdom_dontaudit_read_inherited_admin_home_files(system_mail_t)
manage_dirs_pattern(system_mail_t, mail_home_rw_t, mail_home_rw_t)
manage_files_pattern(system_mail_t, mail_home_rw_t, mail_home_rw_t)
allow system_mail_t mail_home_t:file manage_file_perms;
userdom_admin_home_dir_filetrans(system_mail_t, mail_home_t, file)
logging_append_all_logs(system_mail_t)
logging_send_syslog_msg(system_mail_t)
application_dontaudit_signull(system_mail_t)
optional_policy(`
tunable_policy(`httpd_can_sendmail',`
apache_read_inherited_sys_content_rw_files(system_mail_t)
')
apache_read_squirrelmail_data(system_mail_t)
apache_append_squirrelmail_data(system_mail_t)
# apache should set close-on-exec
apache_dontaudit_append_log(system_mail_t)
apache_dontaudit_rw_stream_sockets(system_mail_t)
apache_dontaudit_rw_tcp_sockets(system_mail_t)
apache_dontaudit_rw_sys_script_stream_sockets(system_mail_t)
apache_dontaudit_rw_tmp_files(system_mail_t)
apache_dontaudit_rw_fifo_file(user_mail_domain)
apache_dontaudit_rw_fifo_file(mta_user_agent)
# apache should set close-on-exec
apache_dontaudit_rw_stream_sockets(mta_user_agent)
apache_dontaudit_rw_sys_script_stream_sockets(mta_user_agent)
apache_append_log(mta_user_agent)
')
optional_policy(`
arpwatch_manage_tmp_files(system_mail_t)
ifdef(`hide_broken_symptoms', `
arpwatch_dontaudit_rw_packet_sockets(system_mail_t)
')
')
optional_policy(`
bugzilla_search_content(system_mail_t)
bugzilla_dontaudit_rw_stream_sockets(system_mail_t)
')
optional_policy(`
certmonger_read_inherited_pid_files(system_mail_t)
')
optional_policy(`
courier_stream_connect_authdaemon(system_mail_t)
')
optional_policy(`
cron_read_system_job_tmp_files(system_mail_t)
cron_dontaudit_write_pipes(system_mail_t)
cron_rw_system_job_stream_sockets(system_mail_t)
cron_rw_inherited_spool_files(system_mail_t)
cron_rw_inherited_user_spool_files(system_mail_t)
')
optional_policy(`
courier_manage_spool_dirs(system_mail_t)
courier_manage_spool_files(system_mail_t)
courier_rw_spool_pipes(system_mail_t)
courier_stream_connect_authdaemon(system_mail_t)
')
optional_policy(`
cvs_read_data(system_mail_t)
')
optional_policy(`
dbus_system_bus_client(system_mail_t)
')
optional_policy(`
exim_manage_spool_dirs(system_mail_t)
exim_manage_spool_files(system_mail_t)
')
optional_policy(`
fail2ban_append_log(user_mail_domain)
fail2ban_dontaudit_leaks(user_mail_domain)
fail2ban_rw_inherited_tmp_files(mta_user_agent)
fail2ban_rw_inherited_tmp_files(user_mail_domain)
')
optional_policy(`
logrotate_read_tmp_files(system_mail_t)
')
optional_policy(`
logwatch_read_tmp_files(system_mail_t)
')
optional_policy(`
# newaliases runs as system_mail_t when the sendmail initscript does a restart
milter_getattr_all_sockets(system_mail_t)
')
optional_policy(`
munin_dontaudit_leaks(system_mail_t)
munin_manage_var_lib_files(system_mail_t)
')
optional_policy(`
nagios_append_spool(system_mail_t)
nagios_read_tmp_files(system_mail_t)
')
optional_policy(`
manage_dirs_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_lnk_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_fifo_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
manage_sock_files_pattern(system_mail_t, etc_aliases_t, etc_aliases_t)
files_etc_filetrans(system_mail_t, etc_aliases_t, { file lnk_file sock_file fifo_file })
domain_use_interactive_fds(system_mail_t)
')
optional_policy(`
pcscd_signull(system_mail_t)
')
optional_policy(`
postfix_domtrans_postdrop(system_mail_t)
')
optional_policy(`
qmail_domtrans_inject(system_mail_t)
qmail_manage_spool_dirs(system_mail_t)
qmail_manage_spool_files(system_mail_t)
qmail_rw_spool_pipes(system_mail_t)
')
optional_policy(`
sxid_read_log(system_mail_t)
')
optional_policy(`
systemd_write_inhibit_pipes(system_mail_t)
')
optional_policy(`
userdom_dontaudit_use_user_ptys(system_mail_t)
optional_policy(`
cron_dontaudit_append_system_job_tmp_files(system_mail_t)
')
')
optional_policy(`
spamd_stream_connect(system_mail_t)
')
optional_policy(`
smartmon_read_tmp_files(system_mail_t)
')
tunable_policy(`use_ecryptfs_home_dirs',`
fs_manage_ecryptfs_files(system_mail_t)
')
# should break this up among sections:
optional_policy(`
# why is mail delivered to a directory of type arpwatch_data_t?
arpwatch_search_data(mailserver_delivery)
arpwatch_manage_tmp_files(mta_user_agent)
optional_policy(`
cron_read_system_job_tmp_files(mta_user_agent)
')
')
ifdef(`hide_broken_symptoms',`
domain_dontaudit_leaks(user_mail_domain)
domain_dontaudit_leaks(mta_user_agent)
')
########################################
#
# Mailserver delivery local policy
#
allow mailserver_delivery self:fifo_file rw_inherited_fifo_file_perms;
allow mailserver_delivery mail_spool_t:dir list_dir_perms;
create_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
read_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
append_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
create_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
read_lnk_files_pattern(mailserver_delivery, mail_spool_t, mail_spool_t)
userdom_search_admin_dir(mailserver_delivery)
read_files_pattern(mailserver_delivery, mail_home_t, mail_home_t)
manage_dirs_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
manage_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
manage_lnk_files_pattern(mailserver_delivery, mail_home_rw_t, mail_home_rw_t)
read_files_pattern(mailserver_delivery, system_mail_tmp_t, system_mail_tmp_t)
optional_policy(`
dovecot_manage_spool(mailserver_delivery)
dovecot_domtrans_deliver(mailserver_delivery)
')
optional_policy(`
logwatch_search_cache_dir(mailserver_delivery)
')
optional_policy(`
# so MTA can access /var/lib/mailman/mail/wrapper
files_search_var_lib(mailserver_delivery)
mailman_domtrans(mailserver_delivery)
mailman_read_data_symlinks(mailserver_delivery)
')
optional_policy(`
mailman_manage_data_files(mailserver_domain)
mailman_domtrans(mailserver_domain)
mailman_append_log(mailserver_domain)
mailman_read_log(mailserver_domain)
')
optional_policy(`
mta_filetrans_home_content(mailserver_domain)
mta_filetrans_admin_home_content(mailserver_domain)
mta_read_home(mailserver_domain)
mta_append_home(mailserver_domain)
')
optional_policy(`
pcp_read_lib_files(mailserver_delivery)
')
optional_policy(`
postfix_rw_inherited_master_pipes(mailserver_delivery)
')
optional_policy(`
uucp_domtrans_uux(mailserver_delivery)
')
########################################
#
# User send mail local policy
#
domain_use_interactive_fds(user_mail_t)
userdom_use_inherited_user_terminals(user_mail_t)
# Write to the user domain tty. cjp: why?
userdom_use_inherited_user_terminals(mta_user_agent)
# Create dead.letter in user home directories.
userdom_manage_user_home_content_files(user_mail_t)
userdom_filetrans_home_content(user_mail_t)
# for reading .forward - maybe we need a new type for it?
# also for delivering mail to maildir
userdom_manage_user_home_content_dirs(mailserver_delivery)
userdom_manage_user_home_content_files(mailserver_delivery)
userdom_manage_user_home_content_symlinks(mailserver_delivery)
userdom_manage_user_home_content_pipes(mailserver_delivery)
userdom_manage_user_home_content_sockets(mailserver_delivery)
allow mailserver_delivery mailserver_delivery:fifo_file rw_inherited_fifo_file_perms;
# Read user temporary files.
userdom_read_user_tmp_files(user_mail_t)
userdom_dontaudit_append_user_tmp_files(user_mail_t)
# cjp: this should probably be read all user tmp
# files in an appropriate place for mta_user_agent
userdom_read_user_tmp_files(mta_user_agent)
dev_read_sysfs(user_mail_t)
tunable_policy(`use_samba_home_dirs',`
fs_manage_cifs_files(user_mail_t)
fs_manage_cifs_symlinks(user_mail_t)
')
optional_policy(`
allow user_mail_t self:capability {dac_read_search };
# Read user temporary files.
# postfix seems to need write access if the file handle is opened read/write
userdom_rw_user_tmp_files(user_mail_t)
postfix_read_config(user_mail_t)
postfix_list_spool(user_mail_t)
')