commit: b08d56f2b2db5a8683a68cda6af4d723c2824b7c
Author: Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Sat Jun 7 18:19:31 2014 +0000
Commit: Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Sat Jun 7 18:19:31 2014 +0000
URL:
http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=b08d56f2
Update corenetwork.if after regeneration
---
policy/modules/kernel/corenetwork.if | 1348 ++++++++++++++++++++++++++++++++++
1 file changed, 1348 insertions(+)
diff --git a/policy/modules/kernel/corenetwork.if
b/policy/modules/kernel/corenetwork.if
index 5b6fef3..22e8137 100644
--- a/policy/modules/kernel/corenetwork.if
+++ b/policy/modules/kernel/corenetwork.if
@@ -1904,6 +1904,25 @@ interface(`corenet_tcp_connect_all_reserved_ports',`
########################################
## <summary>
+## Do not audit connect attempts to TCP sockets on
+## ports greater than 1024.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain not to audit access to.
+## </summary>
+## </param>
+#
+interface(`corenet_dontaudit_tcp_connect_all_unreserved_ports',`
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ dontaudit $1 unreserved_port_type:tcp_socket name_connect;
+')
+
+########################################
+## <summary>
## Connect TCP sockets to all ports > 1024.
## </summary>
## <param name="domain">
@@ -23963,6 +23982,449 @@ interface(`corenet_relabelto_dns_server_packets',`
########################################
## <summary>
+## Send and receive TCP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_tcp_sendrecv_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:tcp_socket { send_msg recv_msg };
+')
+
+########################################
+## <summary>
+## Send UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_udp_send_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_send_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ dontaudit $1 dropbox_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Receive UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_udp_receive_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_receive_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ dontaudit $1 dropbox_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Send and receive UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_udp_sendrecv_dropbox_port',`
+ corenet_udp_send_dropbox_port($1)
+ corenet_udp_receive_dropbox_port($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive
+## UDP traffic on the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_sendrecv_dropbox_port',`
+ corenet_dontaudit_udp_send_dropbox_port($1)
+ corenet_dontaudit_udp_receive_dropbox_port($1)
+')
+
+########################################
+## <summary>
+## Bind TCP sockets to the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_tcp_bind_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:tcp_socket name_bind;
+
+')
+
+########################################
+## <summary>
+## Bind UDP sockets to the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:udp_socket name_bind;
+
+')
+
+########################################
+## <summary>
+## Make a TCP connection to the dropbox port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_tcp_connect_dropbox_port',`
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:tcp_socket name_connect;
+')
+
+
+########################################
+## <summary>
+## Send dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_dropbox_client_packets',`
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_dropbox_client_packets',`
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ dontaudit $1 dropbox_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_dropbox_client_packets',`
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_dropbox_client_packets',`
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ dontaudit $1 dropbox_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_dropbox_client_packets',`
+ corenet_send_dropbox_client_packets($1)
+ corenet_receive_dropbox_client_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive dropbox_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_dropbox_client_packets',`
+ corenet_dontaudit_send_dropbox_client_packets($1)
+ corenet_dontaudit_receive_dropbox_client_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to dropbox_client the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_dropbox_client_packets',`
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+## Send dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_dropbox_server_packets',`
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_dropbox_server_packets',`
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ dontaudit $1 dropbox_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_dropbox_server_packets',`
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_dropbox_server_packets',`
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ dontaudit $1 dropbox_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_dropbox_server_packets',`
+ corenet_send_dropbox_server_packets($1)
+ corenet_receive_dropbox_server_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive dropbox_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_dropbox_server_packets',`
+ corenet_dontaudit_send_dropbox_server_packets($1)
+ corenet_dontaudit_receive_dropbox_server_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to dropbox_server the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_dropbox_server_packets',`
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet relabelto;
+')
+
+
+
+
+########################################
+## <summary>
## Send and receive TCP traffic on the efs port.
## </summary>
## <param name="domain">
@@ -27507,6 +27969,449 @@
interface(`corenet_relabelto_gatekeeper_server_packets',`
########################################
## <summary>
+## Send and receive TCP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_tcp_sendrecv_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:tcp_socket { send_msg recv_msg };
+')
+
+########################################
+## <summary>
+## Send UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_udp_send_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_send_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ dontaudit $1 gdomap_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Receive UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_udp_receive_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_receive_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ dontaudit $1 gdomap_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Send and receive UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_udp_sendrecv_gdomap_port',`
+ corenet_udp_send_gdomap_port($1)
+ corenet_udp_receive_gdomap_port($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive
+## UDP traffic on the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_sendrecv_gdomap_port',`
+ corenet_dontaudit_udp_send_gdomap_port($1)
+ corenet_dontaudit_udp_receive_gdomap_port($1)
+')
+
+########################################
+## <summary>
+## Bind TCP sockets to the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_tcp_bind_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+')
+
+########################################
+## <summary>
+## Bind UDP sockets to the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+')
+
+########################################
+## <summary>
+## Make a TCP connection to the gdomap port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_tcp_connect_gdomap_port',`
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:tcp_socket name_connect;
+')
+
+
+########################################
+## <summary>
+## Send gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_gdomap_client_packets',`
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_gdomap_client_packets',`
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ dontaudit $1 gdomap_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_gdomap_client_packets',`
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_gdomap_client_packets',`
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ dontaudit $1 gdomap_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_gdomap_client_packets',`
+ corenet_send_gdomap_client_packets($1)
+ corenet_receive_gdomap_client_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive gdomap_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_gdomap_client_packets',`
+ corenet_dontaudit_send_gdomap_client_packets($1)
+ corenet_dontaudit_receive_gdomap_client_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to gdomap_client the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_gdomap_client_packets',`
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+## Send gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_gdomap_server_packets',`
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_gdomap_server_packets',`
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ dontaudit $1 gdomap_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_gdomap_server_packets',`
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_gdomap_server_packets',`
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ dontaudit $1 gdomap_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_gdomap_server_packets',`
+ corenet_send_gdomap_server_packets($1)
+ corenet_receive_gdomap_server_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive gdomap_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_gdomap_server_packets',`
+ corenet_dontaudit_send_gdomap_server_packets($1)
+ corenet_dontaudit_receive_gdomap_server_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to gdomap_server the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_gdomap_server_packets',`
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet relabelto;
+')
+
+
+
+
+########################################
+## <summary>
## Send and receive TCP traffic on the gds_db port.
## </summary>
## <param name="domain">
@@ -69592,6 +70497,449 @@ interface(`corenet_relabelto_razor_server_packets',`
########################################
## <summary>
+## Send and receive TCP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_tcp_sendrecv_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:tcp_socket { send_msg recv_msg };
+')
+
+########################################
+## <summary>
+## Send UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_udp_send_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_send_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ dontaudit $1 redis_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+## Receive UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_udp_receive_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_receive_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ dontaudit $1 redis_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+## Send and receive UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_udp_sendrecv_redis_port',`
+ corenet_udp_send_redis_port($1)
+ corenet_udp_receive_redis_port($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive
+## UDP traffic on the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_sendrecv_redis_port',`
+ corenet_dontaudit_udp_send_redis_port($1)
+ corenet_dontaudit_udp_receive_redis_port($1)
+')
+
+########################################
+## <summary>
+## Bind TCP sockets to the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_tcp_bind_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:tcp_socket name_bind;
+
+')
+
+########################################
+## <summary>
+## Bind UDP sockets to the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:udp_socket name_bind;
+
+')
+
+########################################
+## <summary>
+## Make a TCP connection to the redis port.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_tcp_connect_redis_port',`
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:tcp_socket name_connect;
+')
+
+
+########################################
+## <summary>
+## Send redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_redis_client_packets',`
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_redis_client_packets',`
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ dontaudit $1 redis_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_redis_client_packets',`
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_redis_client_packets',`
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ dontaudit $1 redis_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_redis_client_packets',`
+ corenet_send_redis_client_packets($1)
+ corenet_receive_redis_client_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive redis_client packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_redis_client_packets',`
+ corenet_dontaudit_send_redis_client_packets($1)
+ corenet_dontaudit_receive_redis_client_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to redis_client the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_redis_client_packets',`
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+## Send redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_redis_server_packets',`
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_redis_server_packets',`
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ dontaudit $1 redis_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+## Receive redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_redis_server_packets',`
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Do not audit attempts to receive redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_redis_server_packets',`
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ dontaudit $1 redis_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+## Send and receive redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_redis_server_packets',`
+ corenet_send_redis_server_packets($1)
+ corenet_receive_redis_server_packets($1)
+')
+
+########################################
+## <summary>
+## Do not audit attempts to send and receive redis_server packets.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain to not audit.
+## </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_redis_server_packets',`
+ corenet_dontaudit_send_redis_server_packets($1)
+ corenet_dontaudit_receive_redis_server_packets($1)
+')
+
+########################################
+## <summary>
+## Relabel packets to redis_server the packet type.
+## </summary>
+## <param name="domain">
+## <summary>
+## Domain allowed access.
+## </summary>
+## </param>
+#
+interface(`corenet_relabelto_redis_server_packets',`
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet relabelto;
+')
+
+
+
+
+########################################
+## <summary>
## Send and receive TCP traffic on the repository port.
## </summary>
## <param name="domain">