?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for system services, like cron, and network services,
like sshd.
ABRT - automated bug-reporting tool
Execute abrt in the abrt domain.
Domain allowed to transition.
Execute abrt in the caller domain.
Domain allowed access.
Send a null signal to abrt.
Domain allowed access.
Allow the domain to read abrt state files in /proc.
Domain allowed access.
Connect to abrt over an unix stream socket.
Domain allowed access.
Send and receive messages from
abrt over dbus.
Domain allowed access.
Execute abrt-helper in the abrt-helper domain.
Domain allowed to transition.
Execute abrt helper in the abrt_helper domain, and
allow the specified role the abrt_helper domain.
Domain allowed to transition.
Role allowed access.
Read abrt cache
Domain allowed access.
Append abrt cache
Domain allowed access.
Manage abrt cache
Domain allowed access.
Read abrt configuration file.
Domain allowed access.
Read abrt logs.
Domain allowed access.
Read abrt PID files.
Domain allowed access.
Create, read, write, and delete abrt PID files.
Domain allowed access.
Read and write abrt fifo files.
Domain allowed access.
All of the rules required to administrate
an abrt environment
Domain allowed access.
The role to be allowed to manage the abrt domain.
Execute abrt-retrace in the abrt-retrace domain.
Domain allowed to transition.
Manage abrt retrace server cache
Domain allowed access.
Read abrt retrace server cache
Domain allowed access.
Read abrt retrace server cache
Domain allowed access.
Allow ABRT to modify public files
used for public file transfer services.
Allow ABRT to run in abrt_handle_event_t domain
to handle ABRT event scripts
Andrew Filesystem server
Execute a domain transition to run the
afs client.
Domain allowed to transition.
Read and write afs client UDP sockets.
Domain allowed access.
read/write afs cache files
Domain allowed to transition.
Execute afs server in the afs domain.
The type of the process performing this action.
All of the rules required to administrate
an afs environment
Domain allowed access.
The role to be allowed to manage the afs domain.
Automatic IPv6 Connectivity Client Utility.
Execute a domain transition to run aiccu.
Domain allowed to transition.
Execute aiccu server in the aiccu domain.
Domain allowed to transition.
Read aiccu PID files.
Domain allowed access.
Manage aiccu PID files.
Domain allowed access.
All of the rules required to administrate
an aiccu environment
Domain allowed access.
Role allowed access.
Aide filesystem integrity checker
Execute aide in the aide domain
Domain allowed access.
Execute aide programs in the AIDE domain.
Domain allowed access.
The role to allow the AIDE domain.
All of the rules required to administrate
an aide environment
Domain allowed access.
SELinux policy for Aisexec Cluster Engine
Execute a domain transition to run aisexec.
Domain allowed to transition.
Connect to aisexec over a unix domain
stream socket.
Domain allowed access.
Allow the specified domain to read aisexec's log files.
Domain allowed access.
All of the rules required to administrate
an aisexec environment
Domain allowed access.
The role to be allowed to manage the aisexecd domain.
Daemon that interfaces mail transfer agents and content
checkers, such as virus scanners.
Execute a domain transition to run amavis.
Domain allowed to transition.
Execute amavis server in the amavis domain.
Domain allowed access.
Read amavis spool files.
Domain allowed access.
Manage amavis spool files.
Domain allowed access.
Create objects in the amavis spool directories
with a private type.
Domain allowed access.
Private file type.
Class of the object being created.
Search amavis lib directories.
Domain allowed access.
Read amavis lib files.
Domain allowed access.
Create, read, write, and delete
amavis lib files.
Domain allowed access.
Set the attributes of amavis pid files.
Domain allowed access.
Create of amavis pid files.
Domain allowed access.
Write of amavis pid files.
Domain allowed access.
Write of amavis pid files.
Domain allowed access.
All of the rules required to administrate
an amavis environment
Domain allowed access.
Role allowed access.
Allow amavis to use JIT compiler
SELinux policy for antivirus programs - amavis, clamd, freshclam and clamscan
Creates types and rules for a basic
antivirus domain.
Domain type.
Execute a domain transition to run antivirus program.
Domain allowed to transition.
Execute antivirus program without a transition.
Domain allowed access.
Connect to run antivirus program.
Domain allowed access.
Allow the specified domain to append
to antivirus log files.
Domain allowed access.
Read antivirus configuration files.
Domain allowed access.
Search antivirus db content directories.
Domain allowed access.
Read antivirus db content directories.
Domain allowed access.
Read and write antivirus db content directories.
Domain allowed access.
Manage antivirus db content directories.
Domain allowed access.
Manage antivirus pid content.
Domain allowed access.
Read antivirus state files.
Domain allowed access.
All of the rules required to administrate
an antivirus programs environment
Domain allowed access.
The role to be allowed to manage the clamav domain.
Allow antivirus programs to read non security files on a system
Determine whether can antivirus programs use JIT compiler.
Apache web server
Create a set of derived types for apache
web content.
The prefix to be used for deriving type names.
Role access for apache
Role allowed access
User domain for the role
Read httpd user scripts executables.
Domain allowed access.
Read user web content.
Domain allowed access.
Read user web content.
Domain allowed access.
Transition to apache.
Domain allowed access.
Allow the specified domain to execute apache
in the caller domain.
Domain allowed access.
Send a generic signal to apache.
Domain allowed access.
Send a null signal to apache.
Domain allowed access.
Send a SIGCHLD signal to apache.
Domain allowed access.
Inherit and use file descriptors from Apache.
Domain allowed access.
Do not audit attempts to read and write Apache
unnamed pipes.
Domain allowed access.
Do not audit attempts to read and write Apache
unix domain stream sockets.
Domain allowed access.
Do not audit attempts to read and write Apache
TCP sockets.
Domain allowed access.
Create, read, write, and delete all web content.
Domain allowed access.
Allow domain to set the attributes
of the APACHE cache directory.
Domain allowed access.
Allow the specified domain to list
Apache cache.
Domain allowed access.
Allow the specified domain to read
and write Apache cache files.
Domain allowed access.
Allow the specified domain to delete
Apache cache dirs.
Domain allowed access.
Allow the specified domain to delete
Apache cache.
Domain allowed access.
Allow the specified domain to search
apache configuration dirs.
Domain allowed access.
Allow the specified domain to read
apache configuration files.
Domain allowed access.
Allow the specified domain to manage
apache configuration files.
Domain allowed access.
Execute the Apache helper program with
a domain transition.
Domain allowed access.
Execute the Apache helper program with
a domain transition, and allow the
specified role the Apache helper domain.
Domain allowed access.
Role allowed access.
dontaudit attempts to read
apache log files.
Domain allowed access.
Allow the specified domain to read
apache log files.
Domain allowed access.
Allow the specified domain to append
to apache log files.
Domain allowed access.
Do not audit attempts to append to the
Apache logs.
Domain to not audit.
Allow the specified domain to write
to apache log files.
Domain allowed access.
Allow the specified domain to manage
to apache log files.
Domain allowed access.
Do not audit attempts to search Apache
module directories.
Domain to not audit.
Allow the specified domain to list
the contents of the apache modules
directory.
Domain allowed access.
Allow the specified domain to read
the apache modules files.
directory.
Domain allowed access.
Allow the specified domain to execute
apache modules.
Domain allowed access.
Execute a domain transition to run httpd_rotatelogs.
Domain allowed access.
Execute httpd_rotatelogs in the caller domain.
Domain allowed to transition.
Execute httpd system scripts in the caller domain.
Domain allowed to transition.
Allow the specified domain to list
apache system content files.
Domain allowed access.
Allow the specified domain to manage
apache system content files.
Domain allowed access.
Allow the specified domain to manage
apache system content rw files.
Domain allowed access.
Allow the specified domain to delete
apache system content rw files.
Domain allowed access.
Execute all web scripts in the system
script domain.
Domain allowed access.
Do not audit attempts to read and write Apache
system script unix domain stream sockets.
Domain allowed access.
Execute all user scripts in the user
script domain.
Domain allowed access.
Execute all user scripts in the user
script domain. Add user script domains
to the specified role.
Domain allowed access.
The role to be allowed the script domains.
Allow the specified domain to read
apache squirrelmail data.
Domain allowed access.
Allow the specified domain to append
apache squirrelmail data.
Domain allowed access.
Search apache system content.
Domain allowed access.
Getattr apache system content.
Domain to not audit.
Read apache system content.
Domain to not audit.
Search apache system CGI directories.
Domain allowed access.
Create, read, write, and delete all user web content.
Domain allowed access.
Search system script state directory.
Domain to not audit.
Allow the specified domain to read
apache tmp files.
Domain allowed access.
Dontaudit attempts to read and write
apache tmp files.
Domain allowed access.
Dontaudit attempts to write
apache tmp files.
Domain allowed access.
Execute CGI in the specified domain.
Execute CGI in the specified domain.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain run the cgi script in.
Type of the executable to enter the cgi domain.
All of the rules required to administrate an apache environment
Domain allowed access.
Role allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Allow getattr of suexec
The type of the process performing this action.
Read and write of httpd unix stream socket.
Domain allowed access.
Allow any httpd_exec_t to be an entrypoint of this domain
Domain allowed access.
Allow Apache to modify public files
used for public file transfer services. Directories/Files must
be labeled public_rw_content_t.
Allow Apache to use mod_auth_pam
Allow httpd scripts and modules execmem/execstack
Allow httpd processes to manage IPA content
Allow httpd to use built in scripting (usually php)
Allow HTTPD scripts and modules to connect to the network using TCP.
Allow HTTPD scripts and modules to connect to cobbler over the network.
Allow HTTPD scripts and modules to server cobbler files.
Allow HTTPD scripts and modules to connect to databases over the network.
Allow httpd to connect to memcache server
Allow httpd to act as a relay
Allow http daemon to send mail
Allow http daemon to check spam
Allow Apache to communicate with avahi service via dbus
Allow Apache to communicate with sssd service via dbus
Allow httpd cgi support
Allow httpd to act as a FTP server by
listening on the ftp port.
Allow httpd to read home directories
Allow httpd to read user content
Allow httpd daemon to change system limits
Allow HTTPD to run SSI executables in the same domain as system CGI scripts.
Allow Apache to execute tmp content.
Unify HTTPD to communicate with the terminal.
Needed for entering the passphrase for certificates at
the terminal.
Unify HTTPD handling of all content files.
Allow httpd to access openstack ports
Allow httpd to access cifs file systems
Allow httpd to access FUSE file systems
Allow httpd to run gpg in gpg-web domain
Allow httpd to access nfs file systems
Allow apache scripts to write to public content. Directories/Files must be labeled public_rw_content_t.
Allow Apache to run in stickshift mode, not transition to passenger
Allow Apache to run preupgrade
Allow Apache to query NS records
Allow Apache to use mod_auth_ntlm_winbind
APC UPS monitoring daemon
Execute a domain transition to run apcupsd.
Domain allowed to transition.
Execute apcupsd server in the apcupsd domain.
Domain allowed access.
Read apcupsd PID files.
Domain allowed access.
Allow the specified domain to read apcupsd's log files.
Domain allowed access.
Allow the specified domain to append
apcupsd log files.
Domain allowed to transition.
Execute a domain transition to run httpd_apcupsd_cgi_script.
Domain allowed to transition.
All of the rules required to administrate
an apcupsd environment
Domain allowed access.
The role to be allowed to manage the apcupsd domain.
Advanced power management daemon
Execute APM in the apm domain.
Domain allowed access.
Use file descriptors for apmd.
The type of the process performing this action.
Write to apmd unnamed pipes.
The type of the process performing this action.
Read and write to an apm unix stream socket.
Domain allowed access.
Append to apm's log file.
Domain allowed access.
Connect to apmd over an unix stream socket.
Domain allowed access.
Ethernet activity monitor.
Execute arpwatch server in the arpwatch domain.
Domain allowed access.
Search arpwatch's data file directories.
Domain allowed access.
Create arpwatch data files.
Domain allowed access.
Read and write arpwatch temporary files.
Domain allowed access.
Read and write arpwatch temporary files.
Domain allowed access.
Do not audit attempts to read and write
arpwatch packet sockets.
Domain to not audit.
All of the rules required to administrate
an arpwatch environment
Domain allowed access.
The role to be allowed to manage the arpwatch domain.
Asterisk IP telephony server
Execute asterisk in the asterisk domain.
The type of the process performing this action.
Connect to asterisk over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an asterisk environment
Domain allowed access.
The role to be allowed to manage the asterisk domain.
Generate entropy from audio input
Filesystem automounter service.
Execute automount in the automount domain.
Domain allowed access.
Send automount a signal
The type of the process performing this action.
Execute automount in the caller domain.
Domain allowed access.
Allow the domain to read state files in /proc.
Domain to allow access.
Do not audit attempts to file descriptors for automount.
Domain to not audit.
Do not audit attempts to write automount daemon unnamed pipes.
Domain allowed access.
Allow domain to search of automount temporary
directories.
Domain to not audit.
Do not audit attempts to get the attributes
of automount temporary directories.
Domain to not audit.
All of the rules required to administrate
an automount environment
Domain allowed access.
The role to be allowed to manage the automount domain.
mDNS/DNS-SD daemon implementing Apple ZeroConf architecture
Execute avahi server in the avahi domain.
The type of the process performing this action.
Send avahi a signal
The type of the process performing this action.
Send avahi a kill signal.
Domain allowed access.
Send avahi a signull
Domain allowed access.
Send and receive messages from
avahi over dbus.
Domain allowed access.
Connect to avahi using a unix domain stream socket.
Domain allowed access.
Do not audit attempts to search the avahi pid directory.
Domain allowed access.
All of the rules required to administrate
an avahi environment
Domain allowed access.
The role to be allowed to manage the avahi domain.
Cross platform network backup.
Execute bacula admin bacula
admin domain.
Domain allowed to transition.
Execute user interfaces in the
bacula admin domain, and allow the
specified role the bacula admin domain.
Domain allowed to transition.
Role allowed access.
Allow the domain to read bacula store data..
Domain allowed access.
All of the rules required to
administrate an bacula environment.
Domain allowed access.
Role allowed access.
Allow bacula to manage nfs files
Allow bacula to manage cifs files
bcfg2-server daemon which serves configurations to clients based on the data in its repository
Execute bcfg2 in the bcfg2 domain..
Domain allowed to transition.
Execute bcfg2 server in the bcfg2 domain.
Domain allowed access.
Search bcfg2 lib directories.
Domain allowed access.
Read bcfg2 lib files.
Domain allowed access.
Manage bcfg2 lib files.
Domain allowed access.
Manage bcfg2 lib directories.
Domain allowed access.
All of the rules required to administrate
an bcfg2 environment
Domain allowed access.
Role allowed access.
Berkeley internet name domain DNS server.
Execute bind server in the bind domain.
Domain allowed access.
Execute ndc in the ndc domain.
Domain allowed access.
Send generic signals to BIND.
Domain allowed access.
Send null sigals to BIND.
Domain allowed access.
Send BIND the kill signal
Domain allowed access.
Execute ndc in the ndc domain, and
allow the specified role the ndc domain.
Domain allowed access.
The role to be allowed the bind domain.
Execute bind in the named domain.
Domain allowed access.
Read DNSSEC keys.
Domain allowed access.
Read BIND named configuration files.
Domain allowed access.
Write BIND named configuration files.
Domain allowed access.
Create, read, write, and delete
BIND configuration directories.
Domain allowed access.
Search the BIND cache directory.
Domain allowed access.
Create, read, write, and delete
BIND cache files.
Domain allowed access.
Set the attributes of the BIND pid directory.
Domain allowed access.
Read BIND log files.
Domain allowed access.
Set the attributes of the BIND zone directory.
Domain allowed access.
Read BIND zone files.
Domain allowed access.
Manage BIND zone files.
Domain allowed access.
Send and receive datagrams to and from named. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an bind environment
Domain allowed access.
The role to be allowed to manage the bind domain.
Allow BIND to bind apache port.
Allow BIND to write the master zone files.
Generally this is used for dynamic DNS or zone transfers.
Bitlbee service
Read bitlbee configuration files
Domain allowed accesss.
All of the rules required to administrate
an bitlbee environment
Domain allowed access.
The role to be allowed to manage the bitlbee domain.
Bluetooth tools and system services.
Role access for bluetooth
Role allowed access
User domain for the role
Connect to bluetooth over a unix domain
stream socket.
Domain allowed access.
Execute bluetooth in the bluetooth domain.
The type of the process performing this action.
Read bluetooth daemon configuration.
Domain allowed access.
Send and receive messages from
bluetooth over dbus.
Domain allowed access.
dontaudit Send and receive messages from
bluetooth over dbus.
Domain allowed access.
Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated)
The type of the process performing this action.
Execute bluetooth_helper in the bluetooth_helper domain, and
allow the specified role the bluetooth_helper domain. (Deprecated)
The type of the process performing this action.
The role to be allowed the bluetooth_helper domain.
The type of the terminal allow the bluetooth_helper domain to use.
Read bluetooth helper state files.
Domain allowed access.
All of the rules required to administrate
an bluetooth environment
Domain allowed access.
The role to be allowed to manage the bluetooth domain.
policy for boinc
Execute a domain transition to run boinc.
Domain allowed to transition.
Execute boinc server in the boinc domain.
The type of the process performing this action.
Search boinc lib directories.
Domain allowed access.
Read boinc lib files.
Domain allowed access.
Create, read, write, and delete
boinc lib files.
Domain allowed access.
Manage boinc var_lib files.
Domain allowed access.
All of the rules required to administrate
an boinc environment.
Domain allowed access.
Role allowed access.
Bugzilla server
Allow the specified domain to search
bugzilla directories.
Domain allowed access.
Do not audit attempts to read and write
bugzilla script unix domain stream sockets.
Domain allowed access.
policy for cachefilesd
Execute a domain transition to run cachefilesd.
Domain allowed to transition.
Canna - kana-kanji conversion server
Connect to Canna using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an canna environment
Domain allowed access.
The role to be allowed to manage the canna domain.
Cluster Configuration System
Execute a domain transition to run ccs.
Domain allowed to transition.
Connect to ccs over an unix stream socket.
Domain allowed access.
Read cluster configuration files.
Domain allowed access.
Manage cluster configuration files.
Domain allowed access.
Certmaster SSL certificate distribution service
Execute a domain transition to run certmaster.
Domain allowed to transition.
Execute certmaster in the caller domain.
Domain allowed access.
read certmaster logs.
Domain allowed access.
Append to certmaster logs.
Domain allowed access.
Create, read, write, and delete
certmaster logs.
Domain allowed access.
All of the rules required to administrate
an snort environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Certificate status monitor and PKI enrollment client
Execute a domain transition to run certmonger.
Domain allowed to transition.
Execute certmonger server in the certmonger domain.
The type of the process performing this action.
Read certmonger PID files.
Domain allowed access.
Manage certmonger var_run files.
Domain allowed access.
Search certmonger lib directories.
Domain allowed access.
Read certmonger lib files.
Domain allowed access.
Create, read, write, and delete
certmonger lib files.
Domain allowed access.
Manage certmonger var_lib files.
Domain allowed access.
Dontaudit certmonger leaked files descriptors.
Domain allowed access.
Send and receive messages from
certmonger over dbus.
Domain allowed access.
All of the rules required to administrate
an certmonger environment
Domain allowed access.
Role allowed access.
policy for cfengine
Creates types and rules for a basic
cfengine init daemon domain.
Prefix for the domain.
Transition to cfengine.
Domain allowed to transition.
Search cfengine lib files.
Domain allowed access.
Read cfengine lib files.
Domain allowed access.
Allow the specified domain to read cfengine's log files.
Domain allowed access.
Allow the specified domain to append cfengine's log files.
Domain allowed access.
Dontaudit the specified domain to write cfengine's log files.
Domain allowed access.
policy for cgdcbxd
Execute cgdcbxd in the cgdcbxd domin.
Domain allowed to transition.
Read cgdcbxd PID files.
Domain allowed access.
All of the rules required to administrate
an cgdcbxd environment
Domain allowed access.
libcg is a library that abstracts the control group file system in Linux.
Execute a domain transition to run
CG config parser.
Domain allowed to transition.
Execute a domain transition to run
CG config parser.
Domain allowed to transition.
Execute a domain transition to run
CG rules engine daemon.
Domain allowed to transition.
Execute a domain transition to run
CG rules engine daemon.
domain.
Domain allowed to transition.
Connect to CG rules engine daemon
over unix stream sockets.
Domain allowed access.
All of the rules required to administrate
an cgroup environment.
Domain allowed access.
Role allowed access.
Chrony NTP background daemon
Execute chronyd in the chronyd domain.
Domain allowed access.
Execute chronyd server in the chronyd domain.
Domain allowed access.
Execute chronyd
Domain allowed access.
Read chronyd logs.
Domain allowed access.
Read and write chronyd shared memory.
Domain allowed access.
Read chronyd keys files.
Domain allowed access.
Append chronyd keys files.
Domain allowed access.
All of the rules required to administrate
an chronyd environment
Domain allowed access.
The role to be allowed to manage the chronyd domain.
openstack-cinder
Manage cinder lib files.
Domain allowed access.
Creates types and rules for a basic
openstack-cinder systemd daemon domain.
Prefix for the domain.
Encrypted tunnel daemon
ClamAV Virus Scanner
Execute a domain transition to run clamd.
Domain allowed to transition.
Connect to run clamd.
Domain allowed to connect.
Allow the specified domain to append
to clamav log files.
Domain allowed access.
Read clamav configuration files.
Domain allowed access.
Search clamav libraries directories.
Domain allowed access.
Read clamd state files.
Domain allowed access.
Execute a domain transition to run clamscan.
Domain allowed access.
Execute clamscan without a transition.
Domain allowed access.
All of the rules required to administrate
an clamav environment
Domain allowed access.
The role to be allowed to manage the clamav domain.
Allow clamscan to non security files on a system
Allow clamd to use JIT compiler
Clockspeed simple network time protocol client
Execute clockspeed utilities in the clockspeed_cli domain.
Domain allowed access.
Allow the specified role the clockspeed_cli domain.
Domain allowed access.
The role to be allowed the clockspeed_cli domain.
clogd - clustered mirror log server
Execute a domain transition to run clogd.
Domain allowed to transition.
Connect to clogd over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to clogd semaphores.
Domain allowed access.
Read and write to group shared memory.
The type of the process performing this action.
cloudform policy
Creates types and rules for a basic
cloudform daemon domain.
Prefix for the domain.
Execute mongod in the caller domain.
Domain allowed access.
policy for cmirrord
Execute a domain transition to run cmirrord.
Domain allowed to transition.
Execute cmirrord server in the cmirrord domain.
The type of the process performing this action.
Read cmirrord PID files.
Domain allowed access.
Read and write to cmirrord shared memory.
The type of the process performing this action.
All of the rules required to administrate
an cmirrord environment
Domain allowed access.
Role allowed access.
Cobbler installation server.
Cobbler is a Linux installation server that allows for
rapid setup of network installation environments. It
glues together and automates many associated Linux
tasks so you do not have to hop between lots of various
commands and applications when rolling out new systems,
and, in some cases, changing existing ones.
Execute a domain transition to run cobblerd.
Domain allowed to transition.
Execute cobblerd server in the cobblerd domain.
Domain allowed to transition.
List Cobbler configuration.
Domain allowed access.
Read Cobbler configuration files.
Domain to not audit.
Search cobbler dirs in /var/lib
Domain allowed access.
Read cobbler files in /var/lib
Domain allowed access.
Manage cobbler files in /var/lib
Domain allowed access.
Do not audit attempts to read and write
Cobbler log files (leaked fd).
Domain to not audit.
All of the rules required to administrate
an cobblerd environment
Domain allowed access.
Role allowed access.
Allow Cobbler to modify public files
used for public file transfer services.
Allow Cobbler to connect to the
network using TCP.
Allow Cobbler to access cifs file systems.
Allow Cobbler to access nfs file systems.
Statistics collection daemon for filling RRD files.
Transition to collectd.
Domain allowed to transition.
Execute collectd server in the collectd domain.
Domain allowed access.
Search collectd lib directories.
Domain allowed access.
Read collectd lib files.
Domain allowed access.
Manage collectd lib files.
Domain allowed access.
Manage collectd lib directories.
Domain allowed access.
All of the rules required to administrate
an collectd environment
Domain allowed access.
Role allowed access.
Determine whether collectd can connect
to the network using TCP.
Comsat, a biff server.
policy for condor
Creates types and rules for a basic
condor init daemon domain.
Prefix for the domain.
Transition to condor.
Domain allowed to transition.
Read condor's log files.
Domain allowed access.
Append to condor log files.
Domain allowed access.
Manage condor log files
Domain allowed access.
Search condor lib directories.
Domain allowed access.
Read condor lib files.
Domain allowed access.
Read condor lib files.
Domain allowed access.
Manage condor lib files.
Domain allowed access.
Manage condor lib directories.
Domain allowed access.
Read condor PID files.
Domain allowed access.
Read and write condor_startd server TCP sockets.
Domain allowed access.
Read and write condor_schedd server TCP sockets.
Domain allowed access.
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
The process type entered by condor_startd.
The executable type for the entrypoint.
Range for the domain.
Allows to start userlandprocesses
by transitioning to the specified domain.
The process type entered by condor_startd.
The executable type for the entrypoint.
All of the rules required to administrate
an condor environment
Domain allowed access.
Allow codnor domain to connect to the network using TCP.
Conman is a program for connecting to remote consoles being managed by conmand
Execute conman in the conman domin.
Domain allowed to transition.
Read conman's log files.
Domain allowed access.
Append to conman log files.
Domain allowed access.
Manage conman log files
Domain allowed access.
Framework for facilitating multiple user sessions on desktops.
Execute a domain transition to run consolekit.
Domain allowed to transition.
Send and receive messages from
consolekit over dbus.
Domain allowed access.
Read consolekit log files.
Domain allowed access.
Dontaudit attempts to read consolekit log files.
Domain to not audit.
Manage consolekit log files.
Domain allowed access.
Read consolekit PID files.
Domain allowed access.
Dontaudit attempts to connect to consolekit
over an unix stream socket.
Domain allowed access.
SELinux policy for Corosync Cluster Engine
Execute a domain transition to run corosync.
Domain allowed to transition.
Execute a domain transition to run corosync.
Domain allowed to transition.
Execute corosync in the caller domain.
Domain allowed to transition.
Connect to corosync over a unix domain
stream socket.
Domain allowed access.
Allow the specified domain to read corosync's log files.
Domain allowed access.
Allow the specified domain to read/write corosync's tmpfs files.
Domain allowed access.
All of the rules required to administrate
an corosync environment
Domain allowed access.
The role to be allowed to manage the corosyncd domain.
Courier IMAP and POP3 email servers
Template for creating courier server processes.
Prefix name of the server process.
Execute the courier authentication daemon with
a domain transition.
Domain allowed access.
Connect to courier-authdaemon over an unix stream socket.
Domain allowed access.
Execute the courier POP3 and IMAP server with
a domain transition.
Domain allowed access.
Read courier config files
Domain allowed access.
Create, read, write, and delete courier
spool directories.
Domain allowed access.
Create, read, write, and delete courier
spool files.
Domain allowed access.
Read courier spool files.
Domain allowed access.
Read and write to courier spool pipes.
Domain to not audit.
Services for loading CPU microcode and CPU frequency scaling.
CPUcontrol stub interface. No access allowed.
Domain allowed access.
Periodic execution of scheduled commands.
The common rules for a crontab domain.
The prefix of the user domain (e.g., user
is the prefix for user_t).
Role access for cron
Role allowed access
User domain for the role
Role access for unconfined cronjobs
Role allowed access
User domain for the role
Role access for cron
Role allowed access
User domain for the role
Make the specified program domain accessable
from the system cron jobs.
The type of the process to transition to.
The type of the file used as an entrypoint to this domain.
Execute cron in the cron system domain.
Domain allowed access.
Execute crond_exec_t
Domain allowed access.
Execute crond server in the nscd domain.
The type of the process performing this action.
Inherit and use a file descriptor
from the cron daemon.
Domain allowed access.
Send a SIGCHLD signal to the cron daemon.
Domain allowed access.
Read a cron daemon unnamed pipe.
Domain allowed access.
Do not audit attempts to write cron daemon unnamed pipes.
Domain allowed access.
Read and write a cron daemon unnamed pipe.
Domain allowed access.
Read and write inherited user spool files.
Domain allowed access.
Read and write inherited spool files.
Domain allowed access.
Read, and write cron daemon TCP sockets.
Domain allowed access.
Dontaudit Read, and write cron daemon TCP sockets.
Domain allowed access.
Search the directory containing user cron tables.
The type of the process to performing this action.
Manage pid files used by cron
Domain allowed access.
Execute anacron in the cron system domain.
Domain allowed access.
Inherit and use a file descriptor
from system cron jobs.
Domain allowed access.
Write a system cron job unnamed pipe.
Domain allowed access.
Read and write a system cron job unnamed pipe.
Domain allowed access.
Allow read/write unix stream sockets from the system cron jobs.
Domain allowed access.
Read temporary files from the system cron jobs.
Domain allowed access.
Do not audit attempts to append temporary
files from the system cron jobs.
Domain to not audit.
Do not audit attempts to write temporary
files from the system cron jobs.
Domain to not audit.
Read temporary files from the system cron jobs.
Domain allowed access.
Manage files from the system cron jobs.
Domain allowed access.
Allow system cron jobs to relabel filesystem
for restoring file contexts.
Enable extra rules in the cron domain
to support fcron.
policy for ctdbd
Transition to ctdbd.
Domain allowed to transition.
Execute ctdbd server in the ctdbd domain.
Domain allowed access.
Read ctdbd's log files.
Domain allowed access.
Append to ctdbd log files.
Domain allowed to transition.
Manage ctdbd log files
Domain to not audit.
Search ctdbd lib directories.
Domain allowed access.
Read ctdbd lib files.
Domain allowed access.
Manage ctdbd lib files.
Domain allowed access.
Manage ctdbd lib directories.
Domain allowed access.
Read ctdbd PID files.
Domain allowed access.
Connect to ctdbd over an unix stream socket.
Domain allowed access.
Allow domain to signal ctdbd.
Domain to not audit.
Allow domain to send SIGCHLD to ctdbd.
Domain to not audit.
All of the rules required to administrate
an ctdbd environment
Domain allowed access.
Role allowed access.
Common UNIX printing system
Setup cups to transtion to the cups backend domain
Domain allowed access.
Domain allowed access.
Execute cups in the cups domain.
The type of the process performing this action.
Connect to cupsd over an unix domain stream socket.
Domain allowed access.
Connect to cups over TCP. (Deprecated)
Domain allowed access.
Send and receive messages from
cups over dbus.
Domain allowed access.
Read cups PID files.
Domain allowed access.
Execute cups_config in the cups_config domain.
The type of the process performing this action.
Send generic signals to the cups
configuration daemon.
Domain allowed access.
Send and receive messages from
cupsd_config over dbus.
Domain allowed access.
Read cups configuration files.
Domain allowed access.
Read cups-writable configuration files.
Domain allowed access.
Read cups log files.
Domain allowed access.
Append cups log files.
Domain allowed access.
Write cups log files.
Domain allowed access.
Connect to ptal over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an cups environment
Domain allowed access.
The role to be allowed to manage the cups domain.
Concurrent versions system
Read the CVS data and metadata.
Domain allowed access.
Allow the specified domain to execute cvs
in the caller domain.
Domain allowed access.
Dontaudit Attempts to list the CVS data and metadata.
Domain to not audit.
All of the rules required to administrate
an cvs environment
Domain allowed access.
The role to be allowed to manage the cvs domain.
Allow cvs daemon to read shadow
Cyphesis WorldForge game server
Execute a domain transition to run cyphesis.
Domain allowed to transition.
Cyrus is an IMAP service intended to be run on sealed servers
Allow caller to create, read, write,
and delete cyrus data files.
Domain allowed access.
Allow write cyrus data files.
Domain allowed access.
Connect to Cyrus using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an cyrus environment
Domain allowed access.
The role to be allowed to manage the cyrus domain.
Dante msproxy and socks4/5 proxy server
Dictionary server for the SKK Japanese input method system.
Desktop messaging bus
DBUS stub interface. No access allowed.
Domain allowed access
Role access for dbus
The prefix of the user role (e.g., user
is the prefix for user_r).
Role allowed access
User domain for the role
Template for creating connections to
the system DBUS.
The type of the domain.
Template for creating connections to
a user DBUS.
The type of the domain.
Send a message the session DBUS.
Domain allowed access.
Read dbus configuration.
Domain allowed access.
Connect to the system DBUS
for service (acquire_svc).
Domain allowed access.
Connect to the system DBUS
for service (acquire_svc).
Domain allowed access.
Send a message on the system DBUS.
Domain allowed access.
Allow unconfined access to the system DBUS.
Domain allowed access.
Allow a application domain to be started
by the session dbus.
Type to be used as a domain.
Type of the program to be used as an
entry point to this domain.
Create a domain for processes
which can be started by the system dbus
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Do not audit attempts to send dbus
messages to system bus types.
Domain to not audit.
Allow attempts to send dbus
messages to system bus types.
Domain to not audit.
Dontaudit Read, and write system dbus TCP sockets.
Domain allowed access.
Allow unconfined access to the system DBUS.
Domain allowed access.
Create, read, write, and delete
system dbus lib files.
Domain allowed access.
Read system dbus lib files.
Domain allowed access.
Distributed checksum clearinghouse spam filtering
Execute cdcc in the cdcc domain.
Domain allowed access.
Execute cdcc in the cdcc domain, and
allow the specified role the cdcc domain.
Domain allowed access.
The role to be allowed the cdcc domain.
Execute dcc_client in the dcc_client domain.
Domain allowed access.
Send a signal to the dcc_client.
Domain allowed access.
Execute dcc_client in the dcc_client domain, and
allow the specified role the dcc_client domain.
Domain allowed access.
The role to be allowed the dcc_client domain.
Execute dbclean in the dcc_dbclean domain.
Domain allowed access.
Execute dbclean in the dcc_dbclean domain, and
allow the specified role the dcc_dbclean domain.
Domain allowed access.
The role to be allowed the dcc_dbclean domain.
Connect to dccifd over a unix domain stream socket.
Domain allowed access.
Update dynamic IP address at DynDNS.org.
Execute ddclient in the ddclient domain.
Domain allowed to transition.
Execute ddclient in the ddclient
domain, and allow the specified
role the ddclient domain.
Domain allowed to transition.
Role allowed access.
All of the rules required to
administrate an ddclient environment.
Domain allowed access.
Role allowed access.
Deny Hosts.
DenyHosts is a script intended to be run by Linux
system administrators to help thwart SSH server attacks
(also known as dictionary based attacks and brute force
attacks).
Execute a domain transition to run denyhosts.
Domain allowed to transition.
Execute denyhost server in the denyhost domain.
The type of the process performing this action.
All of the rules required to administrate
an denyhosts environment.
Domain allowed access.
Role allowed access.
Devicekit modular hardware abstraction layer
Execute a domain transition to run devicekit.
Domain allowed to transition.
Send to devicekit over a unix domain
datagram socket.
Domain allowed access.
Send and receive messages from
devicekit over dbus.
Domain allowed access.
Send and receive messages from
devicekit disk over dbus.
Domain allowed access.
Send signal devicekit power
Domain allowed access.
Send and receive messages from
devicekit power over dbus.
Domain allowed access.
Read devicekit PID files.
Domain allowed access.
Manage devicekit var_run files.
Domain allowed access.
Dontaudit Send and receive messages from
devicekit disk over dbus.
Domain to not audit.
Manage devicekit PID files.
Domain allowed access.
All of the rules required to administrate
an devicekit environment
Domain allowed access.
Dynamic host configuration protocol (DHCP) server
Transition to dhcpd.
Domain allowed access.
Set the attributes of the DCHP
server state files.
Domain allowed access.
Execute dhcp server in the dhcp domain.
The type of the process performing this action.
All of the rules required to administrate
an dhcp environment
Domain allowed access.
The role to be allowed to manage the dhcp domain.
Dictionary daemon
Use dictionary services by connecting
over TCP. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an dictd environment
Domain allowed access.
The role to be allowed to manage the dictd domain.
Administration Server for Directory Server, dirsrv-admin.
Exec dirsrv-admin programs.
Domain allowed access.
Exec cgi programs.
Domain allowed access.
Manage dirsrv-adminserver configuration files.
Domain allowed access.
Manage dirsrv-adminserver configuration files.
Domain allowed access.
Read dirsrv-adminserver tmp files.
Domain allowed access.
Write dirsrv-adminserver tmp files.
Domain allowed access.
Manage dirsrv-adminserver tmp files.
Domain allowed access.
Execute admin cgi programs in caller domain.
Domain allowed access.
policy for dirsrv
Execute a domain transition to run dirsrv.
Domain allowed to transition.
Allow caller to signal dirsrv.
Domain allowed access.
Send a null signal to dirsrv.
Domain allowed access.
Allow a domain to manage dirsrv logs.
Domain allowed access.
Allow a domain to manage dirsrv lock.
Domain allowed access.
Allow a domain to manage dirsrv logs.
Domain allowed access.
Allow a domain to manage dirsrv /var/lib files.
Domain allowed access.
Allow a domain to manage dirsrv /var/run files.
Domain allowed access.
Allow a domain to create dirsrv pid directories.
Domain allowed access.
Allow a domain to read dirsrv /var/run files.
Domain allowed access.
Manage dirsrv configuration files.
Domain allowed access.
Read dirsrv share files.
Domain allowed access.
Connect to dirsrv over an unix stream socket.
Domain allowed access.
Distributed compiler daemon
small and secure DNS daemon
Create a set of derived types for djbdns
components that are directly supervised by daemontools.
The prefix to be used for deriving type names.
Allow search the djbdns-tinydns key ring.
Domain allowed access.
Allow link to the djbdns-tinydns key ring.
Domain allowed access.
DomainKeys Identified Mail milter.
dnsmasq DNS forwarder and DHCP server
Execute dnsmasq server in the dnsmasq domain.
The type of the process performing this action.
Execute dnsmasq server in the caller domain.
Domain allowed to transition.
Execute the dnsmasq init script in the init script domain.
Domain allowed access.
Send dnsmasq a signal
The type of the process performing this action.
Send dnsmasq a signull
Domain allowed access.
Send dnsmasq a kill signal.
Domain allowed access.
Read dnsmasq config files.
Domain allowed.
Write to dnsmasq config files.
Domain allowed.
Delete dnsmasq pid files
Domain allowed access.
Read dnsmasq pid files
Domain allowed access.
Manage dnsmasq pid files
Domain allowed access.
Create dnsmasq pid dirs
Domain allowed access.
All of the rules required to administrate
an dnsmasq environment
Domain allowed access.
The role to be allowed to manage the dnsmasq domain.
Dovecot POP and IMAP mail server
Connect to dovecot unix domain stream socket.
Domain allowed access.
Connect to dovecot auth unix domain stream socket.
Domain allowed access.
Execute dovecot_deliver in the dovecot_deliver domain.
Domain allowed access.
Create, read, write, and delete the dovecot spool files.
Domain allowed access.
Do not audit attempts to delete dovecot lib files.
Domain to not audit.
Dontaudit attempts to read and write
dovecot tmp files.
Domain to not audit.
Allow attempts to write inherited
dovecot tmp files.
Domain to not audit.
Allow attempts to read and write to
sendmail unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an dovecot environment
Domain allowed access.
The role to be allowed to manage the dovecot domain.
policy for drbd
Execute a domain transition to run drbd.
Domain allowed access.
Search drbd lib directories.
Domain allowed access.
Read drbd lib files.
Domain allowed access.
Create, read, write, and delete
drbd lib files.
Domain allowed access.
Manage drbd lib dirs files.
Domain allowed access.
All of the rules required to administrate
an drbd environment
Domain allowed access.
policy for dspam
Execute a domain transition to run dspam.
Domain allowed access.
Execute dspam server in the dspam domain.
The type of the process performing this action.
Allow the specified domain to read dspam's log files.
Domain allowed access.
Allow the specified domain to append
dspam log files.
Domain allowed to transition.
Allow domain to manage dspam log files
Domain to not audit.
Search dspam lib directories.
Domain allowed access.
Read dspam lib files.
Domain allowed access.
Create, read, write, and delete
dspam lib files.
Domain allowed access.
Manage dspam lib dirs files.
Domain allowed access.
Read dspam PID files.
Domain allowed access.
Connect to DSPAM using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an dspam environment
Domain allowed access.
Role allowed access.
Exim mail transfer agent
Execute a domain transition to run exim.
Domain allowed to transition.
Execute exim in the exim domain.
The type of the process performing this action.
Do not audit attempts to read,
exim tmp files
Domain to not audit.
Allow domain to read, exim tmp files
Domain to not audit.
Read exim PID files.
Domain allowed access.
Allow the specified domain to read exim's log files.
Domain allowed access.
Allow the specified domain to append
exim log files.
Domain allowed to transition.
Allow the specified domain to manage exim's log files.
Domain allowed access.
Create, read, write, and delete
exim spool dirs.
Domain allowed access.
Read exim spool files.
Domain allowed access.
Create, read, write, and delete
exim spool files.
Domain allowed access.
All of the rules required to administrate
an exim environment.
Domain allowed access.
Role allowed access.
Allow exim to connect to databases (postgres, mysql)
Allow exim to read unprivileged user files.
Allow exim to create, read, write, and delete
unprivileged user files.
Update firewall filtering to ban IP addresses with too many password failures.
Execute a domain transition to run fail2ban.
Domain allowed to transition.
Connect to fail2ban over a unix domain
stream socket.
Domain allowed access.
Read and write to an fail2ban unix stream socket.
Domain allowed access.
Read fail2ban lib files.
Domain allowed access.
Allow the specified domain to read fail2ban's log files.
Domain allowed access.
Allow the specified domain to append
fail2ban log files.
Domain allowed to transition.
Read fail2ban PID files.
Domain allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
All of the rules required to administrate
an fail2ban environment
Domain allowed access.
The role to be allowed to manage the fail2ban domain.
Read and write inherited temporary files.
Domain allowed access.
policy for fcoemon
Transition to fcoemon.
Domain allowed to transition.
Read fcoemon PID files.
Domain allowed access.
Send to a fcoemon unix dgram socket.
Domain allowed access.
All of the rules required to administrate
an fcoemon environment
Domain allowed access.
Remote-mail retrieval and forwarding utility
All of the rules required to administrate
an fetchmail environment
Domain allowed access.
Finger user information service.
Execute fingerd in the fingerd domain.
The type of the process performing this action.
Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated)
Domain allowed access.
DBus fingerprint reader service
Execute a domain transition to run fprintd.
Domain allowed to transition.
Send and receive messages from
fprintd over dbus.
Domain allowed access.
Remote-Console (out-of-band) and System Management Software (in-band) based on Intelligent Platform Management Interface specification
Creates types and rules for a basic
freeipmi init daemon domain.
Prefix for the domain.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
File transfer protocol service
Execute a domain transition to run ftpd.
Domain allowed to transition.
Execute ftpd server in the ftpd domain.
The type of the process performing this action.
Use ftp by connecting over TCP. (Deprecated)
Domain allowed access.
Read ftpd etc files
Domain allowed access.
Execute FTP daemon entry point programs.
Domain allowed access.
Read FTP transfer logs
Domain allowed access.
Execute the ftpdctl program in the ftpdctl domain.
Domain allowed access.
Execute the ftpdctl program in the ftpdctl domain.
Domain allowed access.
The role to allow the ftpdctl domain.
Allow domain dyntransition to chroot_user_t domain.
Domain allowed access.
All of the rules required to administrate
an ftp environment
Domain allowed access.
The role to be allowed to manage the ftp domain.
Allow ftp servers to upload files, used for public file
transfer services. Directories must be labeled
public_content_rw_t.
Allow ftp servers to login to local users and
read/write all files on the system, governed by DAC.
Allow ftp servers to use cifs
used for public file transfer services.
Allow ftpd to use ntfs/fusefs volumes.
Allow ftp servers to use nfs
used for public file transfer services.
Allow ftp servers to use connect to mysql database
Allow ftp to read and write files in the user home directories
Determine whether ftpd can bind to all unreserved ports for passive mode.
OpenH.323 Voice-Over-IP Gatekeeper
GIT revision control system.
Role access for Git session.
Role allowed access.
User domain for the role.
Read generic system content files.
Domain allowed access.
Determine whether Git CGI
can search home directories.
Determine whether Git CGI
can access cifs file systems.
Determine whether Git CGI
can access nfs file systems.
Determine whether Git session daemon
can bind TCP sockets to all
unreserved ports.
Determine whether calling user domains
can execute Git daemon in the
git_session_t domain.
Determine whether Git system daemon
can search home directories.
Determine whether Git system daemon
can access cifs file systems.
Determine whether Git system daemon
can access nfs file systems.
policy for glance
Transition to glance registry.
Domain allowed to transition.
Transition to glance api.
Domain allowed to transition.
Read glance's log files.
Domain allowed access.
Append to glance log files.
Domain allowed access.
Manage glance log files
Domain allowed access.
Search glance lib directories.
Domain allowed access.
Read glance lib files.
Domain allowed access.
Manage glance lib files.
Domain allowed access.
Manage glance lib directories.
Domain allowed access.
Read glance PID files.
Domain allowed access.
Manage glance PID files.
Domain allowed access.
All of the rules required to administrate
an glance environment
Domain allowed access.
Role allowed access.
policy for glusterd
Transition to glusterd.
Domain allowed to transition.
Execute glusterd server in the glusterd domain.
Domain allowed access.
Read glusterd's log files.
Domain allowed access.
Append to glusterd log files.
Domain allowed access.
Manage glusterd log files
Domain allowed access.
Read glusterd's config files.
Domain allowed access.
Read and write /var/lib/glusterd files.
Domain allowed access.
Read and write /var/lib/glusterd files.
Domain allowed access.
All of the rules required to administrate
an glusterd environment
Domain allowed access.
Role allowed access.
Manage glusterd PID files.
Domain allowed access.
Allow glusterfsd to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Allow glusterfsd to share any file/directory read only.
Allow glusterfsd to share any file/directory read/write.
Gnome clock handler for setting the time.
Execute a domain transition to run gnomeclock.
Domain allowed to transition.
Execute gnomeclock in the gnomeclock domain, and
allow the specified role the gnomeclock domain.
Domain allowed access
The role to be allowed the gnomeclock domain.
Send and receive messages from
gnomeclock over dbus.
Domain allowed access.
Do not audit send and receive messages from
gnomeclock over dbus.
Domain allowed access.
General Purpose Mouse driver
Connect to GPM over a unix domain
stream socket.
Domain allowed access.
Get the attributes of the GPM
control channel named socket.
Domain allowed access.
Do not audit attempts to get the
attributes of the GPM control channel
named socket.
Domain allowed access.
Set the attributes of the GPM
control channel named socket.
Domain allowed access.
gpsd monitor daemon
Execute a domain transition to run gpsd.
Domain allowed to transition.
Execute gpsd in the gpsd domain, and
allow the specified role the gpsd domain.
Domain allowed access
The role to be allowed the gpsd domain.
Read and write gpsd shared memory.
Domain allowed access.
Hardware abstraction layer
Execute hal in the hal domain.
Domain allowed access.
Get the attributes of a hal process.
Domain allowed access.
Read hal system state
Domain to not audit.
Allow ptrace of hal domain
Domain allowed access.
Allow domain to use file descriptors from hal.
Domain to not audit.
Do not audit attempts to use file descriptors from hal.
Domain to not audit.
Allow attempts to read and write to
hald unnamed pipes.
Domain to not audit.
Do not audit attempts to read and write to
hald unnamed pipes.
Domain to not audit.
Send to hal over a unix domain
datagram socket.
Domain allowed access.
Send to hal over a unix domain
stream socket.
Domain allowed access.
Dontaudit read/write to a hal unix datagram socket.
Domain allowed access.
Send a dbus message to hal.
Domain allowed access.
Send and receive messages from
hal over dbus.
Domain allowed access.
Execute hal mac in the hal mac domain.
Domain allowed access.
Allow attempts to write the hal
log files.
Domain allowed access.
Do not audit attempts to write the hal
log files.
Domain to not audit
Manage hald log files.
Domain allowed access.
Manage hald log files.
Domain allowed access.
Read hald tmp files.
Domain allowed access.
Do not audit attempts to read or write
HAL libraries files
Domain allowed access.
Read hald PID files.
Domain allowed access.
Do not audit attempts to read
hald PID files.
Domain to not audit.
Read/Write hald PID files.
Domain allowed access.
Manage hald PID dirs.
Domain allowed access.
Manage hald PID files.
Domain allowed access.
hddtemp hard disk temperature tool running as a daemon
Execute hddtemp in the hddtemp domain.
Domain allowed access.
Execute hddtemp
Domain allowed access.
Port of Apple Rendezvous multicast DNS
Send generic signals to howl.
Domain allowed access.
policy for hypervkvp
Execute hypervkvpd in the hypervkvp domin.
Domain allowed to transition.
Search hypervkvp lib directories.
Domain allowed access.
Read hypervkvp lib files.
Domain allowed access.
Create, read, write, and delete
hypervkvp lib files.
Domain allowed access.
IIIMF htt server
Use i18n_input over a TCP connection. (Deprecated)
Domain allowed access.
ShoutCast compatible streaming media server
Execute a domain transition to run icecast.
Domain allowed to transition.
Allow domain signal icecast
Domain allowed access.
Execute icecast server in the icecast domain.
Domain allowed access.
Read icecast PID files.
Domain allowed access.
Manage icecast pid files.
Domain allowed access.
Allow the specified domain to read icecast's log files.
Domain allowed access.
Allow the specified domain to append
icecast log files.
Domain allowed access.
Allow domain to manage icecast log files
Domain allow access.
All of the rules required to administrate
an icecast environment
Domain allowed access.
Role allowed access.
Determine whether icecast can listen
on and connect to any TCP port.
Bring up/down ethernet interfaces based on cable detection.
Execute a domain transition to run ifplugd.
Domain allowed to transition.
Send a generic signal to ifplugd
Domain allowed access.
Read ifplugd etc configuration files.
Domain allowed access.
Manage ifplugd etc configuration files.
Domain allowed access.
Read ifplugd PID files.
Domain allowed access.
All of the rules required to administrate
an ifplugd environment
Domain allowed access.
The role to be allowed to manage the ifplugd domain.
iMaze game server
Internet services daemon.
Define the specified domain as a inetd service.
Define the specified domain as a inetd service. The
inetd_service_domain(), inetd_tcp_service_domain(),
or inetd_udp_service_domain() interfaces should be used
instead of this interface, as this interface only provides
the common rules to these three interfaces.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a TCP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a UDP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a TCP and UDP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Inherit and use file descriptors from inetd.
Domain allowed access.
Connect to the inetd service using a TCP connection. (Deprecated)
Domain allowed access.
Run inetd child process in the inet child domain
Domain allowed access.
Send UDP network traffic to inetd. (Deprecated)
The type of the process performing this action.
Read and write inetd TCP sockets.
The type of the process performing this action.
Internet News NNTP server
Allow the specified domain to execute innd
in the caller domain.
Domain allowed access.
Allow the specified domain to execute
inn configuration files in /etc.
Domain allowed access.
Create, read, write, and delete the innd log.
Domain allowed access.
Create, read, write, and delete the innd pid files.
Domain allowed access.
Read innd configuration files.
Domain allowed access.
Read innd news library files.
Domain allowed access.
Read innd news library files.
Domain allowed access.
Send to a innd unix dgram socket.
Domain allowed access.
Execute inn in the inn domain.
Domain allowed access.
All of the rules required to administrate
an inn environment
Domain allowed access.
The role to be allowed to manage the inn domain.
policy for ipmievd
Transition to ipmievd.
Domain allowed to transition.
Execute ipmievd server in the ipmievd domain.
Domain allowed access.
Read ipmievd PID files.
Domain allowed access.
All of the rules required to administrate
an ipmievd environment
Domain allowed access.
Role allowed access.
IRC server
IRQ balancing daemon
Internet Storage Name Service.
All of the rules required to
administrate an isnsd environment.
Domain allowed access.
Role allowed access.
Jabber instant messaging server
Execute a domain transition to run jabberd services
Domain allowed to transition.
Execute a domain transition to run jabberd router service
Domain allowed to transition.
Read jabberd lib files.
Domain allowed access.
Dontaudit inherited read jabberd lib files.
Domain to not audit.
Create, read, write, and delete
jabberd lib files.
Domain allowed access.
All of the rules required to administrate
an jabber environment
Domain allowed access.
The role to be allowed to manage the jabber domain.
keepalived - load-balancing and high-availability service
Execute keepalived in the keepalived domin.
Domain allowed to transition.
MIT Kerberos admin and KDC
This policy supports:
Servers:
Clients:
- kinit
- kdestroy
- klist
- ksu (incomplete)
Execute kadmind in the current domain
Domain allowed access.
Execute a domain transition to run kpropd.
Domain allowed to transition.
Use kerberos services
Domain allowed access.
Read the kerberos configuration file (/etc/krb5.conf).
Domain allowed access.
Do not audit attempts to write the kerberos
configuration file (/etc/krb5.conf).
Domain to not audit.
Read and write the kerberos configuration file (/etc/krb5.conf).
Domain allowed access.
Read the kerberos key table.
Domain allowed access.
Read/Write the kerberos key table.
Domain allowed access.
Create keytab file in /etc
Domain allowed access.
Create a derived type for kerberos keytab
The prefix to be used for deriving type names.
Domain allowed access.
Read the kerberos kdc configuration file (/etc/krb5kdc.conf).
Domain allowed access.
Read the kerberos kdc configuration file (/etc/krb5kdc.conf).
Domain allowed access.
Connect to krb524 service
Domain allowed access.
All of the rules required to administrate
an kerberos environment
Domain allowed access.
The role to be allowed to manage the kerberos domain.
Type transition files created in /tmp
to the krb5_host_rcache type.
Domain allowed access.
read kerberos homedir content (.k5login)
Domain allowed access.
Allow confined applications to run with kerberos.
Service for reporting kernel oopses to kerneloops.org
Execute a domain transition to run kerneloops.
Domain allowed to transition.
Send and receive messages from
kerneloops over dbus.
Domain allowed access.
dontaudit attempts to Send and receive messages from
kerneloops over dbus.
Domain allowed access.
Allow domain to manage kerneloops tmp files
Domain to not audit.
All of the rules required to administrate
an kerneloops environment
Domain allowed access.
The role to be allowed to manage the kerneloops domain.
policy for keystone
Transition to keystone.
Domain allowed to transition.
Read keystone's log files.
Domain allowed access.
Append to keystone log files.
Domain allowed access.
Manage keystone log files
Domain allowed access.
Search keystone lib directories.
Domain allowed access.
Read keystone lib files.
Domain allowed access.
Manage keystone lib files.
Domain allowed access.
Manage keystone lib directories.
Domain allowed access.
All of the rules required to administrate
an keystone environment
Domain allowed access.
Role allowed access.
Kernel Samepage Merging (KSM) Tuning Daemon
Execute a domain transition to run ksmtuned.
Domain allowed to transition.
Execute ksmtuned server in the ksmtuned domain.
Domain allowed access.
All of the rules required to administrate
an ksmtuned environment
Domain allowed access.
Role allowed access.
KDE Talk daemon
Layer 2 Tunneling Protocol daemons.
Transition to l2tpd.
Domain allowed to transition.
Execute l2tpd server in the l2tpd domain.
Domain allowed access.
Send to l2tpd via a unix dgram socket.
Domain allowed access.
Read and write l2tpd sockets.
Domain allowed access.
Read l2tpd PID files.
Domain allowed access.
Connect to l2tpd over a unix domain
stream socket.
Domain allowed access.
Read and write l2tpd unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an l2tpd environment
Domain allowed access.
Role allowed access.
OpenLDAP directory server
Execute OpenLDAP in the ldap domain.
The type of the process performing this action.
Execute OpenLDAP server in the ldap domain.
The type of the process performing this action.
Read the contents of the OpenLDAP
database directories.
Domain allowed access.
Read the contents of the OpenLDAP
database files.
Domain allowed access.
Read the OpenLDAP configuration files.
Domain allowed access.
Use LDAP over TCP connection. (Deprecated)
Domain allowed access.
Connect to slapd over an unix stream socket.
Domain allowed access.
Connect to dirsrv over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an ldap environment
Domain allowed access.
The role to be allowed to manage the ldap domain.
Likewise Active Directory support for UNIX.
Likewise Open is a free, open source application that joins Linux, Unix,
and Mac machines to Microsoft Active Directory to securely authenticate
users with their domain credentials.
The template to define a likewise domain.
This template creates a domain to be used for
a new likewise daemon.
The type of daemon to be used.
Connect to lsassd.
Domain allowed access.
implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux.
Execute domain in the phc2sys domain.
Domain allowed to transition.
Execute domain in the phc2sys domain.
Domain allowed to transition.
Connect to timemaster using a unix
domain stream socket.
Domain allowed access.
Read timemaster conf files.
Domain allowed access.
Read and write timemaster shared memory.
Domain allowed access.
Read and write ptp4l_t shared memory.
Domain allowed access.
Linux infared remote control daemon
Execute a domain transition to run lircd.
Domain allowed to transition.
Connect to lircd over a unix domain
stream socket.
Domain allowed access.
Read lircd etc file
The type of the process performing this action.
All of the rules required to administrate
a lircd environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Intel LLDP Agent.
Transition to lldpad.
Domain allowed to transition.
Send to lldpad with a unix dgram socket.
Domain allowed access.
Recv to lldpad with a unix dgram socket.
Domain allowed access.
All of the rules required to
administrate an lldpad environment.
Domain allowed access.
Role allowed access.
Line printer daemon
Role access for lpd
Role allowed access
User domain for the role
Execute lpd in the lpd domain.
Domain allowed access.
Execute amrecover in the lpd domain, and
allow the specified role the lpd domain.
Domain allowed access.
The role to be allowed the lpd domain.
List the contents of the printer spool directories.
Domain allowed access.
Read the printer spool files.
Domain allowed access.
Create, read, write, and delete printer spool files.
Domain allowed access.
Relabel from and to the spool files.
Domain allowed access.
List the contents of the printer spool directories.
Domain allowed access.
Transition to a user lpr domain.
Domain allowed access.
Allow the specified domain to execute lpr
in the caller domain.
Domain allowed access.
Use lpd server instead of cups
libStorageMgmt plug-in daemon
Execute TEMPLATE in the lsmd domin.
Domain allowed to transition.
Read lsmd PID files.
Domain allowed access.
Determine whether lsmd_plugin can
connect to all TCP ports.
Mailman is for managing electronic mail discussion and e-newsletter lists
The template to define a mailmain domain.
This template creates a domain to be used for
a new mailman daemon.
The type of daemon to be used eg, cgi would give mailman_cgi_
Execute mailman in the mailman domain.
Domain allowed access.
Execute the mailman program in the mailman domain.
Domain allowed to transition.
The role to allow the mailman domain.
Execute mailman CGI scripts in the
mailman CGI domain.
Domain allowed to transition.
Execute mailman in the caller domain.
Domain allowd access.
Send generic signals to the mailman cgi domain.
Domain allowed access.
Allow domain to search data directories.
Domain allowed access.
Allow domain to to read mailman data files.
Domain allowed access.
Allow domain to to create mailman data files
and write the directory.
Domain allowed access.
List the contents of mailman data directories.
Domain allowed access.
Allow read acces to mailman data symbolic links.
Domain allowed access.
Read mailman logs.
Domain allowed access.
Append to mailman logs.
Domain allowed access.
Create, read, write, and delete
mailman logs.
Domain allowed access.
Allow domain to read mailman archive files.
Domain allowed access.
Execute mailman_queue in the mailman_queue domain.
Domain allowed access.
policy for matahari
Creates types and rules for a basic
matahari init daemon domain.
Prefix for the domain.
Search matahari lib directories.
Domain allowed access.
Read matahari lib files.
Domain allowed access.
Create, read, write, and delete
matahari lib files.
Domain allowed access.
Manage matahari lib dirs files.
Domain allowed access.
Read matahari PID files.
Domain allowed access.
Read matahari PID files.
Domain allowed access.
Execute a domain transition to run matahari_hostd.
Domain allowed access.
Execute a domain transition to run matahari_netd.
Domain allowed access.
Execute a domain transition to run matahari_serviced.
Domain allowed access.
All of the rules required to administrate
an matahari environment
Domain allowed access.
Role allowed access.
high-performance memory object caching system
Execute a domain transition to run memcached.
Domain allowed to transition.
Read memcached PID files.
Domain allowed access.
All of the rules required to administrate
an memcached environment
Domain allowed access.
The role to be allowed to manage the memcached domain.
Manage memcached PID files
Domain allowed access.
Connect to memcached over a unix stream socket.
Domain allowed access.
Milter mail filters
Create a set of derived types for various
mail filter applications using the milter interface.
The name to be used for deriving type names.
MTA communication with milter sockets
Domain allowed access.
Allow getattr of milter sockets
Domain allowed access.
Allow setattr of milter dirs
Domain allowed access.
Manage spamassassin milter state
Domain allowed access.
Delete dkim-milter PID files.
Domain allowed access.
Mobile IPv6 and NEMO Basic Support implementation
Execute TEMPLATE in the mip6d domin.
Domain allowed to transition.
policy for mirrormanager
Execute mirrormanager in the mirrormanager domin.
Domain allowed to transition.
Read mirrormanager's log files.
Domain allowed access.
Append to mirrormanager log files.
Domain allowed access.
Manage mirrormanager log files
Domain allowed access.
Search mirrormanager lib directories.
Domain allowed access.
Read mirrormanager lib files.
Domain allowed access.
Manage mirrormanager lib files.
Domain allowed access.
Manage mirrormanager lib directories.
Domain allowed access.
Read mirrormanager PID files.
Domain allowed access.
Manage mirrormanager PID files.
Domain allowed access.
Manage mirrormanager PID sock files.
Domain allowed access.
All of the rules required to administrate
an mirrormanager environment
Domain allowed access.
Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards.
Execute a domain transition to run modemmanager.
Domain allowed to transition.
Send and receive messages from
modemmanager over dbus.
Domain allowed access.
Monopoly daemon
policy for daemon for playing music
Execute a domain transition to run mpd.
Domain allowed to transition.
Execute mpd server in the mpd domain.
Domain allowed access.
Read mpd data files.
Domain allowed access.
Read mpd tmpfs files.
Domain allowed access.
Manage mpd tmpfs files.
The type of the process performing this action.
Manage mpd data files.
Domain allowed access.
Search mpd lib directories.
Domain allowed access.
Read mpd lib files.
Domain allowed access.
Create, read, write, and delete
mpd lib files.
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Manage mpd lib dirs files.
Domain allowed access.
Send and receive messages from
mpd over dbus.
Domain allowed access.
All of the rules required to administrate
an mpd environment
Domain allowed access.
Role allowed access.
Policy common to all email tranfer agents.
MTA stub interface. No access allowed.
Domain allowed access.
Basic mail transfer agent domain template.
This template creates a derived domain which is
a email transfer agent, which sends mail on
behalf of the user.
This is the basic types and rules, common
to the system agent and user agents.
The prefix of the domain (e.g., user
is the prefix for user_t).
Type transition files created in calling dir
to the mail address aliases type.
Domain allowed access.
Directory to transition on.
Role access for mta
Role allowed access
User domain for the role
ALlow domain to read mail content in the homedir
Domain allowed access.
Allow domain to manage mail content in the homedir
Domain allowed access.
Make the specified domain usable for a mail server.
Type to be used as a mail server domain.
Type of the program to be used as an entry point to this domain.
Make the specified type a MTA executable file.
Type to be used as a mail client.
Dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Make the specified type by a system MTA.
Type to be used as a mail client.
Modified mailserver interface for
sendmail daemon use.
A modified MTA mail server interface for
the sendmail program. It's design does
not fit well with policy, and using the
regular interface causes a type_transition
conflict if direct running of init scripts
is enabled.
This interface should most likely only be used
by the sendmail policy.
The type to be used for the mail server.
Make a type a mailserver type used
for sending mail.
Mail server domain type used for sending mail.
Make a type a mailserver type used
for delivering mail to local users.
Mail server domain type used for delivering mail.
Make a type a mailserver type used
for sending mail on behalf of local
users to the local mail spool.
Mail server domain type used for sending local mail.
Send mail from the system.
Domain allowed access.
Send mail client a signal
The type of the process performing this action.
Execute send mail in a specified domain.
Execute send mail in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Send system mail client a signal
Domain allowed access.
Send system mail client a kill signal
Domain allowed access.
Execute sendmail in the caller domain.
Domain allowed access.
Read mail server configuration.
Domain allowed access.
write mail server configuration.
Domain allowed access.
Read mail address aliases.
Domain allowed access.
Create, read, write, and delete mail address aliases.
Domain allowed access.
Type transition files created in /etc
to the mail address aliases type.
Domain allowed access.
Read and write mail aliases.
Domain allowed access.
Do not audit attempts to read and write TCP
sockets of mail delivery domains.
Mail server domain.
Connect to all mail servers over TCP. (Deprecated)
Mail server domain.
Do not audit attempts to read a symlink
in the mail spool.
Domain allowed access.
Get the attributes of mail spool files.
Domain allowed access.
Do not audit attempts to get the attributes
of mail spool files.
Domain to not audit.
Create private objects in the
mail spool directory.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Read and write the mail spool.
Domain allowed access.
Create, read, and write the mail spool.
Domain allowed access.
Delete from the mail spool.
Domain allowed access.
Create, read, write, and delete mail spool files.
Domain allowed access.
Search mail queue dirs.
Domain allowed access.
List the mail queue.
Domain allowed access.
Read the mail queue.
Domain allowed access.
Do not audit attempts to read and
write the mail queue.
Domain to not audit.
Create, read, write, and delete
mail queue files.
Domain allowed access.
Type transition files created in calling dir
to the mail address aliases type.
Domain allowed access.
Directory to transition on.
The object class of the object being created.
Read sendmail binary.
Domain allowed access.
Read and write unix domain stream sockets
of user mail domains.
Domain allowed access.
Send all user mail client a signal
Domain allowed access.
Munin network-wide load graphing (formerly LRRD)
Connect to munin over a unix domain
stream socket.
Domain allowed access.
Read munin configuration files.
Domain allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Append to the munin log.
Domain allowed access.
Search munin library directories.
Domain allowed access.
Do not audit attempts to search
munin library directories.
Domain allowed access.
Create a set of derived types for various
munin plugins,
The name to be used for deriving type names.
All of the rules required to administrate
an munin environment
Domain allowed access.
The role to be allowed to manage the munin domain.
Policy for MySQL
Execute MySQL in the mysql domain.
Domain allowed access.
Execute MySQL in the coller domain.
Domain allowed access.
Execute MySQL_safe in the coller domain.
Domain allowed access.
Send a generic signal to MySQL.
Domain allowed access.
Allow the specified domain to connect to postgresql with a tcp socket.
Domain allowed access.
Connect to MySQL using a unix domain stream socket.
Domain allowed access.
Read MySQL configuration files.
Domain allowed access.
Search the directories that contain MySQL
database storage.
Domain allowed access.
List the directories that contain MySQL
database storage.
Domain allowed access.
Read and write to the MySQL database directory.
Domain allowed access.
Create, read, write, and delete MySQL database directories.
Domain allowed access.
Append to the MySQL database directory.
Domain allowed access.
Read and write to the MySQL database directory.
Domain allowed access.
Create, read, write, and delete MySQL database files.
Domain allowed access.
Read and write to the MySQL database
named socket.
Domain allowed access.
Write to the MySQL log.
Domain allowed access.
Execute MySQL server in the mysql domain.
Domain allowed access.
Read MySQL PID files.
Domain allowed access.
Search MySQL PID files.
Domain allowed access.
All of the rules required to administrate an mysql environment
Domain allowed access.
The role to be allowed to manage the mysql domain.
Read and write to the MySQL database directory.
Domain allowed access.
Allow mysqld to connect to all ports
Net Saint / NAGIOS - network monitoring server
Do not audit attempts to read or write nagios
unnamed pipes.
Domain to not audit.
Allow the specified domain to read
nagios configuration files.
Domain allowed access.
Allow the specified domain to read
nagios temporary files.
Domain allowed access.
Allow the specified domain to read
nagios temporary files.
Domain allowed access.
Execute the nagios NRPE with
a domain transition.
Domain allowed access.
Search nagios spool directories.
Domain allowed access.
Read nagios lib files.
Domain allowed access.
Read nagios logs.
Domain allowed access.
dontaudit Read and write nagios logs.
Domain allowed access.
Execute the nagios unconfined plugins with
a domain transition.
Domain allowed access.
Create a set of derived types for various
nagios plugins,
The name to be used for deriving type names.
Do not audit attempts to write nrpe daemon unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an nagios environment
Domain allowed access.
The role to be allowed to manage the nagios domain.
Read nagios lib files.
Domain allowed access.
Execute nagios log in the caller domain.
Domain allowed access.
Allow nagios/nrpe to call sudo from NRPE utils scripts.
Nessus network scanning daemon
Connect to nessus over a TCP socket (Deprecated)
Domain allowed access.
Manager for dynamically switching between networks.
Read and write NetworkManager UDP sockets.
Domain allowed access.
Read and write NetworkManager packet sockets.
Domain allowed access.
Read and write NetworkManager netlink
routing sockets.
Domain allowed access.
Execute NetworkManager with a domain transition.
Domain allowed access.
Send and receive messages from
NetworkManager over dbus.
Domain allowed access.
Send and receive messages from
NetworkManager over dbus.
Domain allowed access.
Send a generic signal to NetworkManager
Domain allowed access.
Execute NetworkManager scripts with an automatic domain transition to initrc.
Domain allowed access.
Read NetworkManager PID files.
Domain allowed access.
Read NetworkManager PID files.
Domain allowed access.
Execute NetworkManager in the NetworkManager domain, and
allow the specified role the NetworkManager domain.
Domain allowed access.
The role to be allowed the NetworkManager domain.
Allow caller to relabel tun_socket
Domain allowed access.
Allow the specified domain to append
to Network Manager log files.
Domain allowed access.
Policy for NIS (YP) servers and clients
Use the ypbind service to access NIS services
unconditionally.
Use the ypbind service to access NIS services
unconditionally.
This interface was added because of apache and
spamassassin, to fix a nested conditionals problem.
When that support is added, this should be removed,
and the regular interface should be used.
The type of the process performing this action.
Use the ypbind service to access NIS services.
Allow the specified domain to use the ypbind service
to access Network Information Service (NIS) services.
Information that can be retreived from NIS includes
usernames, passwords, home directories, and groups.
If the network is configured to have a single sign-on
using NIS, it is likely that any program that does
authentication will need this access.
Domain allowed access.
Use the nis to authenticate passwords
Domain allowed access.
Execute ypbind in the ypbind domain.
Domain allowed access.
Execute ypbind in the ypbind domain, and
allow the specified role the ypbind domain.
Domain allowed access.
The role to be allowed the ypbind domain.
Send generic signals to ypbind.
Domain allowed access.
List the contents of the NIS data directory.
Domain allowed access.
Send UDP network traffic to NIS clients. (Deprecated)
Domain allowed access.
Connect to ypbind over TCP. (Deprecated)
Domain allowed access.
Read ypbind pid files.
Domain allowed access.
Delete ypbind pid files.
Domain allowed access.
Read ypserv configuration files.
Domain allowed access.
Execute ypxfr in the ypxfr domain.
Domain allowed access.
Execute nis server in the nis domain.
Domain allowed access.
Execute nis server in the nis domain.
Domain allowed access.
All of the rules required to administrate
an nis environment
Domain allowed access.
Role allowed access.
openstack-nova
Manage nova lib files.
Domain allowed access.
Creates types and rules for a basic
openstack-nova systemd daemon domain.
Prefix for the domain.
Name service cache daemon
Send generic signals to NSCD.
Domain allowed access.
Send NSCD the kill signal.
Domain allowed access.
Send signulls to NSCD.
Domain allowed access.
Execute NSCD in the nscd domain.
The type of the process performing this action.
Allow the specified domain to execute nscd
in the caller domain.
Domain allowed access.
Use NSCD services by connecting using
a unix stream socket.
Domain allowed access.
Use nscd services
Domain allowed access.
Use NSCD services by mapping the database from
an inherited NSCD file descriptor.
Domain allowed access.
Do not audit attempts to search the NSCD pid directory.
Domain allowed access.
Read NSCD pid file.
Domain allowed access.
Unconfined access to NSCD services.
Domain allowed access.
Execute nscd in the nscd domain, and
allow the specified role the nscd domain.
Domain allowed access
The role to be allowed the nscd domain.
Execute the nscd server init script.
Domain allowed access.
All of the rules required to administrate
an nscd environment
Domain allowed access.
The role to be allowed to manage the nscd domain.
Allow confined applications to use nscd shared memory.
Authoritative only name server
Send and receive datagrams from NSD. (Deprecated)
Domain allowed access.
Connect to NSD over a TCP socket (Deprecated)
Domain allowed access.
nslcd - local LDAP name service daemon.
Execute a domain transition to run nslcd.
Domain allowed to transition.
Execute nslcd server in the nslcd domain.
The type of the process performing this action.
Read nslcd PID files.
Domain allowed access.
Connect to nslcd over an unix stream socket.
Domain allowed to connect.
All of the rules required to administrate
an nslcd environment
Domain allowed access.
Role allowed access.
Network Top
Execute a domain transition to run ntop.
Domain allowed to transition.
Execute ntop server in the ntop domain.
The type of the process performing this action.
Read ntop content in /etc
Domain allowed access.
Search ntop dirs in /var/lib
Domain allowed access.
Read ntop files in /var/lib
Domain allowed access.
Manage ntop files in /var/lib
Domain allowed access.
All of the rules required to administrate
an ntop environment
Domain allowed access.
Role allowed access.
Network time protocol daemon
NTP stub interface. No access allowed.
Domain allowed access.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Execute ntp in the ntp domain, and
allow the specified role the ntp domain.
Domain allowed access.
Role allowed access.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Send a generic signal to ntpd
Domain allowed access.
Read and write ntpd shared memory.
The type of the process performing this action.
All of the rules required to administrate
an ntp environment
Domain allowed access.
The role to be allowed to manage the ntp domain.
policy for numad
Transition to numad.
Domain allowed to transition.
All of the rules required to administrate
an numad environment
Domain allowed access.
nut - Network UPS Tools
NX remote desktop
Transition to NX server.
Domain allowed access.
Read nx home directory content
Domain allowed access.
Read nx home directory content
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Open AntiVirus scannerdaemon and signature update
Execute oav_update in the oav_update domain.
Domain allowed access.
Execute oav_update in the oav_update domain, and
allow the specified role the oav_update domain.
Domain allowed access.
The role to be allowed the oav_update domain.
Oddjob provides a mechanism by which unprivileged applications can
request that specified privileged operations be performed on their
behalf.
Execute a domain transition to run oddjob.
Domain allowed to transition.
Do not audit attempts to read and write
oddjob fifo file.
Domain to not audit.
Make the specified program domain accessable
from the oddjob.
The type of the process to transition to.
The type of the file used as an entrypoint to this domain.
Send and receive messages from
oddjob over dbus.
Domain allowed access.
Send a SIGCHLD signal to oddjob.
Domain allowed access.
Execute a domain transition to run oddjob_mkhomedir.
Domain allowed to transition.
Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain.
Domain allowed access.
Role allowed access.
Create a domain which can be started by init,
with a range transition.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
SELinux policy for Oident daemon.
Oident daemon is a server that implements the TCP/IP
standard IDENT user identification protocol as
specified in the RFC 1413 document.
Allow the specified domain to read
Oidentd personal configuration files.
Domain allowed access.
Allow the specified domain to create, read, write, and delete
Oidentd personal configuration files.
Domain allowed access.
Allow the specified domain to relabel
Oidentd personal configuration files.
Domain allowed access.
OpenCA - Open Certificate Authority
Execute the OpenCA program with
a domain transition.
Domain allowed access.
Send OpenCA generic signals.
Domain allowed access.
Send OpenCA stop signals.
Domain allowed access.
Kill OpenCA.
Domain allowed access.
Service for handling smart card readers.
Send openct a null signal.
Domain allowed access.
Execute openct in the caller domain.
Domain allowed access.
Execute a domain transition to run openct.
Domain allowed to transition.
Read openct PID files.
Domain allowed access.
Connect to openct over an unix stream socket.
Domain allowed access.
policy for openhpid
Transition to openhpid.
Domain allowed to transition.
Execute openhpid server in the openhpid domain.
Domain allowed access.
Search openhpid lib directories.
Domain allowed access.
Read openhpid lib files.
Domain allowed access.
Manage openhpid lib files.
Domain allowed access.
Manage openhpid lib directories.
Domain allowed access.
All of the rules required to administrate
an openhpid environment
Domain allowed access.
Role allowed access.
policy for openshift
Execute openshift server in the openshift domain.
The type of the process performing this action.
Execute openshift server in the openshift domain.
The type of the process performing this action.
Execute openshift server in the openshift domain.
The type of the process performing this action.
Role access to this domain.
Send a null signal to openshift init scripts.
Domain allowed access.
Send a signal to openshift init scripts.
Domain allowed access.
Allow the specified domain to read openshift's log files.
Domain allowed access.
Allow the specified domain to append
openshift log files.
Domain allowed to transition.
Allow domain to manage openshift log files
Domain to not audit.
Getattr openshift lib files.
Domain allowed access.
Search openshift lib directories.
Domain allowed access.
Read openshift lib files.
Domain allowed access.
Read openshift lib files.
Domain allowed access.
Create, read, write, and delete
openshift lib files.
Domain allowed access.
Manage openshift lib dirs files.
Domain allowed access.
Manage openshift lib content.
Domain allowed access.
Create private objects in the
mail lib directory.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
The name of the object being created.
Read openshift PID files.
Domain allowed access.
All of the rules required to administrate
an openshift environment
Domain allowed access.
Role allowed access.
Make the specified type usable as a openshift domain.
The prefix of the domain (e.g., openshift
is the prefix for openshift_t).
Make the specified type usable as a openshift domain.
Type to be used as a openshift domain type.
Read and write inherited openshift files.
Domain allowed access.
Manage openshift tmp files.
Domain allowed access.
Manage openshift tmp sockets.
Domain allowed access.
Mounton openshift tmp directory.
Domain allowed access.
Dontaudit Read and write inherited script fifo files.
Domain allowed access.
Allow calling app to transition to an openshift domain
Domain allowed access
Allow calling app to transition to an openshift domain
Domain allowed access
Execute openshift in the openshift domain, and
allow the specified role the openshift domain.
Domain allowed to transition.
Role allowed access.
Allow openshift to access nfs file systems without labels
full-featured SSL VPN solution
Execute OPENVPN clients in the openvpn domain.
Domain allowed access.
Execute OPENVPN clients in the openvpn domain, and
allow the specified role the openvpn domain.
Domain allowed access.
The role to be allowed the openvpn domain.
Send OPENVPN clients the kill signal.
Domain allowed access.
Send generic signals to OPENVPN clients.
Domain allowed access.
Send signulls to OPENVPN clients.
Domain allowed access.
Allow the specified domain to read
OpenVPN configuration files.
Domain allowed access.
All of the rules required to administrate
an openvpn environment
Domain allowed access.
The role to be allowed to manage the openvpn domain.
Allow openvpn to read home directories
Allow openvpn to run unconfined scripts
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Transition to openvswitch.
Domain allowed to transition.
Execute TEMPLATE in the openvswitch domin.
Domain allowed to transition.
Allow stream connect to openvswitch.
Domain allowed access.
Read openvswitch PID files.
Domain allowed access.
Search openvswitch lib directories.
Domain allowed access.
Read openvswitch lib files.
Domain allowed access.
Manage openvswitch lib files.
Domain allowed access.
Manage openvswitch lib directories.
Domain allowed access.
WS-Management Server
Execute openwsman in the openwsman domin.
Domain allowed to transition.
policy for oracleasm
Transition to oracleasm.
Domain allowed to transition.
Execute oracleasm server in the oracleasm domain.
Domain allowed access.
All of the rules required to administrate
an oracleasm environment
Domain allowed access.
Role allowed access.
Client-side service written in Python that responds to pings and runs rhn_check when told to by osa-dispatcher.
Execute osad in the osad domin.
Domain allowed to transition.
Execute osad server in the osad domain.
Domain allowed access.
Read osad's log files.
Domain allowed access.
Append to osad log files.
Domain allowed access.
Manage osad log files
Domain allowed access.
Read osad PID files.
Domain allowed access.
All of the rules required to administrate
an osad environment
Domain allowed access.
Role allowed access.
policy for pacemaker
Transition to pacemaker.
Domain allowed to transition.
Execute pacemaker server in the pacemaker domain.
Domain allowed access.
Search pacemaker lib directories.
Domain allowed access.
Read pacemaker lib files.
Domain allowed access.
Manage pacemaker lib files.
Domain allowed access.
Manage pacemaker lib directories.
Domain allowed access.
Read pacemaker PID files.
Domain allowed access.
All of the rules required to administrate
an pacemaker environment
Domain allowed access.
Role allowed access.
Passive Asset Detection System
PADS is a libpcap based detection engine used to
passively detect network assets. It is designed to
complement IDS technology by providing context to IDS
alerts.
All of the rules required to administrate
an pads environment
Domain allowed access.
Role allowed access.
Ruby on rails deployment for Apache and Nginx servers.
Execute passenger in the passenger domain.
Domain allowed to transition.
Execute passenger in the current domain.
Domain allowed to transition.
Read passenger lib files
Domain allowed access.
Manage passenger lib files
Domain allowed access.
Manage passenger var_run content.
Domain allowed access.
Connect to passenger unix stream socket.
Domain allowed access.
Allow to manage passenger tmp files/dirs.
Domain allowed access.
Allow to manage passenger tmp sock_files
Domain allowed access.
The pcp command summarizes the status of a Performance Co-Pilot (PCP) installation
Creates types and rules for a basic
pcp daemon domain.
Prefix for the domain.
Allow domain to read pcp lib files
Prefix for the domain.
All of the rules required to administrate
an pcp environment
Domain allowed access.
Allow the specified domain to execute pcp_pmie
in the caller domain.
Domain allowed to transition.
Allow the specified domain to execute pcp_pmlogger
in the caller domain.
Domain allowed to transition.
Allow pcp to bind to all unreserved_ports
PCSC smart card service
Execute a domain transition to run pcscd.
Domain allowed to transition.
Read pcscd pub files.
Domain allowed access.
Manage pcscd pub files.
Domain allowed access.
Manage pcscd pub fifo files.
Domain allowed access.
Connect to pcscd over an unix stream socket.
Domain allowed access.
The Open Group Pegasus CIM/WBEM Server.
Perdition POP and IMAP proxy
Connect to perdition over a TCP socket (Deprecated)
The type of the process performing this action.
Pingd of the Whatsup cluster node up/down detection utility
Execute a domain transition to run pingd.
Domain allowed to transition.
Read pingd etc configuration files.
Domain allowed access.
Manage pingd etc configuration files.
Domain allowed access.
All of the rules required to administrate
an pingd environment
Domain allowed access.
The role to be allowed to manage the pingd domain.
policy for piranha
Creates types and rules for a basic
cluster init daemon domain.
Prefix for the domain.
Execute a domain transition to run fos.
Domain allowed to transition.
Execute a domain transition to run lvsd.
Domain allowed to transition.
Execute a domain transition to run pulse.
Domain allowed to transition.
Execute pulse server in the pulse domain.
The type of the process performing this action.
Allow the specified domain to read piranha's log files.
Domain allowed access.
Allow the specified domain to append
piranha log files.
Domain allowed to transition.
Allow domain to manage piranha log files
Domain to not audit.
Allow piranha-lvs domain to connect to the network using TCP.
policy for pkcsslotd
Transition to pkcsslotd.
Domain allowed to transition.
Search pkcsslotd lib directories.
Domain allowed access.
Read pkcsslotd lib files.
Domain allowed access.
Manage pkcsslotd lib files.
Domain allowed access.
Manage pkcsslotd lib directories.
Domain allowed access.
All of the rules required to administrate
an pkcsslotd environment
Domain allowed access.
policy for plymouthd
Execute a domain transition to run plymouthd.
Domain allowed to transition.
Execute the plymoth daemon in the current domain
Domain allowed to transition.
Execute the plymoth command in the current domain
Domain allowed to transition.
Execute a domain transition to run plymouthd.
Domain allowed to transition.
Read plymouthd PID files.
Domain allowed access.
Manage plymouthd var_run files.
Domain allowed access.
Search plymouthd lib directories.
Domain allowed access.
Read plymouthd lib files.
Domain allowed access.
Create, read, write, and delete
plymouthd lib files.
Domain allowed access.
Manage plymouthd var_lib files.
Domain allowed access.
Search plymouthd spool directories.
Domain allowed access.
Read plymouthd spool files.
Domain allowed access.
Create, read, write, and delete
plymouthd spool files.
Domain allowed access.
Allow domain to manage plymouthd spool files
Domain allowed access
All of the rules required to administrate
an plymouthd environment
Domain allowed access.
Allow domain to Stream socket connect
to Plymouth daemon.
Domain allowed access.
Policy framework for controlling privileges for system-wide services.
Send and receive messages from
policykit over dbus.
Domain allowed access.
Send and receive messages from
policykit over dbus.
Domain allowed access.
Execute a domain transition to run polkit_auth.
Domain allowed to transition.
Execute a policy_auth in the policy_auth domain, and
allow the specified role the policy_auth domain,
Domain allowed access.
The role to be allowed the load_policy domain.
Execute a domain transition to run polkit_grant.
Domain allowed to transition.
Execute a policy_grant in the policy_grant domain, and
allow the specified role the policy_grant domain,
Domain allowed access.
The role to be allowed the load_policy domain.
read policykit reload files
Domain allowed access.
rw policykit reload files
Domain allowed access.
Execute a domain transition to run polkit_resolve.
Domain allowed to transition.
Search policykit lib directories.
Domain allowed access.
read policykit lib files
Domain allowed access.
The per role template for the policykit module.
Role allowed access
User domain for the role
Send generic signal to policy_auth
Domain allowed to transition.
RPC port mapping service.
Execute portmap_helper in the helper domain.
Domain allowed access.
Execute portmap helper in the helper domain, and
allow the specified role the helper domain.
Communicate with portmap.
Domain allowed access.
The role to be allowed the portmap domain.
Send UDP network traffic to portmap. (Deprecated)
The type of the process performing this action.
Send and receive UDP network traffic from portmap. (Deprecated)
Domain allowed access.
Connect to portmap over a TCP socket (Deprecated)
The type of the process performing this action.
Reserve well-known ports in the RPC port range.
Execute a domain transition to run portreserve.
Domain allowed to transition.
Execute portreserve in the portreserve domain.
The type of the process performing this action.
Allow the specified domain to read
portreserve etcuration files.
Domain allowed access.
Allow the specified domain to manage
portreserve etcuration files.
Domain allowed access.
All of the rules required to administrate
an portreserve environment.
Domain allowed access.
Role allowed access.
Portslave terminal server software
Execute portslave with a domain transition.
Domain allowed to transition.
Postfix email server
Postfix stub interface. No access allowed.
Domain allowed access.
Creates types and rules for a basic
postfix process domain.
Prefix for the domain.
Creates a postfix server process domain.
Prefix of the domain.
Creates a process domain for programs
that are ran by users.
Prefix of the domain.
Read postfix configuration files.
Domain allowed access.
Create files with the specified type in
the postfix configuration directories.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to read and
write postfix local delivery
TCP sockets.
Domain to not audit.
Allow read/write postfix local pipes
TCP sockets.
Domain allowed access.
Allow read/write postfix public pipes
TCP sockets.
Domain allowed access.
Allow domain to read postfix local process state
Domain allowed access.
Allow domain to read postfix master process state
Domain allowed access.
Use postfix master process file
file descriptors.
Domain allowed access.
Do not audit attempts to use
postfix master process file
file descriptors.
Domain to not audit.
Execute postfix_map in the postfix_map domain.
Domain allowed to transition.
Execute postfix_map in the postfix_map domain, and
allow the specified role the postfix_map domain.
Domain allowed to transition.
Role allowed access.
Execute the master postfix program in the
postfix_master domain.
Domain allowed to transition.
Execute the master postfix in the postfix master domain.
Domain allowed access.
Execute the master postfix program in the
caller domain.
Domain allowed access.
Connect to postfix master process using a unix domain stream socket.
Domain allowed access.
Allow read/write postfix master pipes
Domain allowed access.
Execute the master postdrop in the
postfix_postdrop domain.
Domain allowed to transition.
Execute the master postqueue in the
postfix_postqueue domain.
Domain allowed to transition.
Execute the master postqueue in the caller domain.
Domain allowed access.
Create a named socket in a postfix private directory.
Domain allowed access.
manage named socket in a postfix private directory.
Domain allowed access.
Execute the master postfix program in the
postfix_master domain.
Domain allowed to transition.
Getattr postfix mail spool files.
Domain allowed access.
Search postfix mail spool directories.
Domain allowed access.
List postfix mail spool directories.
Domain allowed access.
Read postfix mail spool files.
Domain allowed access.
Create, read, write, and delete postfix mail spool files.
Domain allowed access.
Read, write, and delete postfix maildrop spool files.
Domain allowed access.
Create, read, write, and delete postfix maildrop spool files.
Domain allowed access.
Execute postfix user mail programs
in their respective domains.
Domain allowed access.
All of the rules required to administrate
an postfix environment.
Domain allowed access.
Role allowed access.
Execute the master postdrop in the
postfix_postdrop domain.
Domain allowed to transition.
The role to be allowed the iptables domain.
Allow postfix_local domain full write access to mail_spool directories
Postfix policy server
All of the rules required to administrate
an postfixpolicyd environment
Domain allowed access.
The role to be allowed to manage the postfixpolicyd domain.
PostgreSQL relational database
Role access for SE-PostgreSQL.
The role associated with the user domain.
The type of the user domain.
Marks as a SE-PostgreSQL loadable shared library module
Type marked as a database object type.
Marks as a SE-PostgreSQL database object type
Type marked as a database object type.
Marks as a SE-PostgreSQL schema object type
Type marked as a schema object type.
Marks as a SE-PostgreSQL table/column/tuple object type
Type marked as a table/column/tuple object type.
Marks as a SE-PostgreSQL system table/column/tuple object type
Type marked as a table/column/tuple object type.
Marks as a SE-PostgreSQL sequence type
Type marked as a sequence type.
Marks as a SE-PostgreSQL view object type
Type marked as a view object type.
Marks as a SE-PostgreSQL procedure object type
Type marked as a database object type.
Marks as a SE-PostgreSQL procedural language object type
Type marked as a procedural language object type.
Marks as a SE-PostgreSQL binary large object type
Type marked as a database binary large object type.
Allow the specified domain to search postgresql's database directory.
Domain allowed access.
Allow the specified domain to manage postgresql's database.
Domain allowed access.
Execute postgresql in the postgresql domain.
Domain allowed to transition.
Execute Postgresql in the caller domain.
Domain allowed access.
Allow domain to signal postgresql
Domain allowed access.
Allow the specified domain to read postgresql's etc.
Domain allowed access.
Allow the specified domain to connect to postgresql with a tcp socket.
Domain allowed access.
Allow the specified domain to connect to postgresql with a unix socket.
Domain allowed access.
Allow the specified domain unprivileged accesses to unifined database objects
managed by SE-PostgreSQL,
Domain allowed access.
Allow the specified domain unconfined accesses to any database objects
managed by SE-PostgreSQL,
Domain allowed access.
All of the rules required to administrate an postgresql environment
Domain allowed access.
The role to be allowed to manage the postgresql domain.
Allow postgresql to use ssh and rsync for point-in-time recovery
Allow unprivileged users to execute DDL statement
Allow database admins to execute DML statement
Postfix grey-listing server
Write to postgrey socket
Domain allowed to talk to postgrey
Search the spool directory
Domain allowed access
All of the rules required to administrate
an postgrey environment
Domain allowed access.
The role to be allowed to manage the postgrey domain.
Point to Point Protocol daemon creates links in ppp networks
Use PPP file discriptors.
Domain allowed access.
Do not audit attempts to inherit
and use PPP file discriptors.
Domain to not audit.
Send a SIGCHLD signal to PPP.
Domain allowed access.
Send ppp a kill signal
Domain allowed access.
Send a generic signal to PPP.
Domain allowed access.
Send a generic signull to PPP.
Domain allowed access.
Execute domain in the ppp domain.
Domain allowed access.
Conditionally execute ppp daemon on behalf of a user or staff type.
Domain allowed access.
The role to allow the ppp domain.
Unconditionally execute ppp daemon on behalf of a user or staff type.
Domain allowed access.
The role to allow the ppp domain.
Execute domain in the ppp caller.
Domain allowed access.
Read ppp configuration files.
Domain allowed access.
Read PPP-writable configuration files.
Domain allowed access.
Read PPP secrets.
Domain allowed access.
Read PPP pid files.
Domain allowed access.
Create, read, write, and delete PPP pid files.
Domain allowed access.
Create, read, write, and delete PPP pid files.
Domain allowed access.
Execute ppp server in the ntpd domain.
The type of the process performing this action.
All of the rules required to administrate
an ppp environment
Domain allowed access.
Role allowed access.
Allow pppd to load kernel modules for certain modems
Allow pppd to be run for a regular user
Prelude hybrid intrusion detection system
Execute a domain transition to run prelude.
Domain allowed to transition.
Execute a domain transition to run prelude_audisp.
Domain allowed to transition.
Signal the prelude_audisp domain.
Domain allowed acccess.
Read the prelude spool files
Domain allowed access.
Manage to prelude-manager spool files.
Domain allowed to transition.
All of the rules required to administrate
an prelude environment
Domain allowed access.
Role allowed access.
Privacy enhancing web proxy.
All of the rules required to administrate
an privoxy environment
Domain allowed access.
Role allowed access.
Allow privoxy to connect to all ports, not just
HTTP, FTP, and Gopher ports.
Procmail mail delivery agent
Execute procmail with a domain transition.
Domain allowed access.
Execute procmail in the caller domain.
Domain allowed access.
Read procmail tmp files.
Domain allowed access.
Read/write procmail tmp files.
Domain allowed access.
Read procmail home directory content
Domain allowed access.
Intrusion Detection and Log Analysis with iptables
Execute a domain transition to run psad.
Domain allowed to transition.
Send a generic signal to psad
Domain allowed access.
Send a null signal to psad.
Domain allowed access.
Read psad etc configuration files.
Domain allowed access.
Manage psad etc configuration files.
Domain allowed access.
Read psad PID files.
Domain allowed access.
Read psad PID files.
Domain allowed access.
Allow the specified domain to read psad's log files.
Domain allowed access.
Allow the specified domain to append to psad's log files.
Domain allowed access.
Allow the specified domain to write to psad's log files.
Domain allowed access.
Read and write psad fifo files.
Domain allowed access.
Read and write psad tmp files.
Domain allowed access.
All of the rules required to administrate
an psad environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
publicfile supplies files to the public through HTTP and FTP
Puppet client daemon
Puppet is a configuration management system written in Ruby.
The client daemon is responsible for periodically requesting the
desired system state from the server and ensuring the state of
the client system matches.
Execute puppet_master in the puppet_master
domain.
Domain allowed to transition.
Read / Write to Puppet temp files. Puppet uses
some system binaries (groupadd, etc) that run in
a non-puppet domain and redirects output into temp
files.
Domain allowed access
Allow the specified domain to read puppet's config files.
Domain allowed access.
Allow the specified domain to read puppet's log files.
Domain allowed access.
Allow the specified domain to create puppet's log files.
Domain allowed access.
Allow the specified domain to append puppet's log files.
Domain allowed access.
Read Puppet lib files.
Domain allowed access.
Manage Puppet lib files.
Domain allowed access.
Allow the specified domain to search puppet's log files.
Domain allowed access.
Allow the specified domain to search puppet's pid files.
Domain allowed access.
Execute puppet in the puppet
domain.
Domain allowed to transition.
Execute puppet in the puppet
domain and allow the specified
role the puppetca domain.
Domain allowed to transition.
Role allowed access.
Allow Puppet client to manage all file
types.
Allow Puppet master to use connect to mysql and postgresql database
Server for the PXE network boot protocol
PyICQt is an ICQ transport for XMPP server.
Pyzor is a distributed, collaborative spam detection and filtering network.
Role access for pyzor
Role allowed access
User domain for the role
Send generic signals to pyzor
Domain allowed access.
Execute pyzor with a domain transition.
Domain allowed access.
Execute pyzor in the caller domain.
Domain allowed access.
All of the rules required to administrate
an pyzor environment
Domain allowed access.
The role to be allowed to manage the pyzor domain.
Qmail Mail Server
Template for qmail parent/sub-domain pairs
The prefix of the child domain
The name of the parent domain.
Transition to qmail_inject_t
Domain allowed access
Transition to qmail_queue_t
Domain allowed access
Read qmail configuration files.
Domain allowed access.
Define the specified domain as a qmail-smtp service.
Needed by antivirus/antispam filters.
Domain allowed access
The type associated with the process program.
Create, read, write, and delete qmail
spool directories.
Domain allowed access.
Create, read, write, and delete qmail
spool files.
Domain allowed access.
Read and write to qmail spool pipes.
Domain to not audit.
policy for qpidd
Execute a domain transition to run qpidd.
Domain allowed to transition.
Execute qpidd server in the qpidd domain.
The type of the process performing this action.
Execute qpidd server in the qpidd domain.
The type of the process performing this action.
Read qpidd PID files.
Domain allowed access.
Manage qpidd var_run files.
Domain allowed access.
Search qpidd lib directories.
Domain allowed access.
Read qpidd lib files.
Domain allowed access.
Create, read, write, and delete
qpidd lib files.
Domain allowed access.
Manage qpidd var_lib files.
Domain allowed access.
All of the rules required to administrate
an qpidd environment
Domain allowed access.
Role allowed access.
Allow read and write access to qpidd semaphores.
Domain allowed access.
Read and write to qpidd shared memory.
The type of the process performing this action.
Quantum is a virtual network service for Openstack
Transition to neutron.
Domain allowed to transition.
Read neutron's log files.
Domain allowed access.
Append to neutron log files.
Domain allowed access.
Manage neutron log files
Domain allowed access.
Search neutron lib directories.
Domain allowed access.
Read neutron lib files.
Domain allowed access.
Manage neutron lib files.
Domain allowed access.
Manage neutron lib directories.
Domain allowed access.
Read and write neutron fifo files.
Domain allowed access.
Allow domain to send sigchld to neutron process.
Domain allowed access.
Connect to neutron over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an neutron environment
Domain allowed access.
RADIUS authentication and accounting server.
Use radius over a UDP connection. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an radius environment
Domain allowed access.
Role allowed access.
IPv6 router advertisement daemon
Read radvd PID files.
Domain allowed access.
All of the rules required to administrate
an radvd environment
Domain allowed access.
Role allowed access.
A distributed, collaborative, spam detection and filtering network.
A distributed, collaborative, spam detection and filtering network.
This policy will work with either the ATrpms provided config
file in /etc/razor, or with the default of dumping everything into
$HOME/.razor.
Template to create types and rules common to
all razor domains.
The prefix of the domain (e.g., user
is the prefix for user_t).
Role access for razor
Role allowed access
User domain for the role
Execute razor in the system razor domain.
Domain allowed access.
Create, read, write, and delete razor files
in a user home subdirectory.
Domain allowed access.
read razor lib files.
Domain allowed access.
Network router discovery daemon
Execute rdisc in the caller domain.
Domain allowed access.
Advanced key-value store
Execute redis server in the redis domin.
Domain allowed to transition.
Execute redis server in the redis domain.
Domain allowed access.
Read redis's log files.
Domain allowed access.
Append to redis log files.
Domain allowed access.
Manage redis log files
Domain allowed access.
Search redis lib directories.
Domain allowed access.
Read redis lib files.
Domain allowed access.
Manage redis lib files.
Domain allowed access.
Manage redis lib directories.
Domain allowed access.
Read redis PID files.
Domain allowed access.
Connect to redis over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an redis environment
Domain allowed access.
Role allowed access.
Policy for rshd, rlogind, and telnetd.
Domain transition to the remote login domain.
The type of the process performing this action.
allow Domain to signal remote login domain.
The type of the process performing this action.
Resource management daemon
Connect to resmgrd over a unix domain
stream socket.
Domain allowed access.
SELinux policy for rgmanager
Execute a domain transition to run rgmanager.
Domain allowed to transition.
Allow read and write access to rgmanager semaphores.
Domain allowed access.
Connect to rgmanager over an unix stream socket.
Domain allowed access.
Allow manage rgmanager tmpfs files.
The type of the process performing this action.
Allow manage rgmanager tmp files.
The type of the process performing this action.
Allow manage rgmanager pid files.
The type of the process performing this action.
All of the rules required to administrate
an rgmanager environment
Domain allowed access.
The role to be allowed to manage the rgmanager domain.
Allow the specified domain to manage rgmanager's lib/run files.
Domain allowed access.
Allow the specified domain to search rgmanager's lib files.
Domain allowed access.
Allow rgmanager domain to connect to the network using TCP.
RHCS - Red Hat Cluster Suite
Creates types and rules for a basic
rhcs init daemon domain.
Prefix for the domain.
Execute a domain transition to run dlm_controld.
Domain allowed to transition.
Connect to dlm_controld over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to dlm_controld semaphores.
Domain allowed access.
Execute a domain transition to run fenced.
Domain allowed access.
Allow a domain to getattr on fenced executable.
Domain allowed to transition.
Allow read and write access to fenced semaphores.
Domain allowed access.
Send and receive messages from
fenced over dbus.
Domain allowed access.
Connect to fenced over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run gfs_controld.
Domain allowed access.
Allow read and write access to gfs_controld semaphores.
Domain allowed access.
Read and write to gfs_controld_t shared memory.
Domain allowed access.
Connect to gfs_controld_t over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run groupd.
Domain allowed access.
Connect to groupd over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to groupd semaphores.
Domain allowed access.
Read and write to group shared memory.
Domain allowed access.
Read and write to cluster domains shared memory.
Domain allowed access.
Read and write access to cluster domains semaphores.
Domain allowed access.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
Domain allowed access.
Execute a domain transition to run qdiskd.
Domain allowed access.
Allow domain to read qdiskd tmpfs files
Domain allowed access.
Execute a domain transition to run cluster administrative domain.
Domain allowed to transition.
Execute cluster init scripts in
the init script domain.
Domain allowed to transition.
Execute cluster in the caller domain.
Domain allowed access.
Read cluster log files.
Domain allowed access.
Setattr cluster log files.
Domain allowed access.
Allow the specified domain to read/write inherited cluster's tmpf files.
Domain allowed access.
Allow manage cluster tmp files.
Domain allowed access.
Allow the specified domain to read/write cluster's tmpfs files.
Domain allowed access.
Allow manage cluster tmpfs files.
Domain allowed access.
Allow manage cluster pid files.
Domain allowed access.
Allow read cluster pid files.
Domain allowed access.
Allow domain to read cluster lib files
Domain allowed access.
Allow domain to manage cluster lib files
Domain allowed access.
Allow domain to relabel cluster lib files
Domain allowed access.
Send and receive messages from
a cluster service over dbus.
Domain allowed access.
Allow fenced domain to connect to the network using TCP.
Allow fenced domain to execute ssh.
Allow cluster administrative domains to connect to the network using TCP.
Allow cluster administrative domains to manage all files on a system.
Allow cluster administrative cluster domains memcheck-amd64- to use executable memory
rhev polic module contains policies for rhev apps
Execute rhev-agentd in the rhev_agentd domain.
Domain allowed access.
Read rhev-agentd PID files.
Domain allowed access.
Connect to rhev_agentd over a unix domain
stream socket.
Domain allowed access.
Send sigchld to rhev-agentd
Domain allowed access
Allow attempts to read and write to rhev-agentd pipes
Domain allowed access
Red Hat Graphical Boot
RHGB stub interface. No access allowed.
N/A
Use a rhgb file descriptor.
The type of the process performing this action.
Get the process group of rhgb.
Domain allowed access.
Send a signal to rhgb.
Domain allowed access.
Read and write to unix stream sockets.
The type of the process performing this action.
Do not audit attempts to read and write
rhgb unix domain stream sockets.
The type of the process performing this action.
Connected to rhgb unix stream socket.
The type of the process performing this action.
Read and write to rhgb shared memory.
The type of the process performing this action.
Read from and write to the rhgb devpts.
Domain allowed access.
dontaudit Read from and write to the rhgb devpts.
Domain allowed access.
Read and write to rhgb temporary file system.
The type of the process performing this action.
policy for rhnsd
Transition to rhnsd.
Domain allowed to transition.
Execute rhnsd server in the rhnsd domain.
Domain allowed access.
Allow the specified domain to manage
rhnsd configuration files.
Domain allowed access.
All of the rules required to administrate
an rhnsd environment
Domain allowed access.
Role allowed access.
Subscription Management Certificate Daemon policy
Transition to rhsmcertd.
Domain allowed to transition.
Execute rhsmcertd server in the rhsmcertd domain.
Domain allowed access.
Read rhsmcertd's log files.
Domain allowed access.
Append to rhsmcertd log files.
Domain allowed access.
Manage rhsmcertd log files
Domain allowed access.
Search rhsmcertd lib directories.
Domain allowed access.
Read rhsmcertd lib files.
Domain allowed access.
Manage rhsmcertd lib files.
Domain allowed access.
Manage rhsmcertd lib directories.
Domain allowed access.
Read rhsmcertd PID files.
Domain allowed access.
Connect to rhsmcertd over a unix domain
stream socket.
Domain allowed access.
Send and receive messages from
rhsmcertd over dbus.
Domain allowed access.
Dontaudit Send and receive messages from
rhsmcertd over dbus.
Domain allowed access.
All of the rules required to administrate
an rhsmcertd environment
Domain allowed access.
Role allowed access.
Ricci cluster management agent
Execute a domain transition to run ricci.
Domain allowed to transition.
Execute ricci server in the ricci domain.
The type of the process performing this action.
Execute a domain transition to run ricci_modcluster.
Domain allowed to transition.
Do not audit attempts to use
ricci_modcluster file descriptors.
The type of process not to audit.
Do not audit attempts to read write
ricci_modcluster unamed pipes.
The type of process not to audit.
Connect to ricci_modclusterd over an unix stream socket.
Domain allowed access.
Read and write to ricci_modclusterd temporary file system.
Domain allowed access.
Execute a domain transition to run ricci_modlog.
Domain allowed to transition.
Execute a domain transition to run ricci_modrpm.
Domain allowed to transition.
Execute a domain transition to run ricci_modservice.
Domain allowed to transition.
Execute a domain transition to run ricci_modstorage.
Domain allowed to transition.
Allow the specified domain to read ricci's lib files.
Domain allowed access.
Allow the specified domain to manage ricci's lib files.
Domain allowed access.
All of the rules required to administrate
an ricci environment
Domain allowed access.
Role allowed access.
Remote login daemon
Execute rlogind in the rlogin domain.
The type of the process performing this action.
read rlogin homedir content (.config)
Domain allowed access.
Roundup Issue Tracking System policy
All of the rules required to administrate
an roundup environment
Domain allowed access.
The role to be allowed to manage the roundup domain.
Remote Procedure Call Daemon for managment of network based process communication
RPC stub interface. No access allowed.
Domain allowed access.
The template to define a rpc domain.
This template creates a domain to be used for
a new rpc daemon.
The type of daemon to be used.
Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated)
The type of the process performing this action.
Do not audit attempts to get the attributes
of the NFS export file.
The type of the process performing this action.
Allow read access to exports.
The type of the process performing this action.
Allow write access to exports.
The type of the process performing this action.
Execute domain in nfsd domain.
The type of the process performing this action.
Execute domain in nfsd domain.
Domain allowed access.
Execute domain in rpcd domain.
The type of the process performing this action.
Send kill signals to rpcd.
Domain allowed access.
Execute rpcd in the rcpd domain, and
allow the specified role the rpcd domain.
Domain allowed to transition.
Role allowed access.
Execute domain in rpcd domain.
Domain allowed access.
Read NFS exported content.
Domain allowed access.
Allow domain to create read and write NFS directories.
Domain allowed access.
Allow domain to create read and write NFS directories.
Domain allowed access.
Allow domain to read and write to an NFS UDP socket.
Domain allowed access.
Send UDP traffic to NFSd. (Deprecated)
Domain allowed access.
Search NFS state data in /var/lib/nfs.
Domain allowed access.
Read NFS state data in /var/lib/nfs.
Domain allowed access.
Manage NFS state data in /var/lib/nfs.
Domain allowed access.
Allow gssd to read temp directory. For access to kerberos tgt.
Universal Addresses to RPC Program Number Mapper
Execute a domain transition to run rpcbind.
Domain allowed to transition.
Connect to rpcbindd over an unix stream socket.
Domain allowed access.
Read rpcbind PID files.
Domain allowed access.
Search rpcbind lib directories.
Domain allowed access.
Read rpcbind lib files.
Domain allowed access.
Create, read, write, and delete
rpcbind lib files.
Domain allowed access.
All of the rules required to administrate
an rpcbind environment
Domain allowed access.
The role to be allowed to manage the rpcbind domain.
Remote shell service.
Domain transition to rshd.
The type of the process performing this action.
Fast incremental file transfer for synchronization
Make rsync an entry point for
the specified domain.
The domain for which init scripts are an entrypoint.
Execute a rsync in a specified domain.
Execute a rsync in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Execute a rsync in a specified domain.
Execute a rsync in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Execute rsync in the caller domain domain.
Domain allowed access.
Read rsync config files.
Domain allowed.
Write to rsync config files.
Domain allowed.
Manage rsync config files.
Domain allowed.
Create objects in the amavis spool directories
with a private type.
Domain allowed access.
Class of the object being created.
Allow rsync to run as a client
Allow rsync to run as a server
Allow rsync to export any files/directories read only.
Allow rsync to modify public files
used for public file transfer services. Files/Directories must be
labeled public_content_rw_t.
Allow rsync servers to share cifs files systems
Allow rsync servers to share nfs files systems
Platform diagnostics report firmware events.
Execute rtas_errd in the rtas_errd domin.
Domain allowed to transition.
Read rtas_errd's log files.
Domain allowed access.
Append to rtas_errd log files.
Domain allowed access.
Manage rtas_errd log files
Domain allowed access.
Read rtas_errd PID files.
Domain allowed access.
All of the rules required to administrate
an rtas_errd environment
Domain allowed access.
Realtime scheduling for user processes.
Execute a domain transition to run rtkit_daemon.
Domain allowed to transition.
Send and receive messages from
rtkit_daemon over dbus.
Domain allowed access.
Do not audit send and receive messages from
rtkit_daemon over dbus.
Domain allowed access.
Allow rtkit to control scheduling for your process
Domain allowed access.
Who is logged in on other machines?
Execute a domain transition to run rwho.
Domain allowed to transition.
Search rwho log directories.
Domain allowed access.
Read rwho log files.
Domain allowed access.
Search rwho spool directories.
Domain allowed access.
Read rwho spool files.
Domain allowed access.
Create, read, write, and delete
rwho spool files.
Domain allowed access.
All of the rules required to administrate
an rwho environment
Domain allowed access.
The role allowed access.
SMB and CIFS client/server programs for UNIX and
name Service Switch daemon for resolving names
from Windows NT servers.
Execute nmbd net in the nmbd_t domain.
The type of the process performing this action.
Execute samba server in the samba domain.
The type of the process performing this action.
Execute samba net in the samba_net domain.
The type of the process performing this action.
Execute samba net in the samba_unconfined_net domain.
The type of the process performing this action.
Execute samba net in the samba_net domain, and
allow the specified role the samba_net domain.
The type of the process performing this action.
The role to be allowed the samba_net domain.
The role for the samba module.
The role to be allowed the samba_net domain.
Execute samba net in the samba_unconfined_net domain, and
allow the specified role the samba_unconfined_net domain.
The type of the process performing this action.
The role to be allowed the samba_unconfined_net domain.
Execute smbmount in the smbmount domain.
The type of the process performing this action.
Execute smbmount interactively and do
a domain transition to the smbmount domain.
Domain allowed acces.
The role to be allowed the smbmount domain.
Allow the specified domain to read
samba configuration files.
Domain allowed access.
Allow the specified domain to read
and write samba configuration files.
Domain allowed access.
Allow the specified domain to read
and write samba configuration files.
Domain allowed access.
Allow the specified domain to read samba's log files.
Domain allowed access.
Allow the specified domain to append to samba's log files.
Domain allowed access.
Execute samba log in the caller domain.
The type of the process performing this action.
Allow the specified domain to read samba's secrets.
Domain allowed access.
Allow the specified domain to read samba's shares
Domain allowed access.
Allow the specified domain to search
samba /var directories.
Domain allowed access.
Allow the specified domain to
read samba /var files.
Domain allowed access.
Do not audit attempts to write samba
/var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var directories.
Domain allowed access.
Execute a domain transition to run smbcontrol.
Domain allowed to transition.
Execute smbcontrol in the smbcontrol domain, and
allow the specified role the smbcontrol domain.
Domain allowed access
The role to be allowed the smbcontrol domain.
Execute smbd in the smbd_t domain.
The type of the process performing this action.
Do not audit attempts to use file descriptors from samba.
Domain to not audit.
Allow the specified domain to write to smbmount tcp sockets.
Domain allowed access.
Allow the specified domain to read and write to smbmount tcp sockets.
Domain allowed access.
Execute winbind_helper in the winbind_helper domain.
The type of the process performing this action.
Execute winbind_helper in the winbind_helper domain, and
allow the specified role the winbind_helper domain.
The type of the process performing this action.
The role to be allowed the winbind_helper domain.
Allow the specified domain to read the winbind pid files.
Domain allowed access.
Allow domain to signull winbind
Domain allowed access.
Allow domain to signal samba
Domain to not audit.
Connect to nmbd.
Domain allowed access.
Allow domain to signal samba
Domain to not audit.
Connect to winbind.
Domain allowed access.
Create a set of derived types for apache
web content.
The prefix to be used for deriving type names.
Search the samba pid directory.
Domain to not audit.
Allow domain to signull samba_unconfined_net
Domain allowed access.
Set attributes of samba_share directories.
Domain allowed access.
All of the rules required to administrate
an samba environment
Domain allowed access.
The role to be allowed to manage the samba domain.
Allow samba to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Allow samba to create new home directories (e.g. via PAM)
Allow samba to act as the domain controller, add users,
groups and change passwords.
Allow samba to act as a portmapper
Allow samba to share users home directories.
Allow samba to share any file/directory read only.
Allow samba to share any file/directory read/write.
Allow samba to run unconfined scripts
Allow samba to export NFS volumes.
Allow samba to export ntfs/fusefs volumes.
Allow smbd to load libgfapi from gluster.
policy for sanlock
Execute a domain transition to run sanlock.
Domain allowed access.
Execute sanlock server in the sanlock domain.
The type of the process performing this action.
Create, read, write, and delete sanlock PID files.
Domain allowed access.
Connect to sanlock over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an sanlock environment
Domain allowed access.
Role allowed access.
Allow sanlock to manage nfs files
Allow sanlock to manage cifs files
Allow sanlock to read/write fuse files
SASL authentication server
Connect to SASL.
Domain allowed access.
All of the rules required to administrate
an sasl environment
Domain allowed access.
Role allowed access.
Allow sasl to read shadow
Standards Based Linux Instrumentation for Manageability.
Creates types and rules for a basic
sblim daemon domain.
Prefix for the domain.
Transition to gatherd.
Domain allowed to transition.
Read gatherd PID files.
Domain allowed access.
Connect to sblim_sfcb over a unix stream socket.
Domain allowed access.
Getattr on sblim executable.
Domain allowed to transition.
Connect to sblim_sfcb over a unix stream socket.
Domain allowed access.
Allow read and write access to sblim semaphores.
Domain allowed access.
All of the rules required to administrate
an gatherd environment
Domain allowed access.
Policy for sendmail.
Sendmail stub interface. No access allowed.
Domain allowed access.
Allow attempts to read and write to
sendmail unnamed pipes.
Domain to not audit.
Domain transition to sendmail.
Domain allowed access.
Execute sendmail in the sendmail domain.
The type of the process performing this action.
Execute the sendmail program in the sendmail domain.
Domain allowed access.
The role to allow the sendmail domain.
Send generic signals to sendmail.
Domain allowed access.
Read and write sendmail TCP sockets.
Domain allowed access.
Do not audit attempts to read and write
sendmail TCP sockets.
Domain to not audit.
Read and write sendmail unix_stream_sockets.
Domain allowed access.
Do not audit attempts to read and write
sendmail unix_stream_sockets.
Domain allowed access.
Read sendmail logs.
Domain allowed access.
Create, read, write, and delete sendmail logs.
Domain allowed access.
Create sendmail logs with the correct type.
Domain allowed access.
Manage sendmail tmp files.
Domain allowed access.
Execute sendmail in the unconfined sendmail domain, and
allow the specified role the unconfined sendmail domain,
and use the caller's terminal.
Domain allowed access.
Role allowed access.
Execute sendmail in the unconfined sendmail domain.
Domain allowed access.
All of the rules required to administrate
an sendmail environment
Domain allowed access.
Role allowed access.
Sensor information logging daemon
Execute sensord in the sensord domain.
Domain allowed to transition.
All of the rules required to administrate
an sensord environment
Domain allowed access.
SELinux troubleshooting service
Connect to setroubleshootd over an unix stream socket.
Domain allowed access.
Dontaudit attempts to connect to setroubleshootd
over an unix stream socket.
Domain allowed access.
Send and receive messages from
setroubleshoot over dbus.
Domain allowed access.
dontaudit send and receive messages from
setroubleshoot over dbus.
Domain to not audit.
Send and receive messages from
setroubleshoot over dbus.
Domain allowed access.
Dontaudit read/write to a setroubleshoot leaked sockets.
Domain allowed access.
All of the rules required to administrate
an setroubleshoot environment
Domain allowed access.
Policy for gridengine MPI jobs
Allow sge to access nfs file systems.
Allow sge to connect to the network using any TCP port
OpenSLP server daemon to dynamically register services.
Transition to slpd.
Domain allowed to transition.
Execute slpd server in the slpd domain.
Domain allowed access.
All of the rules required to administrate
an slpd environment
Domain allowed access.
Role allowed access.
Service for downloading news feeds the slrn newsreader.
Allow the domain to search slrnpull spools.
domain allowed access
Allow the domain to create, read,
write, and delete slrnpull spools.
domain allowed access
Smart disk monitoring daemon policy
Allow caller to read smartmon temporary files.
The process type reading the temporary files.
All of the rules required to administrate
an smartmon environment
Domain allowed access.
Role allowed access.
Enable additional permissions needed to support
devices on 3ware controllers.
Smokeping network latency measurement.
Execute a domain transition to run smokeping.
Domain allowed to transition.
Execute smokeping server in the smokeping domain.
Domain allowed access.
Read smokeping PID files.
Domain allowed access.
Manage smokeping PID files.
Domain allowed access.
Get attributes of smokeping lib files.
Domain allowed access.
Read smokeping lib files.
Domain allowed access.
Manage smokeping lib files.
Domain allowed access.
All of the rules required to administrate
a smokeping environment
Domain allowed access.
Role allowed access.
Tools to send and receive short messages through GSM modems or mobile phones.
Search smsd lib directories.
Domain allowed access.
Read smsd lib files.
Domain allowed access.
Manage smsd lib files.
Domain allowed access.
Manage smsd lib directories.
Domain allowed access.
All of the rules required to
administrate an smstools environment.
Domain allowed access.
Role allowed access.
Simple network management protocol services
Connect to snmpd using a unix domain stream socket.
Domain allowed access.
Use snmp over a TCP connection. (Deprecated)
Domain allowed access.
Send and receive UDP traffic to SNMP (Deprecated)
Domain allowed access.
Read snmpd libraries.
Domain allowed access.
Read snmpd libraries directories
Domain allowed access.
Manage snmpd libraries directories
Domain allowed access.
Append snmpd libraries.
Domain allowed access.
Manage snmpd libraries files.
Domain allowed access.
dontaudit Read snmpd libraries.
Domain to not audit.
dontaudit write snmpd libraries files.
Domain to not audit.
All of the rules required to administrate
an snmp environment
Domain allowed access.
The role to be allowed to manage the snmp domain.
Snort network intrusion detection system
Execute a domain transition to run snort.
Domain allowed to transition.
All of the rules required to administrate
an snort environment
Domain allowed access.
The role to be allowed to manage the snort domain.
sound server for network audio server programs, nasd, yiff, etc
Connect to the sound server over a TCP socket (Deprecated)
Domain allowed access.
All of the rules required to administrate
an soundd environment
Domain allowed access.
The role to be allowed to manage the soundd domain.
Filter used for removing unsolicited email.
Role access for spamassassin
Role allowed access
User domain for the role
Execute the standalone spamassassin
program in the caller directory.
Domain allowed access.
Singnal the spam assassin daemon
The type of the process performing this action.
Execute the spamassassin daemon
program in the caller directory.
Domain allowed access.
Execute spamassassin client in the spamassassin client domain.
Domain allowed access.
Send kill signal to spamassassin client
Domain allowed access.
Manage spamc home files.
Domain allowed access.
Execute the spamassassin client
program in the caller directory.
Domain allowed access.
Execute spamassassin standalone client in the user spamassassin domain.
Domain allowed access.
read spamd lib files.
Domain allowed access.
Create, read, write, and delete
spamd lib files.
Domain allowed access.
Read temporary spamd file.
The type of the process performing this action.
Do not audit attempts to get attributes of temporary
spamd sockets/
Domain to not audit.
Connect to run spamd.
Domain allowed to connect.
Read spamd pid file.
Domain allowed to connect.
All of the rules required to administrate
an spamassassin environment
Domain allowed access.
The role to be allowed to manage the spamassassin domain.
Allow user spamassassin clients to use the network.
Allow spamd to read/write user home directories.
Alcatel speedtouch USB ADSL modem
Squid caching http proxy server
Execute squid in the squid domain.
The type of the process performing this action.
Execute squid
The type of the process performing this action.
Send generic signals to squid.
Domain allowed access.
Allow read and write squid
unix domain stream sockets.
Domain allowed access.
Do not audit attempts to search squid cache dirs
Domain to not audit.
Read squid configuration file.
Domain allowed access.
Append squid logs.
Domain allowed access.
Append squid logs.
Domain allowed access.
Create, read, write, and delete
squid logs.
Domain allowed access.
Use squid services by connecting over TCP. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an squid environment
Domain allowed access.
The role to be allowed to manage the squid domain.
Allow squid to connect to all ports, not just
HTTP, FTP, and Gopher ports.
Allow squid to run as a transparent proxy (TPROXY)
Secure shell client and server policy.
Basic SSH client template.
This template creates a derived domains which are used
for ssh client sessions. A derived
type is also created to protect the user ssh keys.
This template was added for NX.
The prefix of the domain (e.g., user
is the prefix for user_t).
The type of the domain.
The role associated with the user domain.
The template to define a ssh server.
This template creates a domains to be used for
creating a ssh server. This is typically done
to have multiple ssh servers of different sensitivities,
such as for an internal network-facing ssh server, and
a external network-facing ssh server.
The prefix of the server domain (e.g., sshd
is the prefix for sshd_t).
Role access for ssh
The prefix of the role (e.g., user
is the prefix for user_r).
Role allowed access
User domain for the role
Send a SIGCHLD signal to the ssh server.
Domain allowed access.
Send a generic signal to the ssh server.
Domain allowed access.
Read a ssh server unnamed pipe.
Domain allowed access.
Read and write a ssh server unnamed pipe.
Domain allowed access.
Read and write ssh server unix domain stream sockets.
Domain allowed access.
Read and write ssh server unix dgram sockets.
Domain allowed access.
Read and write ssh server TCP sockets.
Domain allowed access.
Do not audit attempts to read and write
ssh server TCP sockets.
Domain to not audit.
Connect to SSH daemons over TCP sockets. (Deprecated)
Domain allowed access.
Execute the ssh daemon sshd domain.
Domain allowed access.
Execute sshd server in the sshd domain.
The type of the process performing this action.
Execute the ssh client in the caller domain.
Domain allowed access.
Set the attributes of sshd key files.
Domain allowed access.
Execute the ssh agent client in the caller domain.
Domain allowed access.
Read ssh home directory content
Domain allowed access.
Execute the ssh key generator in the ssh keygen domain.
Domain allowed access.
Execute the ssh key generator in the caller domain.
Domain allowed to transition.
Execute ssh-keygen in the iptables domain, and
allow the specified role the ssh-keygen domain.
Domain allowed to transition.
Role allowed access.
Read ssh server keys
Domain allowed access.
Manage ssh home directory content
Domain allowed access.
Create Secure Shell home directory
content.
Domain allowed access.
Delete from the ssh temp files.
Domain allowed access.
Send a null signal to sshd processes.
Domain allowed access.
Allow domain dyntransition to chroot_user_t domain.
Domain allowed access.
Getattr ssh home directory
Domain allowed access.
Dontaudit search ssh home directory
Domain allowed access.
Do not audit attempts to read and
write the sshd pty type.
Domain to not audit.
Read and write inherited sshd pty type.
Domain to not audit.
All of the rules required to administrate
an sshd environment
Domain allowed access.
Role allowed access.
allow host key based authentication
Allow ssh logins as sysadm_r:sysadm_t
Allow ssh with chroot env to read and write files
in the user home directories
Allow ssh with chroot env to manage all files
Allow ssh with chroot env to apache content
System Security Services Daemon
Execute a domain transition to run sssd.
Domain allowed to transition.
Execute sssd server in the sssd domain.
Domain allowed access.
Read sssd public files.
Domain allowed access.
Read sssd PID files.
Domain allowed access.
Manage sssd var_run files.
Domain allowed access.
Search sssd lib directories.
Domain allowed access.
Do not audit attempts to search sssd lib directories.
Domain to not audit.
Read sssd lib files.
Domain allowed access.
Create, read, write, and delete
sssd lib files.
Domain allowed access.
Send and receive messages from
sssd over dbus.
Domain allowed access.
Connect to sssd over an unix stream socket.
Domain allowed access.
Allow attempts to read and write to
sssd pipes
Domain allowed access.
All of the rules required to administrate
an sssd environment
Domain allowed access.
The role to be allowed to manage the sssd domain.
Instrumentation System Server
Execute stapserver in the stapserver domain.
Domain allowed to transition.
Read stapserver's log files.
Domain allowed access.
Append to stapserver log files.
Domain allowed access.
Manage stapserver log files
Domain allowed access.
Read stapserver PID files.
Domain allowed access.
Manage stapserver lib files
Domain allowed access.
All of the rules required to administrate
an stapserver environment
Domain allowed access.
SSL Tunneling Proxy
Define the specified domain as a stunnel inetd service.
The type associated with the stunnel inetd service process.
The type associated with the process program.
policy for svnserve
Transition to svnserve.
Domain allowed to transition.
Execute svnserve server in the svnserve domain.
Domain allowed access.
Read svnserve PID files.
Domain allowed access.
All of the rules required to administrate
an svnserve environment
Domain allowed access.
policy for swift
Execute TEMPLATE in the swift domin.
Domain allowed to transition.
Read swift PID files.
Domain allowed access.
Manage swift data files.
Domain allowed access.
Read and write swift lock files.
Domain allowed access.
Transition content labels to swift named content
Domain allowed access.
Determine whether swift can
connect to all TCP ports
Policy for sysstat. Reports on various system states
Manage sysstat logs.
Domain allowed access.
Policy for TCP daemon.
Execute tcpd in the tcpd domain.
The type of the process performing this action.
Create a domain for services that
utilize tcp wrappers.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Telnet daemon
Trivial file transfer protocol daemon
Read tftp content
Domain allowed access.
Manage tftp /var/lib files.
Domain allowed access.
Search tftp /var/lib directories.
Domain allowed access.
Search tftp /var/lib directories.
Domain allowed access.
Manage tftp /var/lib files.
Domain allowed access.
Create objects in tftpdir directories
with specified types.
Domain allowed access.
Private file type.
Class of the object being created.
All of the rules required to administrate
an tftp environment
Domain allowed access.
Allow tftp to modify public files
used for public file transfer services.
Allow tftp to read from a NFS store
for public file transfer services.
Allow tftp to read from a CIFS store
for public file transfer services.
Linux Target Framework Daemon.
Linux target framework (tgt) aims to simplify various
SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation
and maintenance. Our key goals are the clean integration into
the scsi-mid layer and implementing a great portion of tgt
in user space.
Allow read and write access to tgtd semaphores.
Domain allowed access.
Manage tgtd sempaphores.
Domain allowed access.
Connect to tgtd using a unix domain stream socket.
Domain allowed access.
MIDI to WAV converter and player configured as a service
policy for tomcat
Creates types and rules for a basic
tomcat daemon domain.
Prefix for the domain.
Transition to tomcat.
Domain allowed to transition.
Search tomcat cache directories.
Domain allowed access.
Read tomcat cache files.
Domain allowed access.
Create, read, write, and delete
tomcat cache files.
Domain allowed access.
Manage tomcat cache dirs.
Domain allowed access.
Read tomcat's log files.
Domain allowed access.
Append to tomcat log files.
Domain allowed access.
Manage tomcat log files
Domain allowed access.
Search tomcat lib directories.
Domain allowed access.
Read tomcat lib files.
Domain allowed access.
Manage tomcat lib files.
Domain allowed access.
Manage tomcat lib directories.
Domain allowed access.
Read tomcat PID files.
Domain allowed access.
All of the rules required to administrate
an tomcat environment
Domain allowed access.
TOR, the onion router
Execute a domain transition to run TOR.
Domain allowed to transition.
All of the rules required to administrate
an tor environment
Domain allowed access.
The role to be allowed to manage the tor domain.
Allow tor daemon to bind
tcp sockets to all unreserved ports.
HTTP transperant proxy
Dynamic adaptive system tuning daemon
Execute a domain transition to run tuned.
Domain allowed to transition.
Execute tuned in the caller domain.
Domain allowed access.
Read tuned PID files.
Domain allowed access.
Manage tuned PID files.
Domain allowed access.
Execute tuned server in the tuned domain.
The type of the process performing this action.
All of the rules required to administrate
an tuned environment
Domain allowed access.
Role allowed access.
ucspitcp policy
Policy for DJB's ucspi-tcpd
Define a specified domain as a ucspitcp service.
Domain allowed access.
The type associated with the process program.
Iptables/netfilter userspace logging daemon.
Execute a domain transition to run ulogd.
Domain allowed to transition.
Allow the specified domain to read
ulogd configuration files.
Domain allowed access.
Allow the specified domain to read ulogd's log files.
Domain allowed access.
Allow the specified domain to search ulogd's log files.
Domain allowed to transition.
Allow the specified domain to append to ulogd's log files.
Domain allowed access.
All of the rules required to administrate
an ulogd environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Uptime daemon
USB multiplexing daemon for communicating with Apple iPod Touch and iPhone
Execute a domain transition to run usbmuxd.
Domain allowed to transition.
Connect to usbmuxd over a unix domain
stream socket.
Domain allowed access.
Unix to Unix Copy
Execute the uucico program in the
uucpd_t domain.
Domain allowed to transition.
Allow the specified domain to append
to uucp log files.
Domain allowed access.
Create, read, write, and delete uucp spool files.
Domain allowed access.
Execute the master uux program in the
uux_t domain.
Domain allowed access.
All of the rules required to administrate
an uucp environment
Domain allowed access.
policy for uuidd
Transition to uuidd.
Domain allowed to transition.
Execute uuidd server in the uuidd domain.
Domain allowed access.
Search uuidd lib directories.
Domain allowed access.
Read uuidd lib files.
Domain allowed access.
Manage uuidd lib files.
Domain allowed access.
Manage uuidd lib directories.
Domain allowed access.
Read uuidd PID files.
Domain allowed access.
Connect to uuidd over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an uuidd environment
Domain allowed access.
Role allowed access.
University of Washington IMAP toolkit POP3 and IMAP mail server
Execute the UW IMAP/POP3 servers with a domain transition.
Domain allowed access.
Varnishd http accelerator daemon
Execute varnishd in the varnishd domain.
The type of the process performing this action.
Execute varnishd
The type of the process performing this action.
Read varnishd configuration file.
Domain allowed access.
Read varnish lib files.
Domain allowed access.
Read varnish logs.
Domain allowed access.
Append varnish logs.
Domain allowed access.
Manage varnish logs.
Domain allowed access.
All of the rules required to administrate
an varnishlog environment
Domain allowed access.
The role to be allowed to manage the varnishlog domain.
All of the rules required to administrate
an varnishd environment
Domain allowed access.
The role to be allowed to manage the varnishd domain.
Allow varnishd to connect to all ports,
not just HTTP.
policy for vdagent
Getattr on vdagent executable.
Domain allowed to transition.
Execute a domain transition to run vdagent.
Domain allowed access.
Get the attributes of vdagent logs.
Domain allowed access.
Read vdagent PID files.
Domain allowed access.
Connect to vdagent over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an vdagent environment
Domain allowed access.
Virtual host metrics daemon
Execute a domain transition to run vhostmd.
Domain allowed to transition.
Execute vhostmd server in the vhostmd domain.
The type of the process performing this action.
Allow domain to read, vhostmd tmpfs files
Domain to not audit.
Do not audit attempts to read,
vhostmd tmpfs files
Domain to not audit.
Allow domain to read and write vhostmd tmpfs files
Domain to not audit.
Create, read, write, and delete vhostmd tmpfs files.
Domain to not audit.
Read vhostmd PID files.
Domain allowed access.
Manage vhostmd var_run files.
Domain allowed access.
Connect to vhostmd over an unix domain stream socket.
Domain allowed access.
Dontaudit read and write to vhostmd
over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an vhostmd environment
Domain allowed access.
Role allowed access.
Libvirt virtualization API
Creates types and rules for a basic
qemu process domain.
Prefix for the domain.
Make the specified type usable as a virt image
Type to be used as a virtual image
Getattr on virt executable.
Domain allowed to transition.
Execute a domain transition to run virt.
Domain allowed to transition.
Execute a domain transition to run virt.
Domain allowed to transition.
Role allowed to access.
Transition to virt_bridgehelper.
Domain allowed to transition.
Connect to virt over an unix domain stream socket.
Domain allowed access.
Allow domain to attach to virt TUN devices
Domain allowed access.
Read virt config files.
Domain allowed access.
manage virt config files.
Domain allowed access.
Allow domain to search virt image files
Domain to not audit.
Allow domain to search virt image direcories
Domain allowed access.
Allow domain to manage virt image files
Domain to not audit.
Allow domain to write virt image files
Domain to not audit.
Read virt PID files.
Domain allowed access.
Read virt PID lnk files.
Domain allowed access.
Manage virt pid files.
Domain allowed access.
Search virt lib directories.
Domain allowed access.
Read virt lib files.
Domain allowed access.
Dontaudit inherited read virt lib files.
Domain to not audit.
Create, read, write, and delete
virt lib files.
Domain allowed access.
Allow the specified domain to read virt's log files.
Domain allowed access.
Allow the specified domain to append
virt log files.
Domain allowed to transition.
Allow domain to manage virt log files
Domain to not audit.
Allow domain to read virt blk image files
Domain allowed access.
Allow domain to read virt image files
Domain to not audit.
Allow domain to read virt image files
Domain to not audit.
Create, read, write, and delete
svirt cache files.
Domain allowed access.
Allow domain to manage virt image files
Domain to not audit.
All of the rules required to administrate
an virt environment
Domain allowed access.
Role allowed access.
Execute qemu in the svirt domain, and
allow the specified role the svirt domain.
Domain allowed access
The role to be allowed the svirt domain.
Do not audit attempts to write virt daemon unnamed pipes.
Domain allowed access.
Send a sigkill to virtual machines
Domain allowed access.
Send a sigkill to virtd daemon
Domain allowed access.
Send a signal to virtual machines
Domain allowed access.
allow domain to read
virt tmpf files
Domain allowed access
dontaudit domain to write
virt tmp files
Domain allowed access
Allow domain to write
virt tmp sock files
Domain allowed access
Execute Sandbox Files
Domain allowed access.
Manage Sandbox Files
Domain allowed access.
Relabel Sandbox File systems
Domain allowed access.
Mounton Sandbox Files
Domain allowed access.
Connect to virt over a unix domain stream socket.
Domain allowed access.
Allow virt to use serial/parallell communication ports
Allow virt to read fuse files
Allow virt to manage nfs files
Allow virt to manage cifs files
Allow virt to manage device configuration, (pci)
Allow confined virtual guests to interact with the sanlock
Allow virtual machine to interact with the xserver
Allow virt to use usb devices
Allow confined virtual guests to use executable memory and executable stack
W3C Markup Validator
Software watchdog.
All of the rules required to
administrate an watchdog environment.
Domain allowed access.
Role allowed access.
policy for wdmd
Execute a domain transition to run wdmd.
Domain allowed access.
Execute wdmd server in the wdmd domain.
The type of the process performing this action.
All of the rules required to administrate
an wdmd environment
Domain allowed access.
Role allowed access.
Connect to wdmd over an unix stream socket.
Domain allowed access.
Allow the specified domain to read/write wdmd's tmpfs files.
Domain allowed access.
Allow the specified domain to read/write wdmd's tmpfs files.
Domain allowed access.
X Windows Font Server
Read a X font server named socket.
Domain allowed access.
Connect to a X font server over
a unix domain stream socket.
Domain allowed access.
Allow the specified domain to execute xfs
in the caller domain.
Domain allowed access.
X print server
X Windows Server
Rules required for using the X Windows server
and environment, for restricted users.
Role allowed access.
Domain allowed access.
Rules required for using the X Windows server
and environment.
Role allowed access.
Domain allowed access.
Create sessions on the X server, with read-only
access to the X server shared
memory segments.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Create sessions on the X server, with read and write
access to the X server shared
memory segments.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Create non-drawing client sessions on an X server.
Domain allowed access.
Create full client sessions
on a user X server.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
X client application.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Client domain allowed access.
Template for creating the set of types used
in an X windows domain.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
X client application.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Client domain allowed access.
The type of the domain SYSV tmpfs files.
Read user fonts, user font configuration,
and manage the user font cache.
Read user fonts, user font configuration,
and manage the user font cache.
This is a templated interface, and should only
be called from a per-userdomain template.
Domain allowed access.
Transition to the Xauthority domain.
Domain allowed access.
Allow exec of Xauthority program..
Domain allowed to transition.
Dontaudit exec of Xauthority program.
Domain allowed access.
Create a Xauthority file in the user home directory.
Domain allowed access.
Read all users fonts, user font configurations,
and manage all users font caches.
Domain allowed access.
Read all users .Xauthority.
Domain allowed access.
Set the attributes of the X windows console named pipes.
Domain allowed access.
Read and write the X windows console named pipe.
Domain allowed access.
Use file descriptors for xdm.
Domain allowed access.
Do not audit attempts to inherit
XDM file descriptors.
Domain to not audit.
Read and write XDM unnamed pipes.
Domain allowed access.
Do not audit attempts to read and write
XDM unnamed pipes.
Domain to not audit.
Connect to XDM over a unix domain
stream socket.
Domain allowed access.
Read xdm-writable configuration files.
Domain allowed access.
Set the attributes of XDM temporary directories.
Domain allowed access.
Create a named socket in a XDM
temporary directory.
Domain allowed access.
Read XDM pid files.
Domain allowed access.
Dontaudit Read XDM pid files.
Domain allowed access.
Read XDM var lib files.
Domain allowed access.
Make an X session script an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Execute an X session in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
Execute an Xsession in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Get the attributes of X server logs.
Domain allowed access.
Do not audit attempts to write the X server
log files.
Domain to not audit
Do not audit attempts to write the X server
log files.
Domain to not audit
Read X keyboard extension libraries.
Domain to not audit
Read xdm config files.
Domain to not audit
Manage xdm config files.
Domain to not audit
Read xdm temporary files.
Domain to not audit
Do not audit attempts to read xdm temporary files.
Domain to not audit
Read write xdm temporary files.
Domain to not audit
Create, read, write, and delete xdm temporary files.
Domain to not audit
dontaudit getattr xdm temporary named sockets.
Domain to not audit
Execute the X server in the X server domain.
Domain allowed access.
Signal X servers
Domain to not audit
Kill X servers
Domain to not audit
Read and write X server Sys V Shared
memory segments.
Domain allowed access.
Do not audit attempts to read and write to
X server sockets.
Domain to not audit
Do not audit attempts to read and write X server
unix domain stream sockets.
Domain allowed access.
Connect to the X server over a unix domain
stream socket.
Domain allowed access.
Dontaudit attempts to connect to xserver
over an unix stream socket.
Domain to not audit.
Read X server temporary files.
Domain to not audit
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
virtual core keyboard and virtual core pointer devices.
Domain allowed access.
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
display.
Domain allowed access.
Dontaudit append to .xsession-errors file
Domain to not audit
append to .xsession-errors file
Domain to not audit
Manage the xdm_spool files
Domain allowed access.
Send and receive messages from
xdm over dbus.
Domain allowed access.
Read xserver files created in /var/run
Domain allowed access.
Execute xserver files created in /var/run
Domain allowed access.
Write xserver files created in /var/run
Domain allowed access.
Allow append the xdm
log files.
Domain to not audit
Read a user Iceauthority domain.
Domain allowed access.
Read user homedir fonts.
Domain allowed access.
Search XDM var lib dirs.
Domain allowed access.
Make an X executable an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Execute xsever in the xserver domain, and
allow the specified role the xserver domain.
The type of the process performing this action.
The role to be allowed the xserver domain.
Execute xsever in the xserver domain, and
allow the specified role the xserver domain.
The type of the process performing this action.
The role to be allowed the xserver domain.
Read user homedir fonts.
Domain allowed access.
Allows clients to write to the X server shared
memory segments.
Allows XServer to execute writable memory
Allows xdm to execute bootloader
Allow xdm logins as sysadm
Support X userspace object manager
Allow regular users direct dri device access
Distributed infrastructure monitoring
Execute a domain transition to run zabbix.
Domain allowed to transition.
Allow connectivity to the zabbix server
Domain allowed access.
Allow the specified domain to read zabbix's log files.
Domain allowed access.
Allow the specified domain to append
zabbix log files.
Domain allowed access.
Read zabbix PID files.
Domain allowed access.
Allow the specified domain to read zabbix's log files.
Domain allowed access.
Read zabbix PID files.
Domain allowed access.
Allow connectivity to a zabbix agent
Domain allowed access.
All of the rules required to administrate
an zabbix environment
Domain allowed access.
The role to be allowed to manage the zabbix domain.
Determine whether zabbix can
connect to all TCP ports
Zarafa collaboration platform.
Creates types and rules for a basic
zararfa init daemon domain.
Prefix for the domain.
Allow the specified domain to search
zarafa configuration dirs.
Domain allowed access.
Execute a domain transition to run zarafa_deliver.
Domain allowed to transition.
Read zarafa_deliver executable.
Domain allowed to transition.
Execute a domain transition to run zarafa_server.
Domain allowed to transition.
Connect to zarafa-server unix domain stream socket.
Domain allowed access.
Allow the specified domain to manage
zarafa /var/lib files.
Domain allowed access.
Allow the specified domain to manage
zarafa /var/lib files.
Domain allowed access.
Zebra border gateway protocol network routing service
Read the configuration files for zebra.
Domain allowed access.
Connect to zebra over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an zebra environment
Domain allowed access.
The role to be allowed to manage the zebra domain.
Allow zebra daemon to write it configuration files
policy for z/OS Remote-services Audit dispatcher plugin
Execute a domain transition to run audispd-zos-remote.
Domain allowed to transition.
Allow specified type and role to transition and
run in the zos_remote_t domain. Allow specified type
to use zos_remote_t terminal.
Domain allowed access
The role to be allowed the zos_remote domain.