## Mail transfer agent. ######################################## ## ## Execute a domain transition to run exim. ## ## ## ## Domain allowed to transition. ## ## # interface(`exim_domtrans',` gen_require(` type exim_t, exim_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, exim_exec_t, exim_t) ') ######################################## ## ## Execute the mailman program in the mailman domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## The role to allow the mailman domain. ## ## ## # interface(`exim_run',` gen_require(` type exim_t; ') exim_domtrans($1) role $2 types exim_t; ') ######################################## ## ## Execute exim in the exim domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`exim_initrc_domtrans',` gen_require(` type exim_initrc_exec_t; ') init_labeled_script_domtrans($1, exim_initrc_exec_t) ') ######################################## ## ## Do not audit attempts to read, ## exim tmp files ## ## ## ## Domain to not audit. ## ## # interface(`exim_dontaudit_read_tmp_files',` gen_require(` type exim_tmp_t; ') dontaudit $1 exim_tmp_t:file read_file_perms; ') ######################################## ## ## Allow domain to read, exim tmp files ## ## ## ## Domain allowed access. ## ## # interface(`exim_read_tmp_files',` gen_require(` type exim_tmp_t; ') allow $1 exim_tmp_t:file read_file_perms; files_search_tmp($1) ') ######################################## ## ## Read exim PID files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_read_pid_files',` gen_require(` type exim_var_run_t; ') allow $1 exim_var_run_t:file read_file_perms; files_search_pids($1) ') ######################################## ## ## Allow the specified domain to read exim's log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`exim_read_log',` gen_require(` type exim_log_t; ') read_files_pattern($1, exim_log_t, exim_log_t) logging_search_logs($1) ') ######################################## ## ## Allow the specified domain to append ## exim log files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_append_log',` gen_require(` type exim_log_t; ') append_files_pattern($1, exim_log_t, exim_log_t) logging_search_logs($1) ') ######################################## ## ## Allow the specified domain to manage exim's log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`exim_manage_log',` gen_require(` type exim_log_t; ') manage_files_pattern($1, exim_log_t, exim_log_t) logging_search_logs($1) ') ######################################## ## ## Create, read, write, and delete ## exim spool dirs. ## ## ## ## Domain allowed access. ## ## # interface(`exim_manage_spool_dirs',` gen_require(` type exim_spool_t; ') manage_dirs_pattern($1, exim_spool_t, exim_spool_t) files_search_spool($1) ') ######################################## ## ## Read exim spool files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_read_spool_files',` gen_require(` type exim_spool_t; ') allow $1 exim_spool_t:file read_file_perms; allow $1 exim_spool_t:dir list_dir_perms; files_search_spool($1) ') ######################################## ## ## Create, read, write, and delete ## exim spool files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_manage_spool_files',` gen_require(` type exim_spool_t; ') manage_files_pattern($1, exim_spool_t, exim_spool_t) files_search_spool($1) ') ######################################## ## ## Read exim var lib files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_read_var_lib_files',` gen_require(` type exim_var_lib_t; ') read_files_pattern($1, exim_var_lib_t, exim_var_lib_t) files_search_var_lib($1) ') ######################################## ## ## Create, read, and write exim var lib files. ## ## ## ## Domain allowed access. ## ## # interface(`exim_manage_var_lib_files',` gen_require(` type exim_var_lib_t; ') manage_files_pattern($1, exim_var_lib_t, exim_var_lib_t) files_search_var_lib($1) ') ######################################## ## ## All of the rules required to ## administrate an exim environment. ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## # interface(`exim_admin',` gen_require(` type exim_t, exim_spool_t, exim_log_t; type exim_var_run_t, exim_initrc_exec_t, exim_tmp_t; type exim_keytab_t; ') allow $1 exim_t:process signal_perms; ps_process_pattern($1, exim_t) tunable_policy(`deny_ptrace',`',` allow $1 exim_t:process ptrace; ') exim_initrc_domtrans($1) domain_system_change_exemption($1) role_transition $2 exim_initrc_exec_t system_r; allow $2 system_r; files_search_etc($1) admin_pattern($1, exim_keytab_t) files_search_spool($1) admin_pattern($1, exim_spool_t) logging_search_logs($1) admin_pattern($1, exim_log_t) files_search_pids($1) admin_pattern($1, exim_var_run_t) files_search_tmp($1) admin_pattern($1, exim_tmp_t) ')