?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for system services, like cron, and network services, like sshd. ABRT - automated bug-reporting tool Execute abrt in the abrt domain. Domain allowed to transition. Execute abrt in the caller domain. Domain allowed access. Send a null signal to abrt. Domain allowed access. Allow the domain to read abrt state files in /proc. Domain allowed access. Connect to abrt over an unix stream socket. Domain allowed access. Send and receive messages from abrt over dbus. Domain allowed access. Execute abrt-helper in the abrt-helper domain. Domain allowed to transition. Execute abrt helper in the abrt_helper domain, and allow the specified role the abrt_helper domain. Domain allowed to transition. Role allowed access. Read abrt cache Domain allowed access. Append abrt cache Domain allowed access. Manage abrt cache Domain allowed access. Read abrt configuration file. Domain allowed access. Read abrt logs. Domain allowed access. Read abrt PID files. Domain allowed access. Create, read, write, and delete abrt PID files. Domain allowed access. Read and write abrt fifo files. Domain allowed access. All of the rules required to administrate an abrt environment Domain allowed access. The role to be allowed to manage the abrt domain. Execute abrt-retrace in the abrt-retrace domain. Domain allowed to transition. Manage abrt retrace server cache Domain allowed access. Read abrt retrace server cache Domain allowed access. Read abrt retrace server cache Domain allowed access.

Allow ABRT to modify public files used for public file transfer services.

Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts

Andrew Filesystem server Execute a domain transition to run the afs client. Domain allowed to transition. Read and write afs client UDP sockets. Domain allowed access. read/write afs cache files Domain allowed to transition. Execute afs server in the afs domain. The type of the process performing this action. All of the rules required to administrate an afs environment Domain allowed access. The role to be allowed to manage the afs domain. Automatic IPv6 Connectivity Client Utility. Execute a domain transition to run aiccu. Domain allowed to transition. Execute aiccu server in the aiccu domain. Domain allowed to transition. Read aiccu PID files. Domain allowed access. Manage aiccu PID files. Domain allowed access. All of the rules required to administrate an aiccu environment Domain allowed access. Role allowed access. Aide filesystem integrity checker Execute aide in the aide domain Domain allowed access. Execute aide programs in the AIDE domain. Domain allowed access. The role to allow the AIDE domain. All of the rules required to administrate an aide environment Domain allowed access. SELinux policy for Aisexec Cluster Engine Execute a domain transition to run aisexec. Domain allowed to transition. Connect to aisexec over a unix domain stream socket. Domain allowed access. Allow the specified domain to read aisexec's log files. Domain allowed access. All of the rules required to administrate an aisexec environment Domain allowed access. The role to be allowed to manage the aisexecd domain. Daemon that interfaces mail transfer agents and content checkers, such as virus scanners. Execute a domain transition to run amavis. Domain allowed to transition. Execute amavis server in the amavis domain. Domain allowed access. Read amavis spool files. Domain allowed access. Manage amavis spool files. Domain allowed access. Create objects in the amavis spool directories with a private type. Domain allowed access. Private file type. Class of the object being created. Search amavis lib directories. Domain allowed access. Read amavis lib files. Domain allowed access. Create, read, write, and delete amavis lib files. Domain allowed access. Set the attributes of amavis pid files. Domain allowed access. Create of amavis pid files. Domain allowed access. Write of amavis pid files. Domain allowed access. Write of amavis pid files. Domain allowed access. All of the rules required to administrate an amavis environment Domain allowed access. Role allowed access.

Allow amavis to use JIT compiler

SELinux policy for antivirus programs - amavis, clamd, freshclam and clamscan Creates types and rules for a basic antivirus domain. Domain type. Execute a domain transition to run antivirus program. Domain allowed to transition. Execute antivirus program without a transition. Domain allowed access. Connect to run antivirus program. Domain allowed access. Allow the specified domain to append to antivirus log files. Domain allowed access. Read antivirus configuration files. Domain allowed access. Search antivirus db content directories. Domain allowed access. Read antivirus db content directories. Domain allowed access. Read and write antivirus db content directories. Domain allowed access. Manage antivirus db content directories. Domain allowed access. Manage antivirus pid content. Domain allowed access. Read antivirus state files. Domain allowed access. All of the rules required to administrate an antivirus programs environment Domain allowed access. The role to be allowed to manage the clamav domain.

Allow antivirus programs to read non security files on a system

Determine whether can antivirus programs use JIT compiler.

Apache web server Role access for apache Role allowed access User domain for the role Read httpd user scripts executables. Domain allowed access. Read user web content. Domain allowed access. Read user web content. Domain allowed access. Transition to apache. Domain allowed access. Allow the specified domain to execute apache in the caller domain. Domain allowed access. Send a generic signal to apache. Domain allowed access. Send a null signal to apache. Domain allowed access. Send a SIGCHLD signal to apache. Domain allowed access. Inherit and use file descriptors from Apache. Domain allowed access. Do not audit attempts to read and write Apache unnamed pipes. Domain allowed access. Do not audit attempts to read and write Apache unix domain stream sockets. Domain allowed access. Do not audit attempts to read and write Apache TCP sockets. Domain allowed access. Create, read, write, and delete all web content. Domain allowed access. Allow domain to set the attributes of the APACHE cache directory. Domain allowed access. Allow the specified domain to list Apache cache. Domain allowed access. Allow the specified domain to read and write Apache cache files. Domain allowed access. Allow the specified domain to delete Apache cache dirs. Domain allowed access. Allow the specified domain to delete Apache cache. Domain allowed access. Allow the specified domain to search apache configuration dirs. Domain allowed access. Allow the specified domain to read apache configuration files. Domain allowed access. Allow the specified domain to manage apache configuration files. Domain allowed access. Execute the Apache helper program with a domain transition. Domain allowed access. Execute the Apache helper program with a domain transition, and allow the specified role the Apache helper domain. Domain allowed access. Role allowed access. dontaudit attempts to read apache log files. Domain allowed access. Allow the specified domain to read apache log files. Domain allowed access. Allow the specified domain to append to apache log files. Domain allowed access. Do not audit attempts to append to the Apache logs. Domain to not audit. Allow the specified domain to write to apache log files. Domain allowed access. Allow the specified domain to manage to apache log files. Domain allowed access. Do not audit attempts to search Apache module directories. Domain to not audit. Allow the specified domain to list the contents of the apache modules directory. Domain allowed access. Allow the specified domain to read the apache modules files. directory. Domain allowed access. Allow the specified domain to execute apache modules. Domain allowed access. Execute a domain transition to run httpd_rotatelogs. Domain allowed access. Execute httpd_rotatelogs in the caller domain. Domain allowed to transition. Execute httpd system scripts in the caller domain. Domain allowed to transition. Allow the specified domain to list apache system content files. Domain allowed access. Allow the specified domain to manage apache system content files. Domain allowed access. Allow the specified domain to manage apache system content rw files. Domain allowed access. Allow the specified domain to delete apache system content rw files. Domain allowed access. Execute all web scripts in the system script domain. Domain allowed access. Do not audit attempts to read and write Apache system script unix domain stream sockets. Domain allowed access. Execute all user scripts in the user script domain. Domain allowed access. Execute all user scripts in the user script domain. Add user script domains to the specified role. Domain allowed access. The role to be allowed the script domains. Allow the specified domain to read apache squirrelmail data. Domain allowed access. Allow the specified domain to append apache squirrelmail data. Domain allowed access. Search apache system content. Domain allowed access. Getattr apache system content. Domain to not audit. Read apache system content. Domain to not audit. Search apache system CGI directories. Domain allowed access. Create, read, write, and delete all user web content. Domain allowed access. Search system script state directory. Domain to not audit. Allow the specified domain to read apache tmp files. Domain allowed access. Dontaudit attempts to read and write apache tmp files. Domain allowed access. Dontaudit attempts to write apache tmp files. Domain allowed access. Execute CGI in the specified domain.

Execute CGI in the specified domain.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Domain run the cgi script in. Type of the executable to enter the cgi domain.
All of the rules required to administrate an apache environment Domain allowed access. Role allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. Allow getattr of suexec The type of the process performing this action. Read and write of httpd unix stream socket. Domain allowed access. Allow any httpd_exec_t to be an entrypoint of this domain Domain allowed access.

Allow Apache to modify public files used for public file transfer services. Directories/Files must be labeled public_rw_content_t.

Allow Apache to use mod_auth_pam

Allow httpd scripts and modules execmem/execstack

Allow httpd processes to manage IPA content

Allow httpd to use built in scripting (usually php)

Allow HTTPD scripts and modules to connect to the network using TCP.

Allow HTTPD scripts and modules to connect to cobbler over the network.

Allow HTTPD scripts and modules to server cobbler files.

Allow HTTPD scripts and modules to connect to databases over the network.

Allow httpd to connect to memcache server

Allow httpd to act as a relay

Allow http daemon to send mail

Allow http daemon to check spam

Allow Apache to communicate with avahi service via dbus

Allow Apache to communicate with sssd service via dbus

Allow httpd cgi support

Allow httpd to act as a FTP server by listening on the ftp port.

Allow httpd to read home directories

Allow httpd to read user content

Allow httpd daemon to change system limits

Allow HTTPD to run SSI executables in the same domain as system CGI scripts.

Allow Apache to execute tmp content.

Unify HTTPD to communicate with the terminal. Needed for entering the passphrase for certificates at the terminal.

Unify HTTPD handling of all content files.

Allow httpd to access openstack ports

Allow httpd to access cifs file systems

Allow httpd to access FUSE file systems

Allow httpd to run gpg in gpg-web domain

Allow httpd to access nfs file systems

Allow apache scripts to write to public content. Directories/Files must be labeled public_rw_content_t.

Allow Apache to run in stickshift mode, not transition to passenger

Allow Apache to run preupgrade

Allow Apache to query NS records

Allow Apache to use mod_auth_ntlm_winbind

APC UPS monitoring daemon Execute a domain transition to run apcupsd. Domain allowed to transition. Execute apcupsd server in the apcupsd domain. Domain allowed access. Read apcupsd PID files. Domain allowed access. Allow the specified domain to read apcupsd's log files. Domain allowed access. Allow the specified domain to append apcupsd log files. Domain allowed to transition. Execute a domain transition to run httpd_apcupsd_cgi_script. Domain allowed to transition. All of the rules required to administrate an apcupsd environment Domain allowed access. The role to be allowed to manage the apcupsd domain. Advanced power management daemon Execute APM in the apm domain. Domain allowed access. Use file descriptors for apmd. The type of the process performing this action. Write to apmd unnamed pipes. The type of the process performing this action. Read and write to an apm unix stream socket. Domain allowed access. Append to apm's log file. Domain allowed access. Connect to apmd over an unix stream socket. Domain allowed access. Ethernet activity monitor. Execute arpwatch server in the arpwatch domain. Domain allowed access. Search arpwatch's data file directories. Domain allowed access. Create arpwatch data files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Do not audit attempts to read and write arpwatch packet sockets. Domain to not audit. All of the rules required to administrate an arpwatch environment Domain allowed access. The role to be allowed to manage the arpwatch domain. Asterisk IP telephony server Execute asterisk in the asterisk domain. The type of the process performing this action. Connect to asterisk over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an asterisk environment Domain allowed access. The role to be allowed to manage the asterisk domain. Generate entropy from audio input Filesystem automounter service. Execute automount in the automount domain. Domain allowed access. Send automount a signal The type of the process performing this action. Execute automount in the caller domain. Domain allowed access. Allow the domain to read state files in /proc. Domain to allow access. Do not audit attempts to file descriptors for automount. Domain to not audit. Do not audit attempts to write automount daemon unnamed pipes. Domain allowed access. Allow domain to search of automount temporary directories. Domain to not audit. Do not audit attempts to get the attributes of automount temporary directories. Domain to not audit. All of the rules required to administrate an automount environment Domain allowed access. The role to be allowed to manage the automount domain. mDNS/DNS-SD daemon implementing Apple ZeroConf architecture Execute avahi server in the avahi domain. The type of the process performing this action. Send avahi a signal The type of the process performing this action. Send avahi a kill signal. Domain allowed access. Send avahi a signull Domain allowed access. Send and receive messages from avahi over dbus. Domain allowed access. Connect to avahi using a unix domain stream socket. Domain allowed access. Do not audit attempts to search the avahi pid directory. Domain allowed access. All of the rules required to administrate an avahi environment Domain allowed access. The role to be allowed to manage the avahi domain. Cross platform network backup. Execute bacula admin bacula admin domain. Domain allowed to transition. Execute user interfaces in the bacula admin domain, and allow the specified role the bacula admin domain. Domain allowed to transition. Role allowed access. Allow the domain to read bacula store data.. Domain allowed access. All of the rules required to administrate an bacula environment. Domain allowed access. Role allowed access.

Allow bacula to manage nfs files

Allow bacula to manage cifs files

bcfg2-server daemon which serves configurations to clients based on the data in its repository Execute bcfg2 in the bcfg2 domain.. Domain allowed to transition. Execute bcfg2 server in the bcfg2 domain. Domain allowed access. Search bcfg2 lib directories. Domain allowed access. Read bcfg2 lib files. Domain allowed access. Manage bcfg2 lib files. Domain allowed access. Manage bcfg2 lib directories. Domain allowed access. All of the rules required to administrate an bcfg2 environment Domain allowed access. Role allowed access. Berkeley internet name domain DNS server. Execute bind server in the bind domain. Domain allowed access. Execute ndc in the ndc domain. Domain allowed access. Send generic signals to BIND. Domain allowed access. Send null sigals to BIND. Domain allowed access. Send BIND the kill signal Domain allowed access. Execute ndc in the ndc domain, and allow the specified role the ndc domain. Domain allowed access. The role to be allowed the bind domain. Execute bind in the named domain. Domain allowed access. Read DNSSEC keys. Domain allowed access. Read BIND named configuration files. Domain allowed access. Write BIND named configuration files. Domain allowed access. Create, read, write, and delete BIND configuration directories. Domain allowed access. Search the BIND cache directory. Domain allowed access. Create, read, write, and delete BIND cache files. Domain allowed access. Set the attributes of the BIND pid directory. Domain allowed access. Read BIND log files. Domain allowed access. Set the attributes of the BIND zone directory. Domain allowed access. Read BIND zone files. Domain allowed access. Manage BIND zone files. Domain allowed access. Send and receive datagrams to and from named. (Deprecated) Domain allowed access. All of the rules required to administrate an bind environment Domain allowed access. The role to be allowed to manage the bind domain.

Allow BIND to bind apache port.

Allow BIND to write the master zone files. Generally this is used for dynamic DNS or zone transfers.

Bitlbee service Read bitlbee configuration files Domain allowed accesss. All of the rules required to administrate an bitlbee environment Domain allowed access. The role to be allowed to manage the bitlbee domain. Bluetooth tools and system services. Role access for bluetooth Role allowed access User domain for the role Connect to bluetooth over a unix domain stream socket. Domain allowed access. Execute bluetooth in the bluetooth domain. The type of the process performing this action. Read bluetooth daemon configuration. Domain allowed access. Send and receive messages from bluetooth over dbus. Domain allowed access. dontaudit Send and receive messages from bluetooth over dbus. Domain allowed access. Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) The type of the process performing this action. Execute bluetooth_helper in the bluetooth_helper domain, and allow the specified role the bluetooth_helper domain. (Deprecated) The type of the process performing this action. The role to be allowed the bluetooth_helper domain. The type of the terminal allow the bluetooth_helper domain to use. Read bluetooth helper state files. Domain allowed access. All of the rules required to administrate an bluetooth environment Domain allowed access. The role to be allowed to manage the bluetooth domain. policy for boinc Execute a domain transition to run boinc. Domain allowed to transition. Execute boinc server in the boinc domain. The type of the process performing this action. Search boinc lib directories. Domain allowed access. Read boinc lib files. Domain allowed access. Create, read, write, and delete boinc lib files. Domain allowed access. Manage boinc var_lib files. Domain allowed access. All of the rules required to administrate an boinc environment. Domain allowed access. Role allowed access. Bugzilla server Allow the specified domain to search bugzilla directories. Domain allowed access. Do not audit attempts to read and write bugzilla script unix domain stream sockets. Domain allowed access. policy for cachefilesd Execute a domain transition to run cachefilesd. Domain allowed to transition. Canna - kana-kanji conversion server Connect to Canna using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an canna environment Domain allowed access. The role to be allowed to manage the canna domain. Cluster Configuration System Execute a domain transition to run ccs. Domain allowed to transition. Connect to ccs over an unix stream socket. Domain allowed access. Read cluster configuration files. Domain allowed access. Manage cluster configuration files. Domain allowed access. Certmaster SSL certificate distribution service Execute a domain transition to run certmaster. Domain allowed to transition. Execute certmaster in the caller domain. Domain allowed access. read certmaster logs. Domain allowed access. Append to certmaster logs. Domain allowed access. Create, read, write, and delete certmaster logs. Domain allowed access. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the syslog domain. Certificate status monitor and PKI enrollment client Execute a domain transition to run certmonger. Domain allowed to transition. Execute certmonger server in the certmonger domain. The type of the process performing this action. Read certmonger PID files. Domain allowed access. Manage certmonger var_run files. Domain allowed access. Search certmonger lib directories. Domain allowed access. Read certmonger lib files. Domain allowed access. Create, read, write, and delete certmonger lib files. Domain allowed access. Manage certmonger var_lib files. Domain allowed access. Dontaudit certmonger leaked files descriptors. Domain allowed access. Send and receive messages from certmonger over dbus. Domain allowed access. All of the rules required to administrate an certmonger environment Domain allowed access. Role allowed access. policy for cfengine Transition to cfengine. Domain allowed to transition. Search cfengine lib files. Domain allowed access. Read cfengine lib files. Domain allowed access. Allow the specified domain to read cfengine's log files. Domain allowed access. Allow the specified domain to append cfengine's log files. Domain allowed access. Dontaudit the specified domain to write cfengine's log files. Domain allowed access. policy for cgdcbxd Execute cgdcbxd in the cgdcbxd domin. Domain allowed to transition. Read cgdcbxd PID files. Domain allowed access. All of the rules required to administrate an cgdcbxd environment Domain allowed access. libcg is a library that abstracts the control group file system in Linux. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. domain. Domain allowed to transition. Connect to CG rules engine daemon over unix stream sockets. Domain allowed access. All of the rules required to administrate an cgroup environment. Domain allowed access. Role allowed access. Chrony NTP background daemon Execute chronyd in the chronyd domain. Domain allowed access. Execute chronyd server in the chronyd domain. Domain allowed access. Execute chronyd Domain allowed access. Read chronyd logs. Domain allowed access. Read and write chronyd shared memory. Domain allowed access. Read chronyd keys files. Domain allowed access. Append chronyd keys files. Domain allowed access. All of the rules required to administrate an chronyd environment Domain allowed access. The role to be allowed to manage the chronyd domain. openstack-cinder Manage cinder lib files. Domain allowed access. Encrypted tunnel daemon ClamAV Virus Scanner Execute a domain transition to run clamd. Domain allowed to transition. Connect to run clamd. Domain allowed to connect. Allow the specified domain to append to clamav log files. Domain allowed access. Read clamav configuration files. Domain allowed access. Search clamav libraries directories. Domain allowed access. Read clamd state files. Domain allowed access. Execute a domain transition to run clamscan. Domain allowed access. Execute clamscan without a transition. Domain allowed access. All of the rules required to administrate an clamav environment Domain allowed access. The role to be allowed to manage the clamav domain.

Allow clamscan to non security files on a system

Allow clamd to use JIT compiler

Clockspeed simple network time protocol client Execute clockspeed utilities in the clockspeed_cli domain. Domain allowed access. Allow the specified role the clockspeed_cli domain. Domain allowed access. The role to be allowed the clockspeed_cli domain. clogd - clustered mirror log server Execute a domain transition to run clogd. Domain allowed to transition. Connect to clogd over a unix domain stream socket. Domain allowed access. Allow read and write access to clogd semaphores. Domain allowed access. Read and write to group shared memory. The type of the process performing this action. cloudform policy Execute mongod in the caller domain. Domain allowed access. policy for cmirrord Execute a domain transition to run cmirrord. Domain allowed to transition. Execute cmirrord server in the cmirrord domain. The type of the process performing this action. Read cmirrord PID files. Domain allowed access. Read and write to cmirrord shared memory. The type of the process performing this action. All of the rules required to administrate an cmirrord environment Domain allowed access. Role allowed access. Cobbler installation server.

Cobbler is a Linux installation server that allows for rapid setup of network installation environments. It glues together and automates many associated Linux tasks so you do not have to hop between lots of various commands and applications when rolling out new systems, and, in some cases, changing existing ones.

Execute a domain transition to run cobblerd. Domain allowed to transition. Execute cobblerd server in the cobblerd domain. Domain allowed to transition. List Cobbler configuration. Domain allowed access. Read Cobbler configuration files. Domain to not audit. Search cobbler dirs in /var/lib Domain allowed access. Read cobbler files in /var/lib Domain allowed access. Manage cobbler files in /var/lib Domain allowed access. Do not audit attempts to read and write Cobbler log files (leaked fd). Domain to not audit. All of the rules required to administrate an cobblerd environment Domain allowed access. Role allowed access.

Allow Cobbler to modify public files used for public file transfer services.

Allow Cobbler to connect to the network using TCP.

Allow Cobbler to access cifs file systems.

Allow Cobbler to access nfs file systems.

Statistics collection daemon for filling RRD files. Transition to collectd. Domain allowed to transition. Execute collectd server in the collectd domain. Domain allowed access. Search collectd lib directories. Domain allowed access. Read collectd lib files. Domain allowed access. Manage collectd lib files. Domain allowed access. Manage collectd lib directories. Domain allowed access. All of the rules required to administrate an collectd environment Domain allowed access. Role allowed access.

Determine whether collectd can connect to the network using TCP.

Comsat, a biff server. policy for condor Transition to condor. Domain allowed to transition. Read condor's log files. Domain allowed access. Append to condor log files. Domain allowed access. Manage condor log files Domain allowed access. Search condor lib directories. Domain allowed access. Read condor lib files. Domain allowed access. Read condor lib files. Domain allowed access. Manage condor lib files. Domain allowed access. Manage condor lib directories. Domain allowed access. Read condor PID files. Domain allowed access. Read and write condor_startd server TCP sockets. Domain allowed access. Read and write condor_schedd server TCP sockets. Domain allowed access. Allows to start userland processes by transitioning to the specified domain, with a range transition. The process type entered by condor_startd. The executable type for the entrypoint. Range for the domain. Allows to start userlandprocesses by transitioning to the specified domain. The process type entered by condor_startd. The executable type for the entrypoint. All of the rules required to administrate an condor environment Domain allowed access.

Allow codnor domain to connect to the network using TCP.

Conman is a program for connecting to remote consoles being managed by conmand Execute conman in the conman domin. Domain allowed to transition. Read conman's log files. Domain allowed access. Append to conman log files. Domain allowed access. Manage conman log files Domain allowed access. Framework for facilitating multiple user sessions on desktops. Execute a domain transition to run consolekit. Domain allowed to transition. Send and receive messages from consolekit over dbus. Domain allowed access. Read consolekit log files. Domain allowed access. Dontaudit attempts to read consolekit log files. Domain to not audit. Manage consolekit log files. Domain allowed access. Read consolekit PID files. Domain allowed access. Dontaudit attempts to connect to consolekit over an unix stream socket. Domain allowed access. SELinux policy for Corosync Cluster Engine Execute a domain transition to run corosync. Domain allowed to transition. Execute a domain transition to run corosync. Domain allowed to transition. Execute corosync in the caller domain. Domain allowed to transition. Connect to corosync over a unix domain stream socket. Domain allowed access. Allow the specified domain to read corosync's log files. Domain allowed access. Allow the specified domain to read/write corosync's tmpfs files. Domain allowed access. All of the rules required to administrate an corosync environment Domain allowed access. The role to be allowed to manage the corosyncd domain. Courier IMAP and POP3 email servers Execute the courier authentication daemon with a domain transition. Domain allowed access. Connect to courier-authdaemon over an unix stream socket. Domain allowed access. Execute the courier POP3 and IMAP server with a domain transition. Domain allowed access. Read courier config files Domain allowed access. Create, read, write, and delete courier spool directories. Domain allowed access. Create, read, write, and delete courier spool files. Domain allowed access. Read courier spool files. Domain allowed access. Read and write to courier spool pipes. Domain to not audit. Services for loading CPU microcode and CPU frequency scaling. CPUcontrol stub interface. No access allowed. Domain allowed access. Periodic execution of scheduled commands. Role access for cron Role allowed access User domain for the role Role access for unconfined cronjobs Role allowed access User domain for the role Role access for cron Role allowed access User domain for the role Make the specified program domain accessable from the system cron jobs. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Execute cron in the cron system domain. Domain allowed access. Execute crond_exec_t Domain allowed access. Execute crond server in the nscd domain. The type of the process performing this action. Inherit and use a file descriptor from the cron daemon. Domain allowed access. Send a SIGCHLD signal to the cron daemon. Domain allowed access. Read a cron daemon unnamed pipe. Domain allowed access. Do not audit attempts to write cron daemon unnamed pipes. Domain allowed access. Read and write a cron daemon unnamed pipe. Domain allowed access. Read and write inherited user spool files. Domain allowed access. Read and write inherited spool files. Domain allowed access. Read, and write cron daemon TCP sockets. Domain allowed access. Dontaudit Read, and write cron daemon TCP sockets. Domain allowed access. Search the directory containing user cron tables. The type of the process to performing this action. Manage pid files used by cron Domain allowed access. Execute anacron in the cron system domain. Domain allowed access. Inherit and use a file descriptor from system cron jobs. Domain allowed access. Write a system cron job unnamed pipe. Domain allowed access. Read and write a system cron job unnamed pipe. Domain allowed access. Allow read/write unix stream sockets from the system cron jobs. Domain allowed access. Read temporary files from the system cron jobs. Domain allowed access. Do not audit attempts to append temporary files from the system cron jobs. Domain to not audit. Do not audit attempts to write temporary files from the system cron jobs. Domain to not audit. Read temporary files from the system cron jobs. Domain allowed access. Manage files from the system cron jobs. Domain allowed access.

Allow system cron jobs to relabel filesystem for restoring file contexts.

Enable extra rules in the cron domain to support fcron.

policy for ctdbd Transition to ctdbd. Domain allowed to transition. Execute ctdbd server in the ctdbd domain. Domain allowed access. Read ctdbd's log files. Domain allowed access. Append to ctdbd log files. Domain allowed to transition. Manage ctdbd log files Domain to not audit. Search ctdbd lib directories. Domain allowed access. Read ctdbd lib files. Domain allowed access. Manage ctdbd lib files. Domain allowed access. Manage ctdbd lib directories. Domain allowed access. Read ctdbd PID files. Domain allowed access. Connect to ctdbd over an unix stream socket. Domain allowed access. Allow domain to signal ctdbd. Domain to not audit. Allow domain to send SIGCHLD to ctdbd. Domain to not audit. All of the rules required to administrate an ctdbd environment Domain allowed access. Role allowed access. Common UNIX printing system Setup cups to transtion to the cups backend domain Domain allowed access. Domain allowed access. Execute cups in the cups domain. The type of the process performing this action. Connect to cupsd over an unix domain stream socket. Domain allowed access. Connect to cups over TCP. (Deprecated) Domain allowed access. Send and receive messages from cups over dbus. Domain allowed access. Read cups PID files. Domain allowed access. Execute cups_config in the cups_config domain. The type of the process performing this action. Send generic signals to the cups configuration daemon. Domain allowed access. Send and receive messages from cupsd_config over dbus. Domain allowed access. Read cups configuration files. Domain allowed access. Read cups-writable configuration files. Domain allowed access. Read cups log files. Domain allowed access. Append cups log files. Domain allowed access. Write cups log files. Domain allowed access. Connect to ptal over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an cups environment Domain allowed access. The role to be allowed to manage the cups domain. Concurrent versions system Read the CVS data and metadata. Domain allowed access. Allow the specified domain to execute cvs in the caller domain. Domain allowed access. Dontaudit Attempts to list the CVS data and metadata. Domain to not audit. All of the rules required to administrate an cvs environment Domain allowed access. The role to be allowed to manage the cvs domain.

Allow cvs daemon to read shadow

Cyphesis WorldForge game server Execute a domain transition to run cyphesis. Domain allowed to transition. Cyrus is an IMAP service intended to be run on sealed servers Allow caller to create, read, write, and delete cyrus data files. Domain allowed access. Allow write cyrus data files. Domain allowed access. Connect to Cyrus using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an cyrus environment Domain allowed access. The role to be allowed to manage the cyrus domain. Dante msproxy and socks4/5 proxy server Dictionary server for the SKK Japanese input method system. Desktop messaging bus DBUS stub interface. No access allowed. Domain allowed access Template for creating connections to the system DBUS. The type of the domain. Template for creating connections to a user DBUS. The type of the domain. Send a message the session DBUS. Domain allowed access. Read dbus configuration. Domain allowed access. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Send a message on the system DBUS. Domain allowed access. Allow unconfined access to the system DBUS. Domain allowed access. Allow a application domain to be started by the session dbus. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Create a domain for processes which can be started by the system dbus Type to be used as a domain. Type of the program to be used as an entry point to this domain. Do not audit attempts to send dbus messages to system bus types. Domain to not audit. Allow attempts to send dbus messages to system bus types. Domain to not audit. Dontaudit Read, and write system dbus TCP sockets. Domain allowed access. Allow unconfined access to the system DBUS. Domain allowed access. Create, read, write, and delete system dbus lib files. Domain allowed access. Read system dbus lib files. Domain allowed access. Distributed checksum clearinghouse spam filtering Execute cdcc in the cdcc domain. Domain allowed access. Execute cdcc in the cdcc domain, and allow the specified role the cdcc domain. Domain allowed access. The role to be allowed the cdcc domain. Execute dcc_client in the dcc_client domain. Domain allowed access. Send a signal to the dcc_client. Domain allowed access. Execute dcc_client in the dcc_client domain, and allow the specified role the dcc_client domain. Domain allowed access. The role to be allowed the dcc_client domain. Execute dbclean in the dcc_dbclean domain. Domain allowed access. Execute dbclean in the dcc_dbclean domain, and allow the specified role the dcc_dbclean domain. Domain allowed access. The role to be allowed the dcc_dbclean domain. Connect to dccifd over a unix domain stream socket. Domain allowed access. Update dynamic IP address at DynDNS.org. Execute ddclient in the ddclient domain. Domain allowed to transition. Execute ddclient in the ddclient domain, and allow the specified role the ddclient domain. Domain allowed to transition. Role allowed access. All of the rules required to administrate an ddclient environment. Domain allowed access. Role allowed access. Deny Hosts.

DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks).

Execute a domain transition to run denyhosts. Domain allowed to transition. Execute denyhost server in the denyhost domain. The type of the process performing this action. All of the rules required to administrate an denyhosts environment. Domain allowed access. Role allowed access.
Devicekit modular hardware abstraction layer Execute a domain transition to run devicekit. Domain allowed to transition. Send to devicekit over a unix domain datagram socket. Domain allowed access. Send and receive messages from devicekit over dbus. Domain allowed access. Send and receive messages from devicekit disk over dbus. Domain allowed access. Send signal devicekit power Domain allowed access. Send and receive messages from devicekit power over dbus. Domain allowed access. Read devicekit PID files. Domain allowed access. Manage devicekit var_run files. Domain allowed access. Dontaudit Send and receive messages from devicekit disk over dbus. Domain to not audit. Manage devicekit PID files. Domain allowed access. All of the rules required to administrate an devicekit environment Domain allowed access. Dynamic host configuration protocol (DHCP) server Transition to dhcpd. Domain allowed access. Set the attributes of the DCHP server state files. Domain allowed access. Execute dhcp server in the dhcp domain. The type of the process performing this action. All of the rules required to administrate an dhcp environment Domain allowed access. The role to be allowed to manage the dhcp domain. Dictionary daemon Use dictionary services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an dictd environment Domain allowed access. The role to be allowed to manage the dictd domain. Administration Server for Directory Server, dirsrv-admin. Exec dirsrv-admin programs. Domain allowed access. Exec cgi programs. Domain allowed access. Manage dirsrv-adminserver configuration files. Domain allowed access. Manage dirsrv-adminserver configuration files. Domain allowed access. Read dirsrv-adminserver tmp files. Domain allowed access. Write dirsrv-adminserver tmp files. Domain allowed access. Manage dirsrv-adminserver tmp files. Domain allowed access. Execute admin cgi programs in caller domain. Domain allowed access. policy for dirsrv Execute a domain transition to run dirsrv. Domain allowed to transition. Allow caller to signal dirsrv. Domain allowed access. Send a null signal to dirsrv. Domain allowed access. Allow a domain to manage dirsrv logs. Domain allowed access. Allow a domain to manage dirsrv lock. Domain allowed access. Allow a domain to manage dirsrv logs. Domain allowed access. Allow a domain to manage dirsrv /var/lib files. Domain allowed access. Allow a domain to manage dirsrv /var/run files. Domain allowed access. Allow a domain to create dirsrv pid directories. Domain allowed access. Allow a domain to read dirsrv /var/run files. Domain allowed access. Manage dirsrv configuration files. Domain allowed access. Read dirsrv share files. Domain allowed access. Connect to dirsrv over an unix stream socket. Domain allowed access. Distributed compiler daemon small and secure DNS daemon Allow search the djbdns-tinydns key ring. Domain allowed access. Allow link to the djbdns-tinydns key ring. Domain allowed access. DomainKeys Identified Mail milter. dnsmasq DNS forwarder and DHCP server Execute dnsmasq server in the dnsmasq domain. The type of the process performing this action. Execute dnsmasq server in the caller domain. Domain allowed to transition. Execute the dnsmasq init script in the init script domain. Domain allowed access. Send dnsmasq a signal The type of the process performing this action. Send dnsmasq a signull Domain allowed access. Send dnsmasq a kill signal. Domain allowed access. Read dnsmasq config files. Domain allowed. Write to dnsmasq config files. Domain allowed. Delete dnsmasq pid files Domain allowed access. Read dnsmasq pid files Domain allowed access. Manage dnsmasq pid files Domain allowed access. Create dnsmasq pid dirs Domain allowed access. All of the rules required to administrate an dnsmasq environment Domain allowed access. The role to be allowed to manage the dnsmasq domain. Dovecot POP and IMAP mail server Connect to dovecot unix domain stream socket. Domain allowed access. Connect to dovecot auth unix domain stream socket. Domain allowed access. Execute dovecot_deliver in the dovecot_deliver domain. Domain allowed access. Create, read, write, and delete the dovecot spool files. Domain allowed access. Do not audit attempts to delete dovecot lib files. Domain to not audit. Dontaudit attempts to read and write dovecot tmp files. Domain to not audit. Allow attempts to write inherited dovecot tmp files. Domain to not audit. Allow attempts to read and write to sendmail unnamed pipes. Domain allowed access. All of the rules required to administrate an dovecot environment Domain allowed access. The role to be allowed to manage the dovecot domain. policy for drbd Execute a domain transition to run drbd. Domain allowed access. Search drbd lib directories. Domain allowed access. Read drbd lib files. Domain allowed access. Create, read, write, and delete drbd lib files. Domain allowed access. Manage drbd lib dirs files. Domain allowed access. All of the rules required to administrate an drbd environment Domain allowed access. policy for dspam Execute a domain transition to run dspam. Domain allowed access. Execute dspam server in the dspam domain. The type of the process performing this action. Allow the specified domain to read dspam's log files. Domain allowed access. Allow the specified domain to append dspam log files. Domain allowed to transition. Allow domain to manage dspam log files Domain to not audit. Search dspam lib directories. Domain allowed access. Read dspam lib files. Domain allowed access. Create, read, write, and delete dspam lib files. Domain allowed access. Manage dspam lib dirs files. Domain allowed access. Read dspam PID files. Domain allowed access. Connect to DSPAM using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an dspam environment Domain allowed access. Role allowed access. Exim mail transfer agent Execute a domain transition to run exim. Domain allowed to transition. Execute exim in the exim domain. The type of the process performing this action. Do not audit attempts to read, exim tmp files Domain to not audit. Allow domain to read, exim tmp files Domain to not audit. Read exim PID files. Domain allowed access. Allow the specified domain to read exim's log files. Domain allowed access. Allow the specified domain to append exim log files. Domain allowed to transition. Allow the specified domain to manage exim's log files. Domain allowed access. Create, read, write, and delete exim spool dirs. Domain allowed access. Read exim spool files. Domain allowed access. Create, read, write, and delete exim spool files. Domain allowed access. All of the rules required to administrate an exim environment. Domain allowed access. Role allowed access.

Allow exim to connect to databases (postgres, mysql)

Allow exim to read unprivileged user files.

Allow exim to create, read, write, and delete unprivileged user files.

Update firewall filtering to ban IP addresses with too many password failures. Execute a domain transition to run fail2ban. Domain allowed to transition. Connect to fail2ban over a unix domain stream socket. Domain allowed access. Read and write to an fail2ban unix stream socket. Domain allowed access. Read fail2ban lib files. Domain allowed access. Allow the specified domain to read fail2ban's log files. Domain allowed access. Allow the specified domain to append fail2ban log files. Domain allowed to transition. Read fail2ban PID files. Domain allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. All of the rules required to administrate an fail2ban environment Domain allowed access. The role to be allowed to manage the fail2ban domain. Read and write inherited temporary files. Domain allowed access. policy for fcoemon Transition to fcoemon. Domain allowed to transition. Read fcoemon PID files. Domain allowed access. Send to a fcoemon unix dgram socket. Domain allowed access. All of the rules required to administrate an fcoemon environment Domain allowed access. Remote-mail retrieval and forwarding utility All of the rules required to administrate an fetchmail environment Domain allowed access. Finger user information service. Execute fingerd in the fingerd domain. The type of the process performing this action. Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated) Domain allowed access. DBus fingerprint reader service Execute a domain transition to run fprintd. Domain allowed to transition. Send and receive messages from fprintd over dbus. Domain allowed access. Remote-Console (out-of-band) and System Management Software (in-band) based on Intelligent Platform Management Interface specification Connect to cluster domains over a unix domain stream socket. Domain allowed access. File transfer protocol service Execute a domain transition to run ftpd. Domain allowed to transition. Execute ftpd server in the ftpd domain. The type of the process performing this action. Use ftp by connecting over TCP. (Deprecated) Domain allowed access. Read ftpd etc files Domain allowed access. Execute FTP daemon entry point programs. Domain allowed access. Read FTP transfer logs Domain allowed access. Execute the ftpdctl program in the ftpdctl domain. Domain allowed access. Execute the ftpdctl program in the ftpdctl domain. Domain allowed access. The role to allow the ftpdctl domain. Allow domain dyntransition to chroot_user_t domain. Domain allowed access. All of the rules required to administrate an ftp environment Domain allowed access. The role to be allowed to manage the ftp domain.

Allow ftp servers to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Allow ftp servers to login to local users and read/write all files on the system, governed by DAC.

Allow ftp servers to use cifs used for public file transfer services.

Allow ftpd to use ntfs/fusefs volumes.

Allow ftp servers to use nfs used for public file transfer services.

Allow ftp servers to use connect to mysql database

Allow ftp to read and write files in the user home directories

Determine whether ftpd can bind to all unreserved ports for passive mode.

OpenH.323 Voice-Over-IP Gatekeeper GIT revision control system. Read generic system content files. Domain allowed access.

Determine whether Git CGI can search home directories.

Determine whether Git CGI can access cifs file systems.

Determine whether Git CGI can access nfs file systems.

Determine whether Git session daemon can bind TCP sockets to all unreserved ports.

Determine whether calling user domains can execute Git daemon in the git_session_t domain.

Determine whether Git system daemon can search home directories.

Determine whether Git system daemon can access cifs file systems.

Determine whether Git system daemon can access nfs file systems.

policy for glance Transition to glance registry. Domain allowed to transition. Transition to glance api. Domain allowed to transition. Read glance's log files. Domain allowed access. Append to glance log files. Domain allowed access. Manage glance log files Domain allowed access. Search glance lib directories. Domain allowed access. Read glance lib files. Domain allowed access. Manage glance lib files. Domain allowed access. Manage glance lib directories. Domain allowed access. Read glance PID files. Domain allowed access. Manage glance PID files. Domain allowed access. All of the rules required to administrate an glance environment Domain allowed access. Role allowed access. policy for glusterd Transition to glusterd. Domain allowed to transition. Execute glusterd server in the glusterd domain. Domain allowed access. Read glusterd's log files. Domain allowed access. Append to glusterd log files. Domain allowed access. Manage glusterd log files Domain allowed access. Read glusterd's config files. Domain allowed access. Read and write /var/lib/glusterd files. Domain allowed access. Read and write /var/lib/glusterd files. Domain allowed access. All of the rules required to administrate an glusterd environment Domain allowed access. Role allowed access. Manage glusterd PID files. Domain allowed access.

Allow glusterfsd to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow glusterfsd to share any file/directory read only.

Allow glusterfsd to share any file/directory read/write.

Gnome clock handler for setting the time. Execute a domain transition to run gnomeclock. Domain allowed to transition. Execute gnomeclock in the gnomeclock domain, and allow the specified role the gnomeclock domain. Domain allowed access The role to be allowed the gnomeclock domain. Send and receive messages from gnomeclock over dbus. Domain allowed access. Do not audit send and receive messages from gnomeclock over dbus. Domain allowed access. General Purpose Mouse driver Connect to GPM over a unix domain stream socket. Domain allowed access. Get the attributes of the GPM control channel named socket. Domain allowed access. Do not audit attempts to get the attributes of the GPM control channel named socket. Domain allowed access. Set the attributes of the GPM control channel named socket. Domain allowed access. gpsd monitor daemon Execute a domain transition to run gpsd. Domain allowed to transition. Execute gpsd in the gpsd domain, and allow the specified role the gpsd domain. Domain allowed access The role to be allowed the gpsd domain. Read and write gpsd shared memory. Domain allowed access. Hardware abstraction layer Execute hal in the hal domain. Domain allowed access. Get the attributes of a hal process. Domain allowed access. Read hal system state Domain to not audit. Allow ptrace of hal domain Domain allowed access. Allow domain to use file descriptors from hal. Domain to not audit. Do not audit attempts to use file descriptors from hal. Domain to not audit. Allow attempts to read and write to hald unnamed pipes. Domain to not audit. Do not audit attempts to read and write to hald unnamed pipes. Domain to not audit. Send to hal over a unix domain datagram socket. Domain allowed access. Send to hal over a unix domain stream socket. Domain allowed access. Dontaudit read/write to a hal unix datagram socket. Domain allowed access. Send a dbus message to hal. Domain allowed access. Send and receive messages from hal over dbus. Domain allowed access. Execute hal mac in the hal mac domain. Domain allowed access. Allow attempts to write the hal log files. Domain allowed access. Do not audit attempts to write the hal log files. Domain to not audit Manage hald log files. Domain allowed access. Manage hald log files. Domain allowed access. Read hald tmp files. Domain allowed access. Do not audit attempts to read or write HAL libraries files Domain allowed access. Read hald PID files. Domain allowed access. Do not audit attempts to read hald PID files. Domain to not audit. Read/Write hald PID files. Domain allowed access. Manage hald PID dirs. Domain allowed access. Manage hald PID files. Domain allowed access. hddtemp hard disk temperature tool running as a daemon Execute hddtemp in the hddtemp domain. Domain allowed access. Execute hddtemp Domain allowed access. Port of Apple Rendezvous multicast DNS Send generic signals to howl. Domain allowed access. policy for hypervkvp Execute hypervkvpd in the hypervkvp domin. Domain allowed to transition. Search hypervkvp lib directories. Domain allowed access. Read hypervkvp lib files. Domain allowed access. Create, read, write, and delete hypervkvp lib files. Domain allowed access. IIIMF htt server Use i18n_input over a TCP connection. (Deprecated) Domain allowed access. ShoutCast compatible streaming media server Execute a domain transition to run icecast. Domain allowed to transition. Allow domain signal icecast Domain allowed access. Execute icecast server in the icecast domain. Domain allowed access. Read icecast PID files. Domain allowed access. Manage icecast pid files. Domain allowed access. Allow the specified domain to read icecast's log files. Domain allowed access. Allow the specified domain to append icecast log files. Domain allowed access. Allow domain to manage icecast log files Domain allow access. All of the rules required to administrate an icecast environment Domain allowed access. Role allowed access.

Determine whether icecast can listen on and connect to any TCP port.

Bring up/down ethernet interfaces based on cable detection. Execute a domain transition to run ifplugd. Domain allowed to transition. Send a generic signal to ifplugd Domain allowed access. Read ifplugd etc configuration files. Domain allowed access. Manage ifplugd etc configuration files. Domain allowed access. Read ifplugd PID files. Domain allowed access. All of the rules required to administrate an ifplugd environment Domain allowed access. The role to be allowed to manage the ifplugd domain. iMaze game server Internet services daemon. Define the specified domain as a inetd service.

Define the specified domain as a inetd service. The inetd_service_domain(), inetd_tcp_service_domain(), or inetd_udp_service_domain() interfaces should be used instead of this interface, as this interface only provides the common rules to these three interfaces.

The type associated with the inetd service process. The type associated with the process program.
Define the specified domain as a TCP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a TCP and UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Inherit and use file descriptors from inetd. Domain allowed access. Connect to the inetd service using a TCP connection. (Deprecated) Domain allowed access. Run inetd child process in the inet child domain Domain allowed access. Send UDP network traffic to inetd. (Deprecated) The type of the process performing this action. Read and write inetd TCP sockets. The type of the process performing this action.
Internet News NNTP server Allow the specified domain to execute innd in the caller domain. Domain allowed access. Allow the specified domain to execute inn configuration files in /etc. Domain allowed access. Create, read, write, and delete the innd log. Domain allowed access. Create, read, write, and delete the innd pid files. Domain allowed access. Read innd configuration files. Domain allowed access. Read innd news library files. Domain allowed access. Read innd news library files. Domain allowed access. Send to a innd unix dgram socket. Domain allowed access. Execute inn in the inn domain. Domain allowed access. All of the rules required to administrate an inn environment Domain allowed access. The role to be allowed to manage the inn domain. policy for ipmievd Transition to ipmievd. Domain allowed to transition. Execute ipmievd server in the ipmievd domain. Domain allowed access. Read ipmievd PID files. Domain allowed access. All of the rules required to administrate an ipmievd environment Domain allowed access. Role allowed access. IRC server IRQ balancing daemon Internet Storage Name Service. All of the rules required to administrate an isnsd environment. Domain allowed access. Role allowed access. Jabber instant messaging server Execute a domain transition to run jabberd services Domain allowed to transition. Execute a domain transition to run jabberd router service Domain allowed to transition. Read jabberd lib files. Domain allowed access. Dontaudit inherited read jabberd lib files. Domain to not audit. Create, read, write, and delete jabberd lib files. Domain allowed access. All of the rules required to administrate an jabber environment Domain allowed access. The role to be allowed to manage the jabber domain. keepalived - load-balancing and high-availability service Execute keepalived in the keepalived domin. Domain allowed to transition. MIT Kerberos admin and KDC

This policy supports:

Servers:

Clients:

Execute kadmind in the current domain Domain allowed access. Execute a domain transition to run kpropd. Domain allowed to transition. Use kerberos services Domain allowed access. Read the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Do not audit attempts to write the kerberos configuration file (/etc/krb5.conf). Domain to not audit. Read and write the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Read the kerberos key table. Domain allowed access. Read/Write the kerberos key table. Domain allowed access. Create keytab file in /etc Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Connect to krb524 service Domain allowed access. All of the rules required to administrate an kerberos environment Domain allowed access. The role to be allowed to manage the kerberos domain. Type transition files created in /tmp to the krb5_host_rcache type. Domain allowed access.

Allow confined applications to run with kerberos.

Service for reporting kernel oopses to kerneloops.org Execute a domain transition to run kerneloops. Domain allowed to transition. Send and receive messages from kerneloops over dbus. Domain allowed access. dontaudit attempts to Send and receive messages from kerneloops over dbus. Domain allowed access. Allow domain to manage kerneloops tmp files Domain to not audit. All of the rules required to administrate an kerneloops environment Domain allowed access. The role to be allowed to manage the kerneloops domain. policy for keystone Transition to keystone. Domain allowed to transition. Read keystone's log files. Domain allowed access. Append to keystone log files. Domain allowed access. Manage keystone log files Domain allowed access. Search keystone lib directories. Domain allowed access. Read keystone lib files. Domain allowed access. Manage keystone lib files. Domain allowed access. Manage keystone lib directories. Domain allowed access. All of the rules required to administrate an keystone environment Domain allowed access. Role allowed access. Kernel Samepage Merging (KSM) Tuning Daemon Execute a domain transition to run ksmtuned. Domain allowed to transition. Execute ksmtuned server in the ksmtuned domain. Domain allowed access. All of the rules required to administrate an ksmtuned environment Domain allowed access. Role allowed access. KDE Talk daemon Layer 2 Tunneling Protocol daemons. Transition to l2tpd. Domain allowed to transition. Execute l2tpd server in the l2tpd domain. Domain allowed access. Send to l2tpd via a unix dgram socket. Domain allowed access. Read and write l2tpd sockets. Domain allowed access. Read l2tpd PID files. Domain allowed access. Connect to l2tpd over a unix domain stream socket. Domain allowed access. Read and write l2tpd unnamed pipes. Domain allowed access. All of the rules required to administrate an l2tpd environment Domain allowed access. Role allowed access. OpenLDAP directory server Execute OpenLDAP in the ldap domain. The type of the process performing this action. Execute OpenLDAP server in the ldap domain. The type of the process performing this action. Read the contents of the OpenLDAP database directories. Domain allowed access. Read the contents of the OpenLDAP database files. Domain allowed access. Read the OpenLDAP configuration files. Domain allowed access. Use LDAP over TCP connection. (Deprecated) Domain allowed access. Connect to slapd over an unix stream socket. Domain allowed access. Connect to dirsrv over an unix stream socket. Domain allowed access. All of the rules required to administrate an ldap environment Domain allowed access. The role to be allowed to manage the ldap domain. Likewise Active Directory support for UNIX.

Likewise Open is a free, open source application that joins Linux, Unix, and Mac machines to Microsoft Active Directory to securely authenticate users with their domain credentials.

Connect to lsassd. Domain allowed access.
implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. Execute domain in the phc2sys domain. Domain allowed to transition. Execute domain in the phc2sys domain. Domain allowed to transition. Connect to timemaster using a unix domain stream socket. Domain allowed access. Read timemaster conf files. Domain allowed access. Read and write timemaster shared memory. Domain allowed access. Read and write ptp4l_t shared memory. Domain allowed access. Linux infared remote control daemon Execute a domain transition to run lircd. Domain allowed to transition. Connect to lircd over a unix domain stream socket. Domain allowed access. Read lircd etc file The type of the process performing this action. All of the rules required to administrate a lircd environment Domain allowed access. The role to be allowed to manage the syslog domain. Intel LLDP Agent. Transition to lldpad. Domain allowed to transition. Send to lldpad with a unix dgram socket. Domain allowed access. Recv to lldpad with a unix dgram socket. Domain allowed access. All of the rules required to administrate an lldpad environment. Domain allowed access. Role allowed access. Line printer daemon Role access for lpd Role allowed access User domain for the role Execute lpd in the lpd domain. Domain allowed access. Execute amrecover in the lpd domain, and allow the specified role the lpd domain. Domain allowed access. The role to be allowed the lpd domain. List the contents of the printer spool directories. Domain allowed access. Read the printer spool files. Domain allowed access. Create, read, write, and delete printer spool files. Domain allowed access. Relabel from and to the spool files. Domain allowed access. List the contents of the printer spool directories. Domain allowed access. Allow the specified domain to execute lpr in the caller domain. Domain allowed access.

Use lpd server instead of cups

libStorageMgmt plug-in daemon Execute TEMPLATE in the lsmd domin. Domain allowed to transition. Read lsmd PID files. Domain allowed access.

Determine whether lsmd_plugin can connect to all TCP ports.

Mailman is for managing electronic mail discussion and e-newsletter lists Execute mailman in the mailman domain. Domain allowed access. Execute the mailman program in the mailman domain. Domain allowed to transition. The role to allow the mailman domain. Execute mailman CGI scripts in the mailman CGI domain. Domain allowed to transition. Execute mailman in the caller domain. Domain allowd access. Send generic signals to the mailman cgi domain. Domain allowed access. Allow domain to search data directories. Domain allowed access. Allow domain to to read mailman data files. Domain allowed access. Allow domain to to create mailman data files and write the directory. Domain allowed access. List the contents of mailman data directories. Domain allowed access. Allow read acces to mailman data symbolic links. Domain allowed access. Read mailman logs. Domain allowed access. Append to mailman logs. Domain allowed access. Create, read, write, and delete mailman logs. Domain allowed access. Allow domain to read mailman archive files. Domain allowed access. Execute mailman_queue in the mailman_queue domain. Domain allowed access. policy for matahari Search matahari lib directories. Domain allowed access. Read matahari lib files. Domain allowed access. Create, read, write, and delete matahari lib files. Domain allowed access. Manage matahari lib dirs files. Domain allowed access. Read matahari PID files. Domain allowed access. Read matahari PID files. Domain allowed access. Execute a domain transition to run matahari_hostd. Domain allowed access. Execute a domain transition to run matahari_netd. Domain allowed access. Execute a domain transition to run matahari_serviced. Domain allowed access. All of the rules required to administrate an matahari environment Domain allowed access. Role allowed access. high-performance memory object caching system Execute a domain transition to run memcached. Domain allowed to transition. Read memcached PID files. Domain allowed access. All of the rules required to administrate an memcached environment Domain allowed access. The role to be allowed to manage the memcached domain. Manage memcached PID files Domain allowed access. Connect to memcached over a unix stream socket. Domain allowed access. Milter mail filters MTA communication with milter sockets Domain allowed access. Allow getattr of milter sockets Domain allowed access. Allow setattr of milter dirs Domain allowed access. Manage spamassassin milter state Domain allowed access. Delete dkim-milter PID files. Domain allowed access. Mobile IPv6 and NEMO Basic Support implementation Execute TEMPLATE in the mip6d domin. Domain allowed to transition. policy for mirrormanager Execute mirrormanager in the mirrormanager domin. Domain allowed to transition. Read mirrormanager's log files. Domain allowed access. Append to mirrormanager log files. Domain allowed access. Manage mirrormanager log files Domain allowed access. Search mirrormanager lib directories. Domain allowed access. Read mirrormanager lib files. Domain allowed access. Manage mirrormanager lib files. Domain allowed access. Manage mirrormanager lib directories. Domain allowed access. Read mirrormanager PID files. Domain allowed access. Manage mirrormanager PID files. Domain allowed access. Manage mirrormanager PID sock files. Domain allowed access. All of the rules required to administrate an mirrormanager environment Domain allowed access. Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards. Execute a domain transition to run modemmanager. Domain allowed to transition. Send and receive messages from modemmanager over dbus. Domain allowed access. Monopoly daemon policy for daemon for playing music Execute a domain transition to run mpd. Domain allowed to transition. Execute mpd server in the mpd domain. Domain allowed access. Read mpd data files. Domain allowed access. Read mpd tmpfs files. Domain allowed access. Manage mpd tmpfs files. The type of the process performing this action. Manage mpd data files. Domain allowed access. Search mpd lib directories. Domain allowed access. Read mpd lib files. Domain allowed access. Create, read, write, and delete mpd lib files. Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Manage mpd lib dirs files. Domain allowed access. Send and receive messages from mpd over dbus. Domain allowed access. All of the rules required to administrate an mpd environment Domain allowed access. Role allowed access. Policy common to all email tranfer agents. MTA stub interface. No access allowed. Domain allowed access. Type transition files created in calling dir to the mail address aliases type. Domain allowed access. Directory to transition on. Role access for mta Role allowed access User domain for the role ALlow domain to read mail content in the homedir Domain allowed access. Allow domain to manage mail content in the homedir Domain allowed access. Make the specified domain usable for a mail server. Type to be used as a mail server domain. Type of the program to be used as an entry point to this domain. Make the specified type a MTA executable file. Type to be used as a mail client. Dontaudit read and write an leaked file descriptors The type of the process performing this action. Make the specified type by a system MTA. Type to be used as a mail client. Modified mailserver interface for sendmail daemon use.

A modified MTA mail server interface for the sendmail program. It's design does not fit well with policy, and using the regular interface causes a type_transition conflict if direct running of init scripts is enabled.

This interface should most likely only be used by the sendmail policy.

The type to be used for the mail server.
Make a type a mailserver type used for sending mail. Mail server domain type used for sending mail. Make a type a mailserver type used for delivering mail to local users. Mail server domain type used for delivering mail. Make a type a mailserver type used for sending mail on behalf of local users to the local mail spool. Mail server domain type used for sending local mail. Send mail from the system. Domain allowed access. Send mail client a signal The type of the process performing this action. Execute send mail in a specified domain.

Execute send mail in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Send system mail client a signal Domain allowed access. Send system mail client a kill signal Domain allowed access. Execute sendmail in the caller domain. Domain allowed access. Read mail server configuration. Domain allowed access. write mail server configuration. Domain allowed access. Read mail address aliases. Domain allowed access. Create, read, write, and delete mail address aliases. Domain allowed access. Type transition files created in /etc to the mail address aliases type. Domain allowed access. Read and write mail aliases. Domain allowed access. Do not audit attempts to read and write TCP sockets of mail delivery domains. Mail server domain. Connect to all mail servers over TCP. (Deprecated) Mail server domain. Do not audit attempts to read a symlink in the mail spool. Domain allowed access. Get the attributes of mail spool files. Domain allowed access. Do not audit attempts to get the attributes of mail spool files. Domain to not audit. Create private objects in the mail spool directory. Domain allowed access. The type of the object to be created. The object class of the object being created. Read and write the mail spool. Domain allowed access. Create, read, and write the mail spool. Domain allowed access. Delete from the mail spool. Domain allowed access. Create, read, write, and delete mail spool files. Domain allowed access. Search mail queue dirs. Domain allowed access. List the mail queue. Domain allowed access. Read the mail queue. Domain allowed access. Do not audit attempts to read and write the mail queue. Domain to not audit. Create, read, write, and delete mail queue files. Domain allowed access. Type transition files created in calling dir to the mail address aliases type. Domain allowed access. Directory to transition on. The object class of the object being created. Read sendmail binary. Domain allowed access. Read and write unix domain stream sockets of user mail domains. Domain allowed access. Send all user mail client a signal Domain allowed access.
Munin network-wide load graphing (formerly LRRD) Connect to munin over a unix domain stream socket. Domain allowed access. Read munin configuration files. Domain allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. Append to the munin log. Domain allowed access. Search munin library directories. Domain allowed access. Do not audit attempts to search munin library directories. Domain allowed access. All of the rules required to administrate an munin environment Domain allowed access. The role to be allowed to manage the munin domain. Policy for MySQL Execute MySQL in the mysql domain. Domain allowed access. Execute MySQL in the coller domain. Domain allowed access. Execute MySQL_safe in the coller domain. Domain allowed access. Send a generic signal to MySQL. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Connect to MySQL using a unix domain stream socket. Domain allowed access. Read MySQL configuration files. Domain allowed access. Search the directories that contain MySQL database storage. Domain allowed access. List the directories that contain MySQL database storage. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database directories. Domain allowed access. Append to the MySQL database directory. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database files. Domain allowed access. Read and write to the MySQL database named socket. Domain allowed access. Write to the MySQL log. Domain allowed access. Execute MySQL server in the mysql domain. Domain allowed access. Read MySQL PID files. Domain allowed access. Search MySQL PID files. Domain allowed access. All of the rules required to administrate an mysql environment Domain allowed access. The role to be allowed to manage the mysql domain. Read and write to the MySQL database directory. Domain allowed access.

Allow mysqld to connect to all ports

Net Saint / NAGIOS - network monitoring server Do not audit attempts to read or write nagios unnamed pipes. Domain to not audit. Allow the specified domain to read nagios configuration files. Domain allowed access. Allow the specified domain to read nagios temporary files. Domain allowed access. Allow the specified domain to read nagios temporary files. Domain allowed access. Execute the nagios NRPE with a domain transition. Domain allowed access. Search nagios spool directories. Domain allowed access. Read nagios lib files. Domain allowed access. Read nagios logs. Domain allowed access. dontaudit Read and write nagios logs. Domain allowed access. Execute the nagios unconfined plugins with a domain transition. Domain allowed access. Do not audit attempts to write nrpe daemon unnamed pipes. Domain allowed access. All of the rules required to administrate an nagios environment Domain allowed access. The role to be allowed to manage the nagios domain. Read nagios lib files. Domain allowed access. Execute nagios log in the caller domain. Domain allowed access.

Allow nagios/nrpe to call sudo from NRPE utils scripts.

Nessus network scanning daemon Connect to nessus over a TCP socket (Deprecated) Domain allowed access. Manager for dynamically switching between networks. Read and write NetworkManager UDP sockets. Domain allowed access. Read and write NetworkManager packet sockets. Domain allowed access. Read and write NetworkManager netlink routing sockets. Domain allowed access. Execute NetworkManager with a domain transition. Domain allowed access. Send and receive messages from NetworkManager over dbus. Domain allowed access. Send and receive messages from NetworkManager over dbus. Domain allowed access. Send a generic signal to NetworkManager Domain allowed access. Execute NetworkManager scripts with an automatic domain transition to initrc. Domain allowed access. Read NetworkManager PID files. Domain allowed access. Read NetworkManager PID files. Domain allowed access. Execute NetworkManager in the NetworkManager domain, and allow the specified role the NetworkManager domain. Domain allowed access. The role to be allowed the NetworkManager domain. Allow caller to relabel tun_socket Domain allowed access. Allow the specified domain to append to Network Manager log files. Domain allowed access. Policy for NIS (YP) servers and clients Use the ypbind service to access NIS services unconditionally.

Use the ypbind service to access NIS services unconditionally.

This interface was added because of apache and spamassassin, to fix a nested conditionals problem. When that support is added, this should be removed, and the regular interface should be used.

The type of the process performing this action.
Use the ypbind service to access NIS services.

Allow the specified domain to use the ypbind service to access Network Information Service (NIS) services. Information that can be retreived from NIS includes usernames, passwords, home directories, and groups. If the network is configured to have a single sign-on using NIS, it is likely that any program that does authentication will need this access.

Domain allowed access.
Use the nis to authenticate passwords Domain allowed access. Execute ypbind in the ypbind domain. Domain allowed access. Execute ypbind in the ypbind domain, and allow the specified role the ypbind domain. Domain allowed access. The role to be allowed the ypbind domain. Send generic signals to ypbind. Domain allowed access. List the contents of the NIS data directory. Domain allowed access. Send UDP network traffic to NIS clients. (Deprecated) Domain allowed access. Connect to ypbind over TCP. (Deprecated) Domain allowed access. Read ypbind pid files. Domain allowed access. Delete ypbind pid files. Domain allowed access. Read ypserv configuration files. Domain allowed access. Execute ypxfr in the ypxfr domain. Domain allowed access. Execute nis server in the nis domain. Domain allowed access. Execute nis server in the nis domain. Domain allowed access. All of the rules required to administrate an nis environment Domain allowed access. Role allowed access.
openstack-nova Manage nova lib files. Domain allowed access. Name service cache daemon Send generic signals to NSCD. Domain allowed access. Send NSCD the kill signal. Domain allowed access. Send signulls to NSCD. Domain allowed access. Execute NSCD in the nscd domain. The type of the process performing this action. Allow the specified domain to execute nscd in the caller domain. Domain allowed access. Use NSCD services by connecting using a unix stream socket. Domain allowed access. Use nscd services Domain allowed access. Use NSCD services by mapping the database from an inherited NSCD file descriptor. Domain allowed access. Do not audit attempts to search the NSCD pid directory. Domain allowed access. Read NSCD pid file. Domain allowed access. Unconfined access to NSCD services. Domain allowed access. Execute nscd in the nscd domain, and allow the specified role the nscd domain. Domain allowed access The role to be allowed the nscd domain. Execute the nscd server init script. Domain allowed access. All of the rules required to administrate an nscd environment Domain allowed access. The role to be allowed to manage the nscd domain.

Allow confined applications to use nscd shared memory.

Authoritative only name server Send and receive datagrams from NSD. (Deprecated) Domain allowed access. Connect to NSD over a TCP socket (Deprecated) Domain allowed access. nslcd - local LDAP name service daemon. Execute a domain transition to run nslcd. Domain allowed to transition. Execute nslcd server in the nslcd domain. The type of the process performing this action. Read nslcd PID files. Domain allowed access. Connect to nslcd over an unix stream socket. Domain allowed to connect. All of the rules required to administrate an nslcd environment Domain allowed access. Role allowed access. Network Top Execute a domain transition to run ntop. Domain allowed to transition. Execute ntop server in the ntop domain. The type of the process performing this action. Read ntop content in /etc Domain allowed access. Search ntop dirs in /var/lib Domain allowed access. Read ntop files in /var/lib Domain allowed access. Manage ntop files in /var/lib Domain allowed access. All of the rules required to administrate an ntop environment Domain allowed access. Role allowed access. Network time protocol daemon NTP stub interface. No access allowed. Domain allowed access. Execute ntp server in the ntpd domain. The type of the process performing this action. Execute ntp in the ntp domain, and allow the specified role the ntp domain. Domain allowed access. Role allowed access. Execute ntp server in the ntpd domain. The type of the process performing this action. Execute ntp server in the ntpd domain. The type of the process performing this action. Send a generic signal to ntpd Domain allowed access. Read and write ntpd shared memory. The type of the process performing this action. All of the rules required to administrate an ntp environment Domain allowed access. The role to be allowed to manage the ntp domain. policy for numad Transition to numad. Domain allowed to transition. All of the rules required to administrate an numad environment Domain allowed access. nut - Network UPS Tools NX remote desktop Transition to NX server. Domain allowed access. Read nx home directory content Domain allowed access. Read nx home directory content Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Open AntiVirus scannerdaemon and signature update Execute oav_update in the oav_update domain. Domain allowed access. Execute oav_update in the oav_update domain, and allow the specified role the oav_update domain. Domain allowed access. The role to be allowed the oav_update domain. Oddjob provides a mechanism by which unprivileged applications can request that specified privileged operations be performed on their behalf. Execute a domain transition to run oddjob. Domain allowed to transition. Do not audit attempts to read and write oddjob fifo file. Domain to not audit. Make the specified program domain accessable from the oddjob. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Send and receive messages from oddjob over dbus. Domain allowed access. Send a SIGCHLD signal to oddjob. Domain allowed access. Execute a domain transition to run oddjob_mkhomedir. Domain allowed to transition. Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain. Domain allowed access. Role allowed access. Create a domain which can be started by init, with a range transition. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Range for the domain. SELinux policy for Oident daemon.

Oident daemon is a server that implements the TCP/IP standard IDENT user identification protocol as specified in the RFC 1413 document.

Allow the specified domain to read Oidentd personal configuration files. Domain allowed access. Allow the specified domain to create, read, write, and delete Oidentd personal configuration files. Domain allowed access. Allow the specified domain to relabel Oidentd personal configuration files. Domain allowed access.
OpenCA - Open Certificate Authority Execute the OpenCA program with a domain transition. Domain allowed access. Send OpenCA generic signals. Domain allowed access. Send OpenCA stop signals. Domain allowed access. Kill OpenCA. Domain allowed access. Service for handling smart card readers. Send openct a null signal. Domain allowed access. Execute openct in the caller domain. Domain allowed access. Execute a domain transition to run openct. Domain allowed to transition. Read openct PID files. Domain allowed access. Connect to openct over an unix stream socket. Domain allowed access. policy for openhpid Transition to openhpid. Domain allowed to transition. Execute openhpid server in the openhpid domain. Domain allowed access. Search openhpid lib directories. Domain allowed access. Read openhpid lib files. Domain allowed access. Manage openhpid lib files. Domain allowed access. Manage openhpid lib directories. Domain allowed access. All of the rules required to administrate an openhpid environment Domain allowed access. Role allowed access. policy for openshift Execute openshift server in the openshift domain. The type of the process performing this action. Execute openshift server in the openshift domain. The type of the process performing this action. Execute openshift server in the openshift domain. The type of the process performing this action. Role access to this domain. Send a null signal to openshift init scripts. Domain allowed access. Send a signal to openshift init scripts. Domain allowed access. Allow the specified domain to read openshift's log files. Domain allowed access. Allow the specified domain to append openshift log files. Domain allowed to transition. Allow domain to manage openshift log files Domain to not audit. Getattr openshift lib files. Domain allowed access. Search openshift lib directories. Domain allowed access. Read openshift lib files. Domain allowed access. Read openshift lib files. Domain allowed access. Create, read, write, and delete openshift lib files. Domain allowed access. Manage openshift lib dirs files. Domain allowed access. Manage openshift lib content. Domain allowed access. Create private objects in the mail lib directory. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Read openshift PID files. Domain allowed access. All of the rules required to administrate an openshift environment Domain allowed access. Role allowed access. Read and write inherited openshift files. Domain allowed access. Manage openshift tmp files. Domain allowed access. Manage openshift tmp sockets. Domain allowed access. Mounton openshift tmp directory. Domain allowed access. Dontaudit Read and write inherited script fifo files. Domain allowed access. Allow calling app to transition to an openshift domain Domain allowed access Allow calling app to transition to an openshift domain Domain allowed access Execute openshift in the openshift domain, and allow the specified role the openshift domain. Domain allowed to transition. Role allowed access.

Allow openshift to access nfs file systems without labels

full-featured SSL VPN solution Execute OPENVPN clients in the openvpn domain. Domain allowed access. Execute OPENVPN clients in the openvpn domain, and allow the specified role the openvpn domain. Domain allowed access. The role to be allowed the openvpn domain. Send OPENVPN clients the kill signal. Domain allowed access. Send generic signals to OPENVPN clients. Domain allowed access. Send signulls to OPENVPN clients. Domain allowed access. Allow the specified domain to read OpenVPN configuration files. Domain allowed access. All of the rules required to administrate an openvpn environment Domain allowed access. The role to be allowed to manage the openvpn domain.

Allow openvpn to read home directories

Allow openvpn to run unconfined scripts

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Transition to openvswitch. Domain allowed to transition. Execute TEMPLATE in the openvswitch domin. Domain allowed to transition. Allow stream connect to openvswitch. Domain allowed access. Read openvswitch PID files. Domain allowed access. Search openvswitch lib directories. Domain allowed access. Read openvswitch lib files. Domain allowed access. Manage openvswitch lib files. Domain allowed access. Manage openvswitch lib directories. Domain allowed access. WS-Management Server Execute openwsman in the openwsman domin. Domain allowed to transition. policy for oracleasm Transition to oracleasm. Domain allowed to transition. Execute oracleasm server in the oracleasm domain. Domain allowed access. All of the rules required to administrate an oracleasm environment Domain allowed access. Role allowed access. Client-side service written in Python that responds to pings and runs rhn_check when told to by osa-dispatcher. Execute osad in the osad domin. Domain allowed to transition. Execute osad server in the osad domain. Domain allowed access. Read osad's log files. Domain allowed access. Append to osad log files. Domain allowed access. Manage osad log files Domain allowed access. Read osad PID files. Domain allowed access. All of the rules required to administrate an osad environment Domain allowed access. Role allowed access. policy for pacemaker Transition to pacemaker. Domain allowed to transition. Execute pacemaker server in the pacemaker domain. Domain allowed access. Search pacemaker lib directories. Domain allowed access. Read pacemaker lib files. Domain allowed access. Manage pacemaker lib files. Domain allowed access. Manage pacemaker lib directories. Domain allowed access. Read pacemaker PID files. Domain allowed access. All of the rules required to administrate an pacemaker environment Domain allowed access. Role allowed access. Passive Asset Detection System

PADS is a libpcap based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.

All of the rules required to administrate an pads environment Domain allowed access. Role allowed access.
Ruby on rails deployment for Apache and Nginx servers. Execute passenger in the passenger domain. Domain allowed to transition. Execute passenger in the current domain. Domain allowed to transition. Read passenger lib files Domain allowed access. Manage passenger lib files Domain allowed access. Manage passenger var_run content. Domain allowed access. Connect to passenger unix stream socket. Domain allowed access. Allow to manage passenger tmp files/dirs. Domain allowed access. Allow to manage passenger tmp sock_files Domain allowed access. The pcp command summarizes the status of a Performance Co-Pilot (PCP) installation Allow domain to read pcp lib files Prefix for the domain. All of the rules required to administrate an pcp environment Domain allowed access. Allow the specified domain to execute pcp_pmie in the caller domain. Domain allowed to transition. Allow the specified domain to execute pcp_pmlogger in the caller domain. Domain allowed to transition.

Allow pcp to bind to all unreserved_ports

PCSC smart card service Execute a domain transition to run pcscd. Domain allowed to transition. Read pcscd pub files. Domain allowed access. Manage pcscd pub files. Domain allowed access. Manage pcscd pub fifo files. Domain allowed access. Connect to pcscd over an unix stream socket. Domain allowed access. The Open Group Pegasus CIM/WBEM Server. Perdition POP and IMAP proxy Connect to perdition over a TCP socket (Deprecated) The type of the process performing this action. Pingd of the Whatsup cluster node up/down detection utility Execute a domain transition to run pingd. Domain allowed to transition. Read pingd etc configuration files. Domain allowed access. Manage pingd etc configuration files. Domain allowed access. All of the rules required to administrate an pingd environment Domain allowed access. The role to be allowed to manage the pingd domain. policy for piranha Execute a domain transition to run fos. Domain allowed to transition. Execute a domain transition to run lvsd. Domain allowed to transition. Execute a domain transition to run pulse. Domain allowed to transition. Execute pulse server in the pulse domain. The type of the process performing this action. Allow the specified domain to read piranha's log files. Domain allowed access. Allow the specified domain to append piranha log files. Domain allowed to transition. Allow domain to manage piranha log files Domain to not audit.

Allow piranha-lvs domain to connect to the network using TCP.

policy for pkcsslotd Transition to pkcsslotd. Domain allowed to transition. Search pkcsslotd lib directories. Domain allowed access. Read pkcsslotd lib files. Domain allowed access. Manage pkcsslotd lib files. Domain allowed access. Manage pkcsslotd lib directories. Domain allowed access. All of the rules required to administrate an pkcsslotd environment Domain allowed access. policy for plymouthd Execute a domain transition to run plymouthd. Domain allowed to transition. Execute the plymoth daemon in the current domain Domain allowed to transition. Execute the plymoth command in the current domain Domain allowed to transition. Execute a domain transition to run plymouthd. Domain allowed to transition. Read plymouthd PID files. Domain allowed access. Manage plymouthd var_run files. Domain allowed access. Search plymouthd lib directories. Domain allowed access. Read plymouthd lib files. Domain allowed access. Create, read, write, and delete plymouthd lib files. Domain allowed access. Manage plymouthd var_lib files. Domain allowed access. Search plymouthd spool directories. Domain allowed access. Read plymouthd spool files. Domain allowed access. Create, read, write, and delete plymouthd spool files. Domain allowed access. Allow domain to manage plymouthd spool files Domain allowed access All of the rules required to administrate an plymouthd environment Domain allowed access. Allow domain to Stream socket connect to Plymouth daemon. Domain allowed access. Policy framework for controlling privileges for system-wide services. Send and receive messages from policykit over dbus. Domain allowed access. Send and receive messages from policykit over dbus. Domain allowed access. Execute a domain transition to run polkit_auth. Domain allowed to transition. Execute a policy_auth in the policy_auth domain, and allow the specified role the policy_auth domain, Domain allowed access. The role to be allowed the load_policy domain. Execute a domain transition to run polkit_grant. Domain allowed to transition. Execute a policy_grant in the policy_grant domain, and allow the specified role the policy_grant domain, Domain allowed access. The role to be allowed the load_policy domain. read policykit reload files Domain allowed access. rw policykit reload files Domain allowed access. Execute a domain transition to run polkit_resolve. Domain allowed to transition. Search policykit lib directories. Domain allowed access. read policykit lib files Domain allowed access. Send generic signal to policy_auth Domain allowed to transition. RPC port mapping service. Execute portmap_helper in the helper domain. Domain allowed access. Execute portmap helper in the helper domain, and allow the specified role the helper domain. Communicate with portmap. Domain allowed access. The role to be allowed the portmap domain. Send UDP network traffic to portmap. (Deprecated) The type of the process performing this action. Send and receive UDP network traffic from portmap. (Deprecated) Domain allowed access. Connect to portmap over a TCP socket (Deprecated) The type of the process performing this action. Reserve well-known ports in the RPC port range. Execute a domain transition to run portreserve. Domain allowed to transition. Execute portreserve in the portreserve domain. The type of the process performing this action. Allow the specified domain to read portreserve etcuration files. Domain allowed access. Allow the specified domain to manage portreserve etcuration files. Domain allowed access. All of the rules required to administrate an portreserve environment. Domain allowed access. Role allowed access. Portslave terminal server software Execute portslave with a domain transition. Domain allowed to transition. Postfix email server Postfix stub interface. No access allowed. Domain allowed access. Read postfix configuration files. Domain allowed access. Create files with the specified type in the postfix configuration directories. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to read and write postfix local delivery TCP sockets. Domain to not audit. Allow read/write postfix local pipes TCP sockets. Domain allowed access. Allow read/write postfix public pipes TCP sockets. Domain allowed access. Allow domain to read postfix local process state Domain allowed access. Allow domain to read postfix master process state Domain allowed access. Use postfix master process file file descriptors. Domain allowed access. Do not audit attempts to use postfix master process file file descriptors. Domain to not audit. Execute postfix_map in the postfix_map domain. Domain allowed to transition. Execute postfix_map in the postfix_map domain, and allow the specified role the postfix_map domain. Domain allowed to transition. Role allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Execute the master postfix in the postfix master domain. Domain allowed access. Execute the master postfix program in the caller domain. Domain allowed access. Connect to postfix master process using a unix domain stream socket. Domain allowed access. Allow read/write postfix master pipes Domain allowed access. Execute the master postdrop in the postfix_postdrop domain. Domain allowed to transition. Execute the master postqueue in the postfix_postqueue domain. Domain allowed to transition. Execute the master postqueue in the caller domain. Domain allowed access. Create a named socket in a postfix private directory. Domain allowed access. manage named socket in a postfix private directory. Domain allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Getattr postfix mail spool files. Domain allowed access. Search postfix mail spool directories. Domain allowed access. List postfix mail spool directories. Domain allowed access. Read postfix mail spool files. Domain allowed access. Create, read, write, and delete postfix mail spool files. Domain allowed access. Read, write, and delete postfix maildrop spool files. Domain allowed access. Create, read, write, and delete postfix maildrop spool files. Domain allowed access. Execute postfix user mail programs in their respective domains. Domain allowed access. All of the rules required to administrate an postfix environment. Domain allowed access. Role allowed access. Execute the master postdrop in the postfix_postdrop domain. Domain allowed to transition. The role to be allowed the iptables domain.

Allow postfix_local domain full write access to mail_spool directories

Postfix policy server All of the rules required to administrate an postfixpolicyd environment Domain allowed access. The role to be allowed to manage the postfixpolicyd domain. PostgreSQL relational database Role access for SE-PostgreSQL. The role associated with the user domain. The type of the user domain. Marks as a SE-PostgreSQL loadable shared library module Type marked as a database object type. Marks as a SE-PostgreSQL database object type Type marked as a database object type. Marks as a SE-PostgreSQL schema object type Type marked as a schema object type. Marks as a SE-PostgreSQL table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL system table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL sequence type Type marked as a sequence type. Marks as a SE-PostgreSQL view object type Type marked as a view object type. Marks as a SE-PostgreSQL procedure object type Type marked as a database object type. Marks as a SE-PostgreSQL procedural language object type Type marked as a procedural language object type. Marks as a SE-PostgreSQL binary large object type Type marked as a database binary large object type. Allow the specified domain to search postgresql's database directory. Domain allowed access. Allow the specified domain to manage postgresql's database. Domain allowed access. Execute postgresql in the postgresql domain. Domain allowed to transition. Execute Postgresql in the caller domain. Domain allowed access. Allow domain to signal postgresql Domain allowed access. Allow the specified domain to read postgresql's etc. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Allow the specified domain to connect to postgresql with a unix socket. Domain allowed access. Allow the specified domain unprivileged accesses to unifined database objects managed by SE-PostgreSQL, Domain allowed access. Allow the specified domain unconfined accesses to any database objects managed by SE-PostgreSQL, Domain allowed access. All of the rules required to administrate an postgresql environment Domain allowed access. The role to be allowed to manage the postgresql domain.

Allow postgresql to use ssh and rsync for point-in-time recovery

Allow unprivileged users to execute DDL statement

Allow database admins to execute DML statement

Postfix grey-listing server Write to postgrey socket Domain allowed to talk to postgrey Search the spool directory Domain allowed access All of the rules required to administrate an postgrey environment Domain allowed access. The role to be allowed to manage the postgrey domain. Point to Point Protocol daemon creates links in ppp networks Use PPP file discriptors. Domain allowed access. Do not audit attempts to inherit and use PPP file discriptors. Domain to not audit. Send a SIGCHLD signal to PPP. Domain allowed access. Send ppp a kill signal Domain allowed access. Send a generic signal to PPP. Domain allowed access. Send a generic signull to PPP. Domain allowed access. Execute domain in the ppp domain. Domain allowed access. Conditionally execute ppp daemon on behalf of a user or staff type. Domain allowed access. The role to allow the ppp domain. Unconditionally execute ppp daemon on behalf of a user or staff type. Domain allowed access. The role to allow the ppp domain. Execute domain in the ppp caller. Domain allowed access. Read ppp configuration files. Domain allowed access. Read PPP-writable configuration files. Domain allowed access. Read PPP secrets. Domain allowed access. Read PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Execute ppp server in the ntpd domain. The type of the process performing this action. All of the rules required to administrate an ppp environment Domain allowed access. Role allowed access.

Allow pppd to load kernel modules for certain modems

Allow pppd to be run for a regular user

Prelude hybrid intrusion detection system Execute a domain transition to run prelude. Domain allowed to transition. Execute a domain transition to run prelude_audisp. Domain allowed to transition. Signal the prelude_audisp domain. Domain allowed acccess. Read the prelude spool files Domain allowed access. Manage to prelude-manager spool files. Domain allowed to transition. All of the rules required to administrate an prelude environment Domain allowed access. Role allowed access. Privacy enhancing web proxy. All of the rules required to administrate an privoxy environment Domain allowed access. Role allowed access.

Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports.

Procmail mail delivery agent Execute procmail with a domain transition. Domain allowed access. Execute procmail in the caller domain. Domain allowed access. Read procmail tmp files. Domain allowed access. Read/write procmail tmp files. Domain allowed access. Read procmail home directory content Domain allowed access. Intrusion Detection and Log Analysis with iptables Execute a domain transition to run psad. Domain allowed to transition. Send a generic signal to psad Domain allowed access. Send a null signal to psad. Domain allowed access. Read psad etc configuration files. Domain allowed access. Manage psad etc configuration files. Domain allowed access. Read psad PID files. Domain allowed access. Read psad PID files. Domain allowed access. Allow the specified domain to read psad's log files. Domain allowed access. Allow the specified domain to append to psad's log files. Domain allowed access. Allow the specified domain to write to psad's log files. Domain allowed access. Read and write psad fifo files. Domain allowed access. Read and write psad tmp files. Domain allowed access. All of the rules required to administrate an psad environment Domain allowed access. The role to be allowed to manage the syslog domain. publicfile supplies files to the public through HTTP and FTP Puppet client daemon

Puppet is a configuration management system written in Ruby. The client daemon is responsible for periodically requesting the desired system state from the server and ensuring the state of the client system matches.

Execute puppet_master in the puppet_master domain. Domain allowed to transition. Read / Write to Puppet temp files. Puppet uses some system binaries (groupadd, etc) that run in a non-puppet domain and redirects output into temp files. Domain allowed access Allow the specified domain to read puppet's config files. Domain allowed access. Allow the specified domain to read puppet's log files. Domain allowed access. Allow the specified domain to create puppet's log files. Domain allowed access. Allow the specified domain to append puppet's log files. Domain allowed access. Read Puppet lib files. Domain allowed access. Manage Puppet lib files. Domain allowed access. Allow the specified domain to search puppet's log files. Domain allowed access. Allow the specified domain to search puppet's pid files. Domain allowed access. Execute puppet in the puppet domain. Domain allowed to transition. Execute puppet in the puppet domain and allow the specified role the puppetca domain. Domain allowed to transition. Role allowed access.

Allow Puppet client to manage all file types.

Allow Puppet master to use connect to mysql and postgresql database

Server for the PXE network boot protocol PyICQt is an ICQ transport for XMPP server. Pyzor is a distributed, collaborative spam detection and filtering network. Role access for pyzor Role allowed access User domain for the role Send generic signals to pyzor Domain allowed access. Execute pyzor with a domain transition. Domain allowed access. Execute pyzor in the caller domain. Domain allowed access. All of the rules required to administrate an pyzor environment Domain allowed access. The role to be allowed to manage the pyzor domain. Qmail Mail Server Transition to qmail_inject_t Domain allowed access Transition to qmail_queue_t Domain allowed access Read qmail configuration files. Domain allowed access. Define the specified domain as a qmail-smtp service. Needed by antivirus/antispam filters. Domain allowed access The type associated with the process program. Create, read, write, and delete qmail spool directories. Domain allowed access. Create, read, write, and delete qmail spool files. Domain allowed access. Read and write to qmail spool pipes. Domain to not audit. policy for qpidd Execute a domain transition to run qpidd. Domain allowed to transition. Execute qpidd server in the qpidd domain. The type of the process performing this action. Execute qpidd server in the qpidd domain. The type of the process performing this action. Read qpidd PID files. Domain allowed access. Manage qpidd var_run files. Domain allowed access. Search qpidd lib directories. Domain allowed access. Read qpidd lib files. Domain allowed access. Create, read, write, and delete qpidd lib files. Domain allowed access. Manage qpidd var_lib files. Domain allowed access. All of the rules required to administrate an qpidd environment Domain allowed access. Role allowed access. Allow read and write access to qpidd semaphores. Domain allowed access. Read and write to qpidd shared memory. The type of the process performing this action. Quantum is a virtual network service for Openstack Transition to neutron. Domain allowed to transition. Read neutron's log files. Domain allowed access. Append to neutron log files. Domain allowed access. Manage neutron log files Domain allowed access. Search neutron lib directories. Domain allowed access. Read neutron lib files. Domain allowed access. Manage neutron lib files. Domain allowed access. Manage neutron lib directories. Domain allowed access. Read and write neutron fifo files. Domain allowed access. Allow domain to send sigchld to neutron process. Domain allowed access. Connect to neutron over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an neutron environment Domain allowed access. RADIUS authentication and accounting server. Use radius over a UDP connection. (Deprecated) Domain allowed access. All of the rules required to administrate an radius environment Domain allowed access. Role allowed access. IPv6 router advertisement daemon Read radvd PID files. Domain allowed access. All of the rules required to administrate an radvd environment Domain allowed access. Role allowed access. A distributed, collaborative, spam detection and filtering network.

A distributed, collaborative, spam detection and filtering network.

This policy will work with either the ATrpms provided config file in /etc/razor, or with the default of dumping everything into $HOME/.razor.

Role access for razor Role allowed access User domain for the role Execute razor in the system razor domain. Domain allowed access. read razor lib files. Domain allowed access.
Network router discovery daemon Execute rdisc in the caller domain. Domain allowed access. Advanced key-value store Execute redis server in the redis domin. Domain allowed to transition. Execute redis server in the redis domain. Domain allowed access. Read redis's log files. Domain allowed access. Append to redis log files. Domain allowed access. Manage redis log files Domain allowed access. Search redis lib directories. Domain allowed access. Read redis lib files. Domain allowed access. Manage redis lib files. Domain allowed access. Manage redis lib directories. Domain allowed access. Read redis PID files. Domain allowed access. Connect to redis over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an redis environment Domain allowed access. Role allowed access. Policy for rshd, rlogind, and telnetd. Domain transition to the remote login domain. The type of the process performing this action. allow Domain to signal remote login domain. The type of the process performing this action. Resource management daemon Connect to resmgrd over a unix domain stream socket. Domain allowed access. SELinux policy for rgmanager Execute a domain transition to run rgmanager. Domain allowed to transition. Allow read and write access to rgmanager semaphores. Domain allowed access. Connect to rgmanager over an unix stream socket. Domain allowed access. Allow manage rgmanager tmpfs files. The type of the process performing this action. Allow manage rgmanager tmp files. The type of the process performing this action. Allow manage rgmanager pid files. The type of the process performing this action. All of the rules required to administrate an rgmanager environment Domain allowed access. The role to be allowed to manage the rgmanager domain. Allow the specified domain to manage rgmanager's lib/run files. Domain allowed access. Allow the specified domain to search rgmanager's lib files. Domain allowed access.

Allow rgmanager domain to connect to the network using TCP.

RHCS - Red Hat Cluster Suite Execute a domain transition to run dlm_controld. Domain allowed to transition. Connect to dlm_controld over a unix domain stream socket. Domain allowed access. Allow read and write access to dlm_controld semaphores. Domain allowed access. Execute a domain transition to run fenced. Domain allowed access. Allow a domain to getattr on fenced executable. Domain allowed to transition. Allow read and write access to fenced semaphores. Domain allowed access. Send and receive messages from fenced over dbus. Domain allowed access. Connect to fenced over an unix domain stream socket. Domain allowed access. Execute a domain transition to run gfs_controld. Domain allowed access. Allow read and write access to gfs_controld semaphores. Domain allowed access. Read and write to gfs_controld_t shared memory. Domain allowed access. Connect to gfs_controld_t over an unix domain stream socket. Domain allowed access. Execute a domain transition to run groupd. Domain allowed access. Connect to groupd over a unix domain stream socket. Domain allowed access. Allow read and write access to groupd semaphores. Domain allowed access. Read and write to group shared memory. Domain allowed access. Read and write to cluster domains shared memory. Domain allowed access. Read and write access to cluster domains semaphores. Domain allowed access. Connect to cluster domains over a unix domain stream socket. Domain allowed access. Connect to cluster domains over a unix domain stream socket. Domain allowed access. Domain allowed access. Execute a domain transition to run qdiskd. Domain allowed access. Allow domain to read qdiskd tmpfs files Domain allowed access. Execute a domain transition to run cluster administrative domain. Domain allowed to transition. Execute cluster init scripts in the init script domain. Domain allowed to transition. Execute cluster in the caller domain. Domain allowed access. Read cluster log files. Domain allowed access. Setattr cluster log files. Domain allowed access. Allow the specified domain to read/write inherited cluster's tmpf files. Domain allowed access. Allow manage cluster tmp files. Domain allowed access. Allow the specified domain to read/write cluster's tmpfs files. Domain allowed access. Allow manage cluster tmpfs files. Domain allowed access. Allow manage cluster pid files. Domain allowed access. Allow read cluster pid files. Domain allowed access. Allow domain to read cluster lib files Domain allowed access. Allow domain to manage cluster lib files Domain allowed access. Allow domain to relabel cluster lib files Domain allowed access. Send and receive messages from a cluster service over dbus. Domain allowed access.

Allow fenced domain to connect to the network using TCP.

Allow fenced domain to execute ssh.

Allow cluster administrative domains to connect to the network using TCP.

Allow cluster administrative domains to manage all files on a system.

Allow cluster administrative cluster domains memcheck-amd64- to use executable memory

rhev polic module contains policies for rhev apps Execute rhev-agentd in the rhev_agentd domain. Domain allowed access. Read rhev-agentd PID files. Domain allowed access. Connect to rhev_agentd over a unix domain stream socket. Domain allowed access. Send sigchld to rhev-agentd Domain allowed access Allow attempts to read and write to rhev-agentd pipes Domain allowed access Red Hat Graphical Boot RHGB stub interface. No access allowed. N/A Use a rhgb file descriptor. The type of the process performing this action. Get the process group of rhgb. Domain allowed access. Send a signal to rhgb. Domain allowed access. Read and write to unix stream sockets. The type of the process performing this action. Do not audit attempts to read and write rhgb unix domain stream sockets. The type of the process performing this action. Connected to rhgb unix stream socket. The type of the process performing this action. Read and write to rhgb shared memory. The type of the process performing this action. Read from and write to the rhgb devpts. Domain allowed access. dontaudit Read from and write to the rhgb devpts. Domain allowed access. Read and write to rhgb temporary file system. The type of the process performing this action. policy for rhnsd Transition to rhnsd. Domain allowed to transition. Execute rhnsd server in the rhnsd domain. Domain allowed access. Allow the specified domain to manage rhnsd configuration files. Domain allowed access. All of the rules required to administrate an rhnsd environment Domain allowed access. Role allowed access. Subscription Management Certificate Daemon policy Transition to rhsmcertd. Domain allowed to transition. Execute rhsmcertd server in the rhsmcertd domain. Domain allowed access. Read rhsmcertd's log files. Domain allowed access. Append to rhsmcertd log files. Domain allowed access. Manage rhsmcertd log files Domain allowed access. Search rhsmcertd lib directories. Domain allowed access. Read rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib directories. Domain allowed access. Read rhsmcertd PID files. Domain allowed access. Connect to rhsmcertd over a unix domain stream socket. Domain allowed access. Send and receive messages from rhsmcertd over dbus. Domain allowed access. Dontaudit Send and receive messages from rhsmcertd over dbus. Domain allowed access. All of the rules required to administrate an rhsmcertd environment Domain allowed access. Role allowed access. Ricci cluster management agent Execute a domain transition to run ricci. Domain allowed to transition. Execute ricci server in the ricci domain. The type of the process performing this action. Execute a domain transition to run ricci_modcluster. Domain allowed to transition. Do not audit attempts to use ricci_modcluster file descriptors. The type of process not to audit. Do not audit attempts to read write ricci_modcluster unamed pipes. The type of process not to audit. Connect to ricci_modclusterd over an unix stream socket. Domain allowed access. Read and write to ricci_modclusterd temporary file system. Domain allowed access. Execute a domain transition to run ricci_modlog. Domain allowed to transition. Execute a domain transition to run ricci_modrpm. Domain allowed to transition. Execute a domain transition to run ricci_modservice. Domain allowed to transition. Execute a domain transition to run ricci_modstorage. Domain allowed to transition. Allow the specified domain to read ricci's lib files. Domain allowed access. Allow the specified domain to manage ricci's lib files. Domain allowed access. All of the rules required to administrate an ricci environment Domain allowed access. Role allowed access. Remote login daemon Execute rlogind in the rlogin domain. The type of the process performing this action. read rlogin homedir content (.config) Domain allowed access. Roundup Issue Tracking System policy All of the rules required to administrate an roundup environment Domain allowed access. The role to be allowed to manage the roundup domain. Remote Procedure Call Daemon for managment of network based process communication RPC stub interface. No access allowed. Domain allowed access. Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) The type of the process performing this action. Do not audit attempts to get the attributes of the NFS export file. The type of the process performing this action. Allow read access to exports. The type of the process performing this action. Allow write access to exports. The type of the process performing this action. Execute domain in nfsd domain. The type of the process performing this action. Execute domain in nfsd domain. Domain allowed access. Execute domain in rpcd domain. The type of the process performing this action. Send kill signals to rpcd. Domain allowed access. Execute rpcd in the rcpd domain, and allow the specified role the rpcd domain. Domain allowed to transition. Role allowed access. Execute domain in rpcd domain. Domain allowed access. Read NFS exported content. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to read and write to an NFS UDP socket. Domain allowed access. Send UDP traffic to NFSd. (Deprecated) Domain allowed access. Search NFS state data in /var/lib/nfs. Domain allowed access. Read NFS state data in /var/lib/nfs. Domain allowed access. Manage NFS state data in /var/lib/nfs. Domain allowed access.

Allow gssd to read temp directory. For access to kerberos tgt.

Universal Addresses to RPC Program Number Mapper Execute a domain transition to run rpcbind. Domain allowed to transition. Connect to rpcbindd over an unix stream socket. Domain allowed access. Read rpcbind PID files. Domain allowed access. Search rpcbind lib directories. Domain allowed access. Read rpcbind lib files. Domain allowed access. Create, read, write, and delete rpcbind lib files. Domain allowed access. All of the rules required to administrate an rpcbind environment Domain allowed access. The role to be allowed to manage the rpcbind domain. Remote shell service. Domain transition to rshd. The type of the process performing this action. Fast incremental file transfer for synchronization Make rsync an entry point for the specified domain. The domain for which init scripts are an entrypoint. Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Execute rsync in the caller domain domain. Domain allowed access. Read rsync config files. Domain allowed. Write to rsync config files. Domain allowed. Manage rsync config files. Domain allowed. Create objects in the amavis spool directories with a private type. Domain allowed access. Class of the object being created.

Allow rsync to run as a client

Allow rsync to run as a server

Allow rsync to export any files/directories read only.

Allow rsync to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow rsync servers to share cifs files systems

Allow rsync servers to share nfs files systems

Platform diagnostics report firmware events. Execute rtas_errd in the rtas_errd domin. Domain allowed to transition. Read rtas_errd's log files. Domain allowed access. Append to rtas_errd log files. Domain allowed access. Manage rtas_errd log files Domain allowed access. Read rtas_errd PID files. Domain allowed access. All of the rules required to administrate an rtas_errd environment Domain allowed access. Realtime scheduling for user processes. Execute a domain transition to run rtkit_daemon. Domain allowed to transition. Send and receive messages from rtkit_daemon over dbus. Domain allowed access. Do not audit send and receive messages from rtkit_daemon over dbus. Domain allowed access. Allow rtkit to control scheduling for your process Domain allowed access. Who is logged in on other machines? Execute a domain transition to run rwho. Domain allowed to transition. Search rwho log directories. Domain allowed access. Read rwho log files. Domain allowed access. Search rwho spool directories. Domain allowed access. Read rwho spool files. Domain allowed access. Create, read, write, and delete rwho spool files. Domain allowed access. All of the rules required to administrate an rwho environment Domain allowed access. The role allowed access. SMB and CIFS client/server programs for UNIX and name Service Switch daemon for resolving names from Windows NT servers. Execute nmbd net in the nmbd_t domain. The type of the process performing this action. Execute samba server in the samba domain. The type of the process performing this action. Execute samba net in the samba_net domain. The type of the process performing this action. Execute samba net in the samba_unconfined_net domain. The type of the process performing this action. Execute samba net in the samba_net domain, and allow the specified role the samba_net domain. The type of the process performing this action. The role to be allowed the samba_net domain. Execute samba net in the samba_unconfined_net domain, and allow the specified role the samba_unconfined_net domain. The type of the process performing this action. The role to be allowed the samba_unconfined_net domain. Execute smbmount in the smbmount domain. The type of the process performing this action. Execute smbmount interactively and do a domain transition to the smbmount domain. Domain allowed acces. The role to be allowed the smbmount domain. Allow the specified domain to read samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read samba's log files. Domain allowed access. Allow the specified domain to append to samba's log files. Domain allowed access. Execute samba log in the caller domain. The type of the process performing this action. Allow the specified domain to read samba's secrets. Domain allowed access. Allow the specified domain to read samba's shares Domain allowed access. Allow the specified domain to search samba /var directories. Domain allowed access. Allow the specified domain to read samba /var files. Domain allowed access. Do not audit attempts to write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var directories. Domain allowed access. Execute a domain transition to run smbcontrol. Domain allowed to transition. Execute smbcontrol in the smbcontrol domain, and allow the specified role the smbcontrol domain. Domain allowed access The role to be allowed the smbcontrol domain. Execute smbd in the smbd_t domain. The type of the process performing this action. Do not audit attempts to use file descriptors from samba. Domain to not audit. Allow the specified domain to write to smbmount tcp sockets. Domain allowed access. Allow the specified domain to read and write to smbmount tcp sockets. Domain allowed access. Execute winbind_helper in the winbind_helper domain. The type of the process performing this action. Execute winbind_helper in the winbind_helper domain, and allow the specified role the winbind_helper domain. The type of the process performing this action. The role to be allowed the winbind_helper domain. Allow the specified domain to read the winbind pid files. Domain allowed access. Allow domain to signull winbind Domain allowed access. Allow domain to signal samba Domain to not audit. Connect to nmbd. Domain allowed access. Allow domain to signal samba Domain to not audit. Connect to winbind. Domain allowed access. Search the samba pid directory. Domain to not audit. Allow domain to signull samba_unconfined_net Domain allowed access. Set attributes of samba_share directories. Domain allowed access. All of the rules required to administrate an samba environment Domain allowed access. The role to be allowed to manage the samba domain.

Allow samba to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow samba to create new home directories (e.g. via PAM)

Allow samba to act as the domain controller, add users, groups and change passwords.

Allow samba to act as a portmapper

Allow samba to share users home directories.

Allow samba to share any file/directory read only.

Allow samba to share any file/directory read/write.

Allow samba to run unconfined scripts

Allow samba to export NFS volumes.

Allow samba to export ntfs/fusefs volumes.

Allow smbd to load libgfapi from gluster.

policy for sanlock Execute a domain transition to run sanlock. Domain allowed access. Execute sanlock server in the sanlock domain. The type of the process performing this action. Create, read, write, and delete sanlock PID files. Domain allowed access. Connect to sanlock over an unix stream socket. Domain allowed access. All of the rules required to administrate an sanlock environment Domain allowed access. Role allowed access.

Allow sanlock to manage nfs files

Allow sanlock to manage cifs files

Allow sanlock to read/write fuse files

SASL authentication server Connect to SASL. Domain allowed access. All of the rules required to administrate an sasl environment Domain allowed access. Role allowed access.

Allow sasl to read shadow

Standards Based Linux Instrumentation for Manageability. Transition to gatherd. Domain allowed to transition. Read gatherd PID files. Domain allowed access. Connect to sblim_sfcb over a unix stream socket. Domain allowed access. Getattr on sblim executable. Domain allowed to transition. Connect to sblim_sfcb over a unix stream socket. Domain allowed access. Allow read and write access to sblim semaphores. Domain allowed access. All of the rules required to administrate an gatherd environment Domain allowed access. Policy for sendmail. Sendmail stub interface. No access allowed. Domain allowed access. Allow attempts to read and write to sendmail unnamed pipes. Domain to not audit. Domain transition to sendmail. Domain allowed access. Execute sendmail in the sendmail domain. The type of the process performing this action. Execute the sendmail program in the sendmail domain. Domain allowed access. The role to allow the sendmail domain. Send generic signals to sendmail. Domain allowed access. Read and write sendmail TCP sockets. Domain allowed access. Do not audit attempts to read and write sendmail TCP sockets. Domain to not audit. Read and write sendmail unix_stream_sockets. Domain allowed access. Do not audit attempts to read and write sendmail unix_stream_sockets. Domain allowed access. Read sendmail logs. Domain allowed access. Create, read, write, and delete sendmail logs. Domain allowed access. Create sendmail logs with the correct type. Domain allowed access. Manage sendmail tmp files. Domain allowed access. Execute sendmail in the unconfined sendmail domain, and allow the specified role the unconfined sendmail domain, and use the caller's terminal. Domain allowed access. Role allowed access. Execute sendmail in the unconfined sendmail domain. Domain allowed access. All of the rules required to administrate an sendmail environment Domain allowed access. Role allowed access. Sensor information logging daemon Execute sensord in the sensord domain. Domain allowed to transition. All of the rules required to administrate an sensord environment Domain allowed access. SELinux troubleshooting service Connect to setroubleshootd over an unix stream socket. Domain allowed access. Dontaudit attempts to connect to setroubleshootd over an unix stream socket. Domain allowed access. Send and receive messages from setroubleshoot over dbus. Domain allowed access. dontaudit send and receive messages from setroubleshoot over dbus. Domain to not audit. Send and receive messages from setroubleshoot over dbus. Domain allowed access. Dontaudit read/write to a setroubleshoot leaked sockets. Domain allowed access. All of the rules required to administrate an setroubleshoot environment Domain allowed access. Policy for gridengine MPI jobs

Allow sge to access nfs file systems.

Allow sge to connect to the network using any TCP port

OpenSLP server daemon to dynamically register services. Transition to slpd. Domain allowed to transition. Execute slpd server in the slpd domain. Domain allowed access. All of the rules required to administrate an slpd environment Domain allowed access. Role allowed access. Service for downloading news feeds the slrn newsreader. Allow the domain to search slrnpull spools. domain allowed access Allow the domain to create, read, write, and delete slrnpull spools. domain allowed access Smart disk monitoring daemon policy Allow caller to read smartmon temporary files. The process type reading the temporary files. All of the rules required to administrate an smartmon environment Domain allowed access. Role allowed access.

Enable additional permissions needed to support devices on 3ware controllers.

Smokeping network latency measurement. Execute a domain transition to run smokeping. Domain allowed to transition. Execute smokeping server in the smokeping domain. Domain allowed access. Read smokeping PID files. Domain allowed access. Manage smokeping PID files. Domain allowed access. Get attributes of smokeping lib files. Domain allowed access. Read smokeping lib files. Domain allowed access. Manage smokeping lib files. Domain allowed access. All of the rules required to administrate a smokeping environment Domain allowed access. Role allowed access. Tools to send and receive short messages through GSM modems or mobile phones. Search smsd lib directories. Domain allowed access. Read smsd lib files. Domain allowed access. Manage smsd lib files. Domain allowed access. Manage smsd lib directories. Domain allowed access. All of the rules required to administrate an smstools environment. Domain allowed access. Role allowed access. Simple network management protocol services Connect to snmpd using a unix domain stream socket. Domain allowed access. Use snmp over a TCP connection. (Deprecated) Domain allowed access. Send and receive UDP traffic to SNMP (Deprecated) Domain allowed access. Read snmpd libraries. Domain allowed access. Read snmpd libraries directories Domain allowed access. Manage snmpd libraries directories Domain allowed access. Append snmpd libraries. Domain allowed access. Manage snmpd libraries files. Domain allowed access. dontaudit Read snmpd libraries. Domain to not audit. dontaudit write snmpd libraries files. Domain to not audit. All of the rules required to administrate an snmp environment Domain allowed access. The role to be allowed to manage the snmp domain. Snort network intrusion detection system Execute a domain transition to run snort. Domain allowed to transition. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the snort domain. sound server for network audio server programs, nasd, yiff, etc Connect to the sound server over a TCP socket (Deprecated) Domain allowed access. All of the rules required to administrate an soundd environment Domain allowed access. The role to be allowed to manage the soundd domain. Filter used for removing unsolicited email. Role access for spamassassin Role allowed access User domain for the role Execute the standalone spamassassin program in the caller directory. Domain allowed access. Singnal the spam assassin daemon The type of the process performing this action. Execute the spamassassin daemon program in the caller directory. Domain allowed access. Execute spamassassin client in the spamassassin client domain. Domain allowed access. Send kill signal to spamassassin client Domain allowed access. Manage spamc home files. Domain allowed access. Execute the spamassassin client program in the caller directory. Domain allowed access. Execute spamassassin standalone client in the user spamassassin domain. Domain allowed access. read spamd lib files. Domain allowed access. Create, read, write, and delete spamd lib files. Domain allowed access. Read temporary spamd file. The type of the process performing this action. Do not audit attempts to get attributes of temporary spamd sockets/ Domain to not audit. Connect to run spamd. Domain allowed to connect. Read spamd pid file. Domain allowed to connect. All of the rules required to administrate an spamassassin environment Domain allowed access. The role to be allowed to manage the spamassassin domain.

Allow user spamassassin clients to use the network.

Allow spamd to read/write user home directories.

Alcatel speedtouch USB ADSL modem Squid caching http proxy server Execute squid in the squid domain. The type of the process performing this action. Execute squid The type of the process performing this action. Send generic signals to squid. Domain allowed access. Allow read and write squid unix domain stream sockets. Domain allowed access. Do not audit attempts to search squid cache dirs Domain to not audit. Read squid configuration file. Domain allowed access. Append squid logs. Domain allowed access. Append squid logs. Domain allowed access. Create, read, write, and delete squid logs. Domain allowed access. Use squid services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an squid environment Domain allowed access. The role to be allowed to manage the squid domain.

Allow squid to connect to all ports, not just HTTP, FTP, and Gopher ports.

Allow squid to run as a transparent proxy (TPROXY)

Secure shell client and server policy. Send a SIGCHLD signal to the ssh server. Domain allowed access. Send a generic signal to the ssh server. Domain allowed access. Read a ssh server unnamed pipe. Domain allowed access. Read and write a ssh server unnamed pipe. Domain allowed access. Read and write ssh server unix domain stream sockets. Domain allowed access. Read and write ssh server unix dgram sockets. Domain allowed access. Read and write ssh server TCP sockets. Domain allowed access. Do not audit attempts to read and write ssh server TCP sockets. Domain to not audit. Connect to SSH daemons over TCP sockets. (Deprecated) Domain allowed access. Execute the ssh daemon sshd domain. Domain allowed access. Execute sshd server in the sshd domain. The type of the process performing this action. Execute the ssh client in the caller domain. Domain allowed access. Set the attributes of sshd key files. Domain allowed access. Execute the ssh agent client in the caller domain. Domain allowed access. Read ssh home directory content Domain allowed access. Execute the ssh key generator in the ssh keygen domain. Domain allowed access. Execute the ssh key generator in the caller domain. Domain allowed to transition. Execute ssh-keygen in the iptables domain, and allow the specified role the ssh-keygen domain. Domain allowed to transition. Role allowed access. Read ssh server keys Domain allowed access. Manage ssh home directory content Domain allowed access. Create Secure Shell home directory content. Domain allowed access. Delete from the ssh temp files. Domain allowed access. Send a null signal to sshd processes. Domain allowed access. Allow domain dyntransition to chroot_user_t domain. Domain allowed access. Getattr ssh home directory Domain allowed access. Dontaudit search ssh home directory Domain allowed access. Do not audit attempts to read and write the sshd pty type. Domain to not audit. Read and write inherited sshd pty type. Domain to not audit. All of the rules required to administrate an sshd environment Domain allowed access. Role allowed access.

allow host key based authentication

Allow ssh logins as sysadm_r:sysadm_t

Allow ssh with chroot env to read and write files in the user home directories

Allow ssh with chroot env to manage all files

Allow ssh with chroot env to apache content

System Security Services Daemon Execute a domain transition to run sssd. Domain allowed to transition. Execute sssd server in the sssd domain. Domain allowed access. Read sssd public files. Domain allowed access. Read sssd PID files. Domain allowed access. Manage sssd var_run files. Domain allowed access. Search sssd lib directories. Domain allowed access. Do not audit attempts to search sssd lib directories. Domain to not audit. Read sssd lib files. Domain allowed access. Create, read, write, and delete sssd lib files. Domain allowed access. Send and receive messages from sssd over dbus. Domain allowed access. Connect to sssd over an unix stream socket. Domain allowed access. Allow attempts to read and write to sssd pipes Domain allowed access. All of the rules required to administrate an sssd environment Domain allowed access. The role to be allowed to manage the sssd domain. Instrumentation System Server Execute stapserver in the stapserver domain. Domain allowed to transition. Read stapserver's log files. Domain allowed access. Append to stapserver log files. Domain allowed access. Manage stapserver log files Domain allowed access. Read stapserver PID files. Domain allowed access. Manage stapserver lib files Domain allowed access. All of the rules required to administrate an stapserver environment Domain allowed access. SSL Tunneling Proxy Define the specified domain as a stunnel inetd service. The type associated with the stunnel inetd service process. The type associated with the process program. policy for svnserve Transition to svnserve. Domain allowed to transition. Execute svnserve server in the svnserve domain. Domain allowed access. Read svnserve PID files. Domain allowed access. All of the rules required to administrate an svnserve environment Domain allowed access. policy for swift Execute TEMPLATE in the swift domin. Domain allowed to transition. Read swift PID files. Domain allowed access. Manage swift data files. Domain allowed access. Read and write swift lock files. Domain allowed access. Transition content labels to swift named content Domain allowed access.

Determine whether swift can connect to all TCP ports

Policy for sysstat. Reports on various system states Manage sysstat logs. Domain allowed access. Policy for TCP daemon. Execute tcpd in the tcpd domain. The type of the process performing this action. Create a domain for services that utilize tcp wrappers. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Telnet daemon Trivial file transfer protocol daemon Read tftp content Domain allowed access. Manage tftp /var/lib files. Domain allowed access. Search tftp /var/lib directories. Domain allowed access. Search tftp /var/lib directories. Domain allowed access. Manage tftp /var/lib files. Domain allowed access. Create objects in tftpdir directories with specified types. Domain allowed access. Private file type. Class of the object being created. All of the rules required to administrate an tftp environment Domain allowed access.

Allow tftp to modify public files used for public file transfer services.

Allow tftp to read from a NFS store for public file transfer services.

Allow tftp to read from a CIFS store for public file transfer services.

Linux Target Framework Daemon.

Linux target framework (tgt) aims to simplify various SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation and maintenance. Our key goals are the clean integration into the scsi-mid layer and implementing a great portion of tgt in user space.

Allow read and write access to tgtd semaphores. Domain allowed access. Manage tgtd sempaphores. Domain allowed access. Connect to tgtd using a unix domain stream socket. Domain allowed access.
MIDI to WAV converter and player configured as a service policy for tomcat Transition to tomcat. Domain allowed to transition. Search tomcat cache directories. Domain allowed access. Read tomcat cache files. Domain allowed access. Create, read, write, and delete tomcat cache files. Domain allowed access. Manage tomcat cache dirs. Domain allowed access. Read tomcat's log files. Domain allowed access. Append to tomcat log files. Domain allowed access. Manage tomcat log files Domain allowed access. Search tomcat lib directories. Domain allowed access. Read tomcat lib files. Domain allowed access. Manage tomcat lib files. Domain allowed access. Manage tomcat lib directories. Domain allowed access. Read tomcat PID files. Domain allowed access. All of the rules required to administrate an tomcat environment Domain allowed access. TOR, the onion router Execute a domain transition to run TOR. Domain allowed to transition. All of the rules required to administrate an tor environment Domain allowed access. The role to be allowed to manage the tor domain.

Allow tor daemon to bind tcp sockets to all unreserved ports.

HTTP transperant proxy Dynamic adaptive system tuning daemon Execute a domain transition to run tuned. Domain allowed to transition. Execute tuned in the caller domain. Domain allowed access. Read tuned PID files. Domain allowed access. Manage tuned PID files. Domain allowed access. Execute tuned server in the tuned domain. The type of the process performing this action. All of the rules required to administrate an tuned environment Domain allowed access. Role allowed access. ucspitcp policy

Policy for DJB's ucspi-tcpd

Define a specified domain as a ucspitcp service. Domain allowed access. The type associated with the process program.
Iptables/netfilter userspace logging daemon. Execute a domain transition to run ulogd. Domain allowed to transition. Allow the specified domain to read ulogd configuration files. Domain allowed access. Allow the specified domain to read ulogd's log files. Domain allowed access. Allow the specified domain to search ulogd's log files. Domain allowed to transition. Allow the specified domain to append to ulogd's log files. Domain allowed access. All of the rules required to administrate an ulogd environment Domain allowed access. The role to be allowed to manage the syslog domain. Uptime daemon USB multiplexing daemon for communicating with Apple iPod Touch and iPhone Execute a domain transition to run usbmuxd. Domain allowed to transition. Connect to usbmuxd over a unix domain stream socket. Domain allowed access. Unix to Unix Copy Execute the uucico program in the uucpd_t domain. Domain allowed to transition. Allow the specified domain to append to uucp log files. Domain allowed access. Create, read, write, and delete uucp spool files. Domain allowed access. Execute the master uux program in the uux_t domain. Domain allowed access. All of the rules required to administrate an uucp environment Domain allowed access. policy for uuidd Transition to uuidd. Domain allowed to transition. Execute uuidd server in the uuidd domain. Domain allowed access. Search uuidd lib directories. Domain allowed access. Read uuidd lib files. Domain allowed access. Manage uuidd lib files. Domain allowed access. Manage uuidd lib directories. Domain allowed access. Read uuidd PID files. Domain allowed access. Connect to uuidd over an unix stream socket. Domain allowed access. All of the rules required to administrate an uuidd environment Domain allowed access. Role allowed access. University of Washington IMAP toolkit POP3 and IMAP mail server Execute the UW IMAP/POP3 servers with a domain transition. Domain allowed access. Varnishd http accelerator daemon Execute varnishd in the varnishd domain. The type of the process performing this action. Execute varnishd The type of the process performing this action. Read varnishd configuration file. Domain allowed access. Read varnish lib files. Domain allowed access. Read varnish logs. Domain allowed access. Append varnish logs. Domain allowed access. Manage varnish logs. Domain allowed access. All of the rules required to administrate an varnishlog environment Domain allowed access. The role to be allowed to manage the varnishlog domain. All of the rules required to administrate an varnishd environment Domain allowed access. The role to be allowed to manage the varnishd domain.

Allow varnishd to connect to all ports, not just HTTP.

policy for vdagent Getattr on vdagent executable. Domain allowed to transition. Execute a domain transition to run vdagent. Domain allowed access. Get the attributes of vdagent logs. Domain allowed access. Read vdagent PID files. Domain allowed access. Connect to vdagent over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an vdagent environment Domain allowed access. Virtual host metrics daemon Execute a domain transition to run vhostmd. Domain allowed to transition. Execute vhostmd server in the vhostmd domain. The type of the process performing this action. Allow domain to read, vhostmd tmpfs files Domain to not audit. Do not audit attempts to read, vhostmd tmpfs files Domain to not audit. Allow domain to read and write vhostmd tmpfs files Domain to not audit. Create, read, write, and delete vhostmd tmpfs files. Domain to not audit. Read vhostmd PID files. Domain allowed access. Manage vhostmd var_run files. Domain allowed access. Connect to vhostmd over an unix domain stream socket. Domain allowed access. Dontaudit read and write to vhostmd over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an vhostmd environment Domain allowed access. Role allowed access. Libvirt virtualization API Make the specified type usable as a virt image Type to be used as a virtual image Getattr on virt executable. Domain allowed to transition. Execute a domain transition to run virt. Domain allowed to transition. Execute a domain transition to run virt. Domain allowed to transition. Role allowed to access. Transition to virt_bridgehelper. Domain allowed to transition. Connect to virt over an unix domain stream socket. Domain allowed access. Allow domain to attach to virt TUN devices Domain allowed access. Read virt config files. Domain allowed access. manage virt config files. Domain allowed access. Allow domain to search virt image files Domain to not audit. Allow domain to search virt image direcories Domain allowed access. Allow domain to manage virt image files Domain to not audit. Allow domain to write virt image files Domain to not audit. Read virt PID files. Domain allowed access. Read virt PID lnk files. Domain allowed access. Manage virt pid files. Domain allowed access. Search virt lib directories. Domain allowed access. Read virt lib files. Domain allowed access. Dontaudit inherited read virt lib files. Domain to not audit. Create, read, write, and delete virt lib files. Domain allowed access. Allow the specified domain to read virt's log files. Domain allowed access. Allow the specified domain to append virt log files. Domain allowed to transition. Allow domain to manage virt log files Domain to not audit. Allow domain to read virt blk image files Domain allowed access. Allow domain to read virt image files Domain to not audit. Allow domain to read virt image files Domain to not audit. Create, read, write, and delete svirt cache files. Domain allowed access. Allow domain to manage virt image files Domain to not audit. All of the rules required to administrate an virt environment Domain allowed access. Role allowed access. Execute qemu in the svirt domain, and allow the specified role the svirt domain. Domain allowed access The role to be allowed the svirt domain. Do not audit attempts to write virt daemon unnamed pipes. Domain allowed access. Send a sigkill to virtual machines Domain allowed access. Send a sigkill to virtd daemon Domain allowed access. Send a signal to virtual machines Domain allowed access. allow domain to read virt tmpf files Domain allowed access dontaudit domain to write virt tmp files Domain allowed access Allow domain to write virt tmp sock files Domain allowed access Execute Sandbox Files Domain allowed access. Manage Sandbox Files Domain allowed access. Relabel Sandbox File systems Domain allowed access. Mounton Sandbox Files Domain allowed access. Connect to virt over a unix domain stream socket. Domain allowed access.

Allow virt to use serial/parallell communication ports

Allow virt to read fuse files

Allow virt to manage nfs files

Allow virt to manage cifs files

Allow virt to manage device configuration, (pci)

Allow confined virtual guests to interact with the sanlock

Allow virtual machine to interact with the xserver

Allow virt to use usb devices

Allow confined virtual guests to use executable memory and executable stack

W3C Markup Validator Software watchdog. All of the rules required to administrate an watchdog environment. Domain allowed access. Role allowed access. policy for wdmd Execute a domain transition to run wdmd. Domain allowed access. Execute wdmd server in the wdmd domain. The type of the process performing this action. All of the rules required to administrate an wdmd environment Domain allowed access. Role allowed access. Connect to wdmd over an unix stream socket. Domain allowed access. Allow the specified domain to read/write wdmd's tmpfs files. Domain allowed access. Allow the specified domain to read/write wdmd's tmpfs files. Domain allowed access. X Windows Font Server Read a X font server named socket. Domain allowed access. Connect to a X font server over a unix domain stream socket. Domain allowed access. Allow the specified domain to execute xfs in the caller domain. Domain allowed access. X print server X Windows Server Rules required for using the X Windows server and environment, for restricted users. Role allowed access. Domain allowed access. Rules required for using the X Windows server and environment. Role allowed access. Domain allowed access. Create sessions on the X server, with read-only access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create sessions on the X server, with read and write access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create non-drawing client sessions on an X server. Domain allowed access. Create full client sessions on a user X server. Domain allowed access. The type of the domain SYSV tmpfs files. Read user fonts, user font configuration, and manage the user font cache.

Read user fonts, user font configuration, and manage the user font cache.

This is a templated interface, and should only be called from a per-userdomain template.

Domain allowed access.
Transition to the Xauthority domain. Domain allowed access. Allow exec of Xauthority program.. Domain allowed to transition. Dontaudit exec of Xauthority program. Domain allowed access. Create a Xauthority file in the user home directory. Domain allowed access. Read all users fonts, user font configurations, and manage all users font caches. Domain allowed access. Read all users .Xauthority. Domain allowed access. Set the attributes of the X windows console named pipes. Domain allowed access. Read and write the X windows console named pipe. Domain allowed access. Use file descriptors for xdm. Domain allowed access. Do not audit attempts to inherit XDM file descriptors. Domain to not audit. Read and write XDM unnamed pipes. Domain allowed access. Do not audit attempts to read and write XDM unnamed pipes. Domain to not audit. Connect to XDM over a unix domain stream socket. Domain allowed access. Read xdm-writable configuration files. Domain allowed access. Set the attributes of XDM temporary directories. Domain allowed access. Create a named socket in a XDM temporary directory. Domain allowed access. Read XDM pid files. Domain allowed access. Dontaudit Read XDM pid files. Domain allowed access. Read XDM var lib files. Domain allowed access. Make an X session script an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Execute an X session in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

Execute an Xsession in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the shell process.
Get the attributes of X server logs. Domain allowed access. Do not audit attempts to write the X server log files. Domain to not audit Do not audit attempts to write the X server log files. Domain to not audit Read X keyboard extension libraries. Domain to not audit Read xdm config files. Domain to not audit Manage xdm config files. Domain to not audit Read xdm temporary files. Domain to not audit Do not audit attempts to read xdm temporary files. Domain to not audit Read write xdm temporary files. Domain to not audit Create, read, write, and delete xdm temporary files. Domain to not audit dontaudit getattr xdm temporary named sockets. Domain to not audit Execute the X server in the X server domain. Domain allowed access. Signal X servers Domain to not audit Kill X servers Domain to not audit Read and write X server Sys V Shared memory segments. Domain allowed access. Do not audit attempts to read and write to X server sockets. Domain to not audit Do not audit attempts to read and write X server unix domain stream sockets. Domain allowed access. Connect to the X server over a unix domain stream socket. Domain allowed access. Dontaudit attempts to connect to xserver over an unix stream socket. Domain to not audit. Read X server temporary files. Domain to not audit Interface to provide X object permissions on a given X server to an X client domain. Gives the domain permission to read the virtual core keyboard and virtual core pointer devices. Domain allowed access. Interface to provide X object permissions on a given X server to an X client domain. Gives the domain complete control over the display. Domain allowed access. Dontaudit append to .xsession-errors file Domain to not audit append to .xsession-errors file Domain to not audit Manage the xdm_spool files Domain allowed access. Send and receive messages from xdm over dbus. Domain allowed access. Read xserver files created in /var/run Domain allowed access. Execute xserver files created in /var/run Domain allowed access. Write xserver files created in /var/run Domain allowed access. Allow append the xdm log files. Domain to not audit Read user homedir fonts. Domain allowed access. Search XDM var lib dirs. Domain allowed access. Make an X executable an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Execute xsever in the xserver domain, and allow the specified role the xserver domain. The type of the process performing this action. The role to be allowed the xserver domain. Execute xsever in the xserver domain, and allow the specified role the xserver domain. The type of the process performing this action. The role to be allowed the xserver domain. Read user homedir fonts. Domain allowed access.

Allows clients to write to the X server shared memory segments.

Allows XServer to execute writable memory

Allows xdm to execute bootloader

Allow xdm logins as sysadm

Support X userspace object manager

Allow regular users direct dri device access

Distributed infrastructure monitoring Execute a domain transition to run zabbix. Domain allowed to transition. Allow connectivity to the zabbix server Domain allowed access. Allow the specified domain to read zabbix's log files. Domain allowed access. Allow the specified domain to append zabbix log files. Domain allowed access. Read zabbix PID files. Domain allowed access. Allow the specified domain to read zabbix's log files. Domain allowed access. Read zabbix PID files. Domain allowed access. Allow connectivity to a zabbix agent Domain allowed access. All of the rules required to administrate an zabbix environment Domain allowed access. The role to be allowed to manage the zabbix domain.

Determine whether zabbix can connect to all TCP ports

Zarafa collaboration platform. Allow the specified domain to search zarafa configuration dirs. Domain allowed access. Execute a domain transition to run zarafa_deliver. Domain allowed to transition. Read zarafa_deliver executable. Domain allowed to transition. Execute a domain transition to run zarafa_server. Domain allowed to transition. Connect to zarafa-server unix domain stream socket. Domain allowed access. Allow the specified domain to manage zarafa /var/lib files. Domain allowed access. Allow the specified domain to manage zarafa /var/lib files. Domain allowed access. Zebra border gateway protocol network routing service Read the configuration files for zebra. Domain allowed access. Connect to zebra over an unix stream socket. Domain allowed access. All of the rules required to administrate an zebra environment Domain allowed access. The role to be allowed to manage the zebra domain.

Allow zebra daemon to write it configuration files

policy for z/OS Remote-services Audit dispatcher plugin Execute a domain transition to run audispd-zos-remote. Domain allowed to transition. Allow specified type and role to transition and run in the zos_remote_t domain. Allow specified type to use zos_remote_t terminal. Domain allowed access The role to be allowed the zos_remote domain.