commit:     d47c778ccbce70463fed9a0ddd79c41570508f86
Author:     Sven Vermeulen <sven.vermeulen <AT> siphos <DOT> be>
AuthorDate: Fri Aug 15 13:39:08 2014 +0000
Commit:     Sven Vermeulen <swift <AT> gentoo <DOT> org>
CommitDate: Fri Aug 15 13:39:08 2014 +0000
URL:        
http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=d47c778c

Add built version of corenetwork.if with salt ports

---
 policy/modules/kernel/corenetwork.if | 443 +++++++++++++++++++++++++++++++++++
 1 file changed, 443 insertions(+)

diff --git a/policy/modules/kernel/corenetwork.if 
b/policy/modules/kernel/corenetwork.if
index 22e8137..5431c56 100644
--- a/policy/modules/kernel/corenetwork.if
+++ b/policy/modules/kernel/corenetwork.if
@@ -75813,6 +75813,449 @@ interface(`corenet_relabelto_rwho_server_packets',`
 
 ########################################
 ## <summary>
+##     Send and receive TCP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_tcp_sendrecv_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:tcp_socket { send_msg recv_msg };
+')
+
+########################################
+## <summary>
+##     Send UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_udp_send_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_send_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       dontaudit $1 salt_port_t:udp_socket send_msg;
+')
+
+########################################
+## <summary>
+##     Receive UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_udp_receive_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to receive UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_receive_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       dontaudit $1 salt_port_t:udp_socket recv_msg;
+')
+
+########################################
+## <summary>
+##     Send and receive UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_udp_sendrecv_salt_port',`
+       corenet_udp_send_salt_port($1)
+       corenet_udp_receive_salt_port($1)
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send and receive
+##     UDP traffic on the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_udp_sendrecv_salt_port',`
+       corenet_dontaudit_udp_send_salt_port($1)
+       corenet_dontaudit_udp_receive_salt_port($1)
+')
+
+########################################
+## <summary>
+##     Bind TCP sockets to the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_tcp_bind_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:tcp_socket name_bind;
+       
+')
+
+########################################
+## <summary>
+##     Bind UDP sockets to the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_udp_bind_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:udp_socket name_bind;
+       
+')
+
+########################################
+## <summary>
+##     Make a TCP connection to the salt port.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`corenet_tcp_connect_salt_port',`
+       gen_require(`
+               type salt_port_t;
+       ')
+
+       allow $1 salt_port_t:tcp_socket name_connect;
+')
+
+
+########################################
+## <summary>
+##     Send salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_salt_client_packets',`
+       gen_require(`
+               type salt_client_packet_t;
+       ')
+
+       allow $1 salt_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_salt_client_packets',`
+       gen_require(`
+               type salt_client_packet_t;
+       ')
+
+       dontaudit $1 salt_client_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##     Receive salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_salt_client_packets',`
+       gen_require(`
+               type salt_client_packet_t;
+       ')
+
+       allow $1 salt_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to receive salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_salt_client_packets',`
+       gen_require(`
+               type salt_client_packet_t;
+       ')
+
+       dontaudit $1 salt_client_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##     Send and receive salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_salt_client_packets',`
+       corenet_send_salt_client_packets($1)
+       corenet_receive_salt_client_packets($1)
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send and receive salt_client packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_salt_client_packets',`
+       corenet_dontaudit_send_salt_client_packets($1)
+       corenet_dontaudit_receive_salt_client_packets($1)
+')
+
+########################################
+## <summary>
+##     Relabel packets to salt_client the packet type.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`corenet_relabelto_salt_client_packets',`
+       gen_require(`
+               type salt_client_packet_t;
+       ')
+
+       allow $1 salt_client_packet_t:packet relabelto;
+')
+
+
+########################################
+## <summary>
+##     Send salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="write" weight="10"/>
+#
+interface(`corenet_send_salt_server_packets',`
+       gen_require(`
+               type salt_server_packet_t;
+       ')
+
+       allow $1 salt_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_send_salt_server_packets',`
+       gen_require(`
+               type salt_server_packet_t;
+       ')
+
+       dontaudit $1 salt_server_packet_t:packet send;
+')
+
+########################################
+## <summary>
+##     Receive salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="read" weight="10"/>
+#
+interface(`corenet_receive_salt_server_packets',`
+       gen_require(`
+               type salt_server_packet_t;
+       ')
+
+       allow $1 salt_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to receive salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_receive_salt_server_packets',`
+       gen_require(`
+               type salt_server_packet_t;
+       ')
+
+       dontaudit $1 salt_server_packet_t:packet recv;
+')
+
+########################################
+## <summary>
+##     Send and receive salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+## <infoflow type="both" weight="10"/>
+#
+interface(`corenet_sendrecv_salt_server_packets',`
+       corenet_send_salt_server_packets($1)
+       corenet_receive_salt_server_packets($1)
+')
+
+########################################
+## <summary>
+##     Do not audit attempts to send and receive salt_server packets.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain to not audit.
+##     </summary>
+## </param>
+## <infoflow type="none"/>
+#
+interface(`corenet_dontaudit_sendrecv_salt_server_packets',`
+       corenet_dontaudit_send_salt_server_packets($1)
+       corenet_dontaudit_receive_salt_server_packets($1)
+')
+
+########################################
+## <summary>
+##     Relabel packets to salt_server the packet type.
+## </summary>
+## <param name="domain">
+##     <summary>
+##     Domain allowed access.
+##     </summary>
+## </param>
+#
+interface(`corenet_relabelto_salt_server_packets',`
+       gen_require(`
+               type salt_server_packet_t;
+       ')
+
+       allow $1 salt_server_packet_t:packet relabelto;
+')
+
+
+
+
+########################################
+## <summary>
 ##     Send and receive TCP traffic on the sap port.
 ## </summary>
 ## <param name="domain">

Reply via email to