?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for administrative functions, such as package management.
policy for accountsd
Execute a domain transition to run accountsd.
Domain allowed to transition.
Search accountsd lib directories.
Domain allowed access.
Read accountsd lib files.
Domain allowed access.
Create, read, write, and delete
accountsd lib files.
Domain allowed access.
Manage accountsd var_lib files.
Domain allowed access.
Send and receive messages from
accountsd over dbus.
Domain allowed access.
Do not audit attempts to read and write Accounts Daemon
fifo file.
Domain allowed access.
All of the rules required to administrate
an accountsd environment
Domain allowed access.
Berkeley process accounting
Transition to the accounting management domain.
Domain allowed access.
Execute accounting management tools in the caller domain.
The type of the process performing this action.
Execute accounting management data in the caller domain.
The type of the process performing this action.
Create, read, write, and delete process accounting data.
The type of the process performing this action.
Ainit ALSA configuration tool
Domain transition to alsa
Domain allowed access.
Allow read and write access to alsa semaphores.
Domain allowed access.
Allow read and write access to alsa shared memory.
Domain allowed access.
Read alsa writable config files.
Domain allowed access.
Manage alsa writable config files.
Domain allowed access.
Read alsa lib files.
Domain allowed access.
Automated backup program.
Execute amrecover in the amanda_recover domain.
The type of the process performing this action.
Execute amrecover in the amanda_recover domain, and
allow the specified role the amanda_recover domain.
The type of the process performing this action.
The role to be allowed the amanda_recover domain.
Search amanda library directories.
The type of the process performing this action.
Allow append amanda lib files.
Domain to allow
Do not audit attempts to read /etc/dumpdates.
Domain to not audit.
Allow read/writing /etc/dumpdates.
Domain to allow
Search amanda library directories.
The type of the process performing this action.
Allow read/writing amanda logs
Domain to allow
Search amanda var library directories.
The type of the process performing this action.
Abstract Machine Test Utility
Execute amtu in the amtu domain.
Domain allowed access.
Execute amtu in the amtu domain, and
allow the specified role the amtu domain.
Domain allowed access.
The role to be allowed the amtu domain.
Policy for the Anaconda installer.
Execute preupgrade in the caller domain.
Domain allowed to transition.
Execute a domain transition to run preupgrade.
Domain allowed to transition.
Read preupgrade lib files
Domain allowed access.
Manage preupgrade lib files
Domain allowed access.
APT advanced package tool.
Execute apt programs in the apt domain.
The type of the process performing this action.
Execute apt programs in the apt domain.
The type of the process performing this action.
The role to allow the apt domain.
Inherit and use file descriptors from apt.
The type of the process performing this action.
Do not audit attempts to use file descriptors from apt.
The type of the process attempting performing this action
which should not be audited.
Read from an unnamed apt pipe.
The type of the process performing this action.
Read and write an unnamed apt pipe.
The type of the process performing this action.
Read from and write to apt ptys.
Domain allowed access.
Read the apt package cache.
The type of the process performing this action.
Read the apt package database.
The type of the process performing this action.
Create, read, write, and delete the apt package database.
The type of the process performing this action.
Do not audit attempts to create, read,
write, and delete the apt package database.
Domain to not audit.
System backup scripts
Execute backup in the backup domain.
Domain allowed access.
Execute backup in the backup domain, and
allow the specified role the backup domain.
The type of the process performing this action.
The role to be allowed the backup domain.
Policy for the kernel modules, kernel image, and bootloader.
Execute bootloader in the bootloader domain.
The type of the process performing this action.
Execute bootloader in the caller domain.
The type of the process performing this action.
Execute bootloader interactively and do
a domain transition to the bootloader domain.
The type of the process performing this action.
The role to be allowed the bootloader domain.
Read the bootloader configuration file.
The type of the process performing this action.
Read and write the bootloader
configuration file.
The type of the process performing this action.
Manage the bootloader
configuration file.
Domain allowed access.
Read and write the bootloader
temporary data in /tmp.
The type of the process performing this action.
Read and write the bootloader
temporary data in /tmp.
The type of the process performing this action.
Utilities for configuring the linux ethernet bridge
Execute a domain transition to run brctl.
Domain allowed to transition.
Execute a domain transition to run brctl.
Domain allowed to transition.
Execute brctl in the brctl domain.
Domain allowed to transition.
Role allowed access.
Digital Certificate Tracking
Domain transition to certwatch.
Domain allowed access.
Execute certwatch in the certwatch domain, and
allow the specified role the certwatch domain,
and use the caller's terminal. Has a sigchld
backchannel.
The type of the process performing this action.
The role to be allowed the certwatch domain.
Execute certwatch in the certwatch domain, and
allow the specified role the certwatch domain,
and use the caller's terminal. Has a sigchld
backchannel. (Deprecated)
The type of the process performing this action.
The role to be allowed the certwatch domain.
The type of the terminal allow the certwatch domain to use.
Determine of the console connected to the controlling terminal.
Execute consoletype in the consoletype domain.
The type of the process performing this action.
Execute consoletype in the consoletype domain, and
allow the specified role the consoletype domain.
The type of the process performing this action.
The role to be allowed the consoletype domain.
Execute consoletype in the caller domain.
The type of the process performing this action.
ddcprobe retrieves monitor and graphics card information
Execute ddcprobe in the ddcprobe domain.
The type of the process performing this action.
Execute ddcprobe in the ddcprobe domain, and
allow the specified role the ddcprobe domain.
The type of the process performing this action.
Role to be authenticated for ddcprobe domain.
Policy for dmesg.
Execute dmesg in the dmesg domain.
The type of the process performing this action.
Execute dmesg in the caller domain.
The type of the process performing this action.
Decode DMI data for x86/ia64 bioses.
Execute dmidecode in the dmidecode domain.
Domain allowed access.
Execute dmidecode in the dmidecode domain, and
allow the specified role the dmidecode domain.
The type of the process performing this action.
The role to be allowed the dmidecode domain.
Execute dmidecode in the caller domain.
Domain allowed access.
Policy for the Debian package manager.
Execute dpkg programs in the dpkg domain.
The type of the process performing this action.
Execute dpkg_script programs in the dpkg_script domain.
Domain allowed access.
Execute dpkg programs in the dpkg domain.
The type of the process performing this action.
The role to allow the dpkg domain.
Inherit and use file descriptors from dpkg.
The type of the process performing this action.
Read from an unnamed dpkg pipe.
The type of the process performing this action.
Read and write an unnamed dpkg pipe.
The type of the process performing this action.
Inherit and use file descriptors from dpkg scripts.
The type of the process performing this action.
Read the dpkg package database.
The type of the process performing this action.
Create, read, write, and delete the dpkg package database.
The type of the process performing this action.
Do not audit attempts to create, read,
write, and delete the dpkg package database.
Domain to not audit.
Lock the dpkg package database.
The type of the process performing this action.
Final system configuration run during the first boot
after installation of Red Hat/Fedora systems.
Execute firstboot in the firstboot domain.
The type of the process performing this action.
Execute firstboot in the firstboot domain, and
allow the specified role the firstboot domain.
The type of the process performing this action.
The role to be allowed the firstboot domain.
Inherit and use a file descriptor from firstboot.
The type of the process performing this action.
Do not audit attempts to inherit a
file descriptor from firstboot.
Domain to not audit.
Write to a firstboot unnamed pipe.
The type of the process performing this action.
Read and Write to a firstboot unnamed pipe.
The type of the process performing this action.
Do not audit attemps to read and write to a firstboot unnamed pipe.
Domain to not audit.
Do not audit attemps to read and write to a firstboot
unix domain stream socket.
Domain to not audit.
dontaudit read and write an leaked file descriptors
Domain to not audit.
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
Execute a domain transition to run kismet.
Domain allowed to transition.
Execute kismet in the kismet domain, and
allow the specified role the kismet domain.
Domain allowed access
The role to be allowed the kismet domain.
Read kismet PID files.
Domain allowed access.
Manage kismet var_run files.
Domain allowed access.
Search kismet lib directories.
Domain allowed access.
Read kismet lib files.
Domain allowed access.
Create, read, write, and delete
kismet lib files.
Domain allowed access.
Manage kismet var_lib files.
Domain allowed access.
Allow the specified domain to read kismet's log files.
Domain allowed access.
Allow the specified domain to append
kismet log files.
Domain allowed to transition.
Allow domain to manage kismet log files
Domain to not audit.
All of the rules required to administrate an kismet environment
Domain allowed access.
Hardware detection and configuration tools
Execute kudzu in the kudzu domain.
The type of the process performing this action.
Execute kudzu in the kudzu domain, and
allow the specified role the kudzu domain.
The type of the process performing this action.
The role to be allowed the kudzu domain.
Get attributes of kudzu executable.
The type of the process performing this action.
Rotate and archive system logs
Execute logrotate in the logrotate domain.
The type of the process performing this action.
Execute logrotate in the logrotate domain, and
allow the specified role the logrotate domain.
The type of the process performing this action.
The role to be allowed the logrotate domain.
Execute logrotate in the caller domain.
The type of the process performing this action.
Inherit and use logrotate file descriptors.
Domain allowed access.
Do not audit attempts to inherit logrotate file descriptors.
The type of the process to not audit.
Read a logrotate temporary files.
The type of the process to not audit.
Allow logrotate to manage nfs files
System log analyzer and reporter
Read logwatch temporary files.
Domain allowed access.
Search logwatch cache directory.
Domain allowed access.
policy for mcelog
Execute a domain transition to run mcelog.
Domain allowed to transition.
Read mcelog logs.
Domain allowed access.
Determine whether mcelog can use all
the user ttys.
Network traffic graphing
Create and append mrtg logs.
Domain allowed access.
policy for ncftool
Execute a domain transition to run ncftool.
Domain allowed to transition.
Execute ncftool in the ncftool domain, and
allow the specified role the ncftool domain.
Domain allowed access
The role to be allowed the ncftool domain.
Role access for ncftool
Role allowed access
User domain for the role
Allow ncftool to read user content.
Network analysis utilities
Execute network utilities in the netutils domain.
Domain allowed access.
Execute network utilities in the netutils domain, and
allow the specified role the netutils domain.
Domain allowed access.
The role to be allowed the netutils domain.
Execute network utilities in the caller domain.
Domain allowed access.
Send generic signals to network utilities.
Domain allowed access.
Execute ping in the ping domain.
Domain allowed access.
Send a kill (SIGKILL) signal to ping.
Domain allowed access.
Send generic signals to ping.
Domain allowed access.
Execute ping in the ping domain, and
allow the specified role the ping domain.
Domain allowed access.
The role to be allowed the ping domain.
Conditionally execute ping in the ping domain, and
allow the specified role the ping domain.
Domain allowed access.
The role to be allowed the ping domain.
Execute ping in the caller domain.
Domain allowed access.
Execute traceroute in the traceroute domain.
Domain allowed access.
Execute traceroute in the traceroute domain, and
allow the specified role the traceroute domain.
Domain allowed access.
The role to be allowed the traceroute domain.
Conditionally execute traceroute in the traceroute domain, and
allow the specified role the traceroute domain.
Domain allowed access.
The role to be allowed the traceroute domain.
Execute traceroute in the caller domain.
Domain allowed access.
Control users use of ping and traceroute
No Interfaces
Portage Package Management System. The primary package management and
distribution system for Gentoo.
Execute emerge in the portage domain.
Domain allowed access.
Execute emerge in the portage domain, and
allow the specified role the portage domain.
Domain allowed access.
The role to allow the portage domain.
Template for portage sandbox.
Template for portage sandbox. Portage
does all compiling in the sandbox.
Domain Allowed Access
Execute gcc-config in the gcc_config domain.
Domain allowed access.
Execute gcc-config in the gcc_config domain, and
allow the specified role the gcc_config domain.
Domain allowed access.
The role to allow the gcc_config domain.
Do not audit attempts to search the
portage temporary directories.
Domain allowed access.
Do not audit attempts to read and write
the portage temporary files.
Domain allowed access.
Prelink ELF shared library mappings.
Execute the prelink program in the prelink domain.
Domain allowed access.
Execute the prelink program in the prelink domain.
Domain allowed access.
Execute the prelink program in the prelink domain.
Domain allowed access.
Execute the prelink program in the prelink domain.
Domain allowed access.
Execute the prelink program in the current domain.
Domain allowed access.
Getattr the prelink program in the current domain.
Domain allowed access.
Execute the prelink program in the prelink domain.
Domain allowed access.
The role to allow the prelink domain.
Make the specified file type prelinkable.
File type to be prelinked.
Read the prelink cache.
Domain allowed access.
Delete the prelink cache.
Domain allowed access.
Create, read, write, and delete
prelink log files.
Domain allowed access.
Create, read, write, and delete
prelink var_lib files.
Domain allowed access.
Relabel from files in the /boot directory.
Domain allowed access.
File system quota management
Execute quota management tools in the quota domain.
The type of the process performing this action.
Execute quota management tools in the quota domain, and
allow the specified role the quota domain.
The type of the process performing this action.
The role to be allowed the quota domain.
Do not audit attempts to get the attributes
of filesystem quota data files.
Domain to not audit.
Alow to read of filesystem quota data files.
Domain to not audit.
Create, read, write, and delete quota
flag files.
Domain to not audit.
Readahead, read files into page cache for improved performance
Policy for the RPM package manager.
Execute rpm programs in the rpm domain.
The type of the process performing this action.
Execute debuginfo_install programs in the rpm domain.
The type of the process performing this action.
Execute rpm_script programs in the rpm_script domain.
Domain allowed access.
Execute RPM programs in the RPM domain.
The type of the process performing this action.
The role to allow the RPM domain.
Execute the rpm client in the caller domain.
Domain allowed access.
Inherit and use file descriptors from RPM.
The type of the process performing this action.
Read from an unnamed RPM pipe.
The type of the process performing this action.
Read and write an unnamed RPM pipe.
The type of the process performing this action.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Do not audit attempts to create, read, write, and delete RPM
script temporary files.
Domain to not audit.
Send and receive messages from
rpm over dbus.
Domain allowed access.
dontaudit attempts to Send and receive messages from
rpm over dbus.
Domain allowed access.
Send and receive messages from
rpm_script over dbus.
Domain allowed access.
Allow the specified domain to append
to rpm log files.
Domain allowed access.
Create, read, write, and delete the RPM log.
The type of the process performing this action.
Search RPM log directory.
The type of the process performing this action.
Inherit and use file descriptors from RPM scripts.
The type of the process performing this action.
Create, read, write, and delete RPM
script temporary files.
Domain allowed access.
Allow the specified domain to append
to rpm tmp files.
Domain allowed access.
Create, read, write, and delete RPM
temporary files.
Domain allowed access.
read, RPM
script temporary files.
Domain allowed access.
Read the RPM package database.
The type of the process performing this action.
Delete the RPM package database.
The type of the process performing this action.
Create, read, write, and delete the RPM package database.
The type of the process performing this action.
Do not audit attempts to create, read,the RPM package database.
Domain to not audit.
Read the RPM cache.
The type of the process performing this action.
Create, read, write, and delete the RPM package database.
The type of the process performing this action.
Do not audit attempts to create, read,
write, and delete the RPM package database.
Domain to not audit.
Dontaudit search the RPM package database.
Domain allowed access.
Read rpm pid files.
Domain allowed access.
Create, read, write, and delete rpm pid files.
Domain allowed access.
Create files in /var/run with the rpm pid file type.
Domain allowed access.
Allow application to transition to rpm_script domain.
Domain allowed access.
Send a null signal to rpm.
Domain allowed access.
Send a null signal to rpm.
Domain allowed access.
Sectool security audit tool
Shoreline Firewall high-level tool for configuring netfilter
Execute a domain transition to run shorewall.
Domain allowed to transition.
Execute a domain transition to run shorewall.
Domain allowed to transition.
Read shorewall etc configuration files.
Domain allowed access.
Read shorewall /var/lib files.
Domain allowed access.
Read and write shorewall /var/lib files.
Domain allowed access.
Read shorewall tmp files.
Domain allowed access.
All of the rules required to administrate
an shorewall environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
policy for shutdown
Execute a domain transition to run shutdown.
Domain allowed to transition.
Execute shutdown in the shutdown domain, and
allow the specified role the shutdown domain.
Domain allowed access
The role to be allowed the shutdown domain.
Role access for shutdown
Role allowed access
User domain for the role
Recieve sigchld from shutdown
Domain allowed access
Send and receive messages from
shutdown over dbus.
Domain allowed access.
Get attributes of shutdown executable.
Domain allowed access.
The Fedora hardware profiler client
Run shells with substitute user and group
Restricted su domain template.
This template creates a derived domain which is allowed
to change the linux user id, to run shells as a different
user.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The type of the user domain.
The role associated with the user domain.
The role template for the su module.
The prefix of the user role (e.g., user
is the prefix for user_r).
The role associated with the user domain.
The type of the user domain.
Execute su in the caller domain.
Domain allowed access.
Execute a command with a substitute user
The role template for the sudo module.
This template creates a derived domain which is allowed
to change the linux user id, to run commands as a different
user.
The prefix of the user role (e.g., user
is the prefix for user_r).
The user role.
The user domain associated with the role.
Send a SIGCHLD signal to the sudo domain.
Domain allowed access.
Allow execute sudo in called domain.
This interfaces is added for nova-stack policy.
Domain allowed access.
Allow to manage sudo database in called domain.
Domain allowed access.
SUID/SGID program monitoring
Allow the specified domain to read
sxid log files.
Domain allowed access.
Manage temporary directory sizes and file ages
Execute tmpreaper in the caller domain.
The type of the process performing this action.
Determine whether tmpreaper can use
nfs file systems.
Determine whether tmpreaper can use samba_share files
Tripwire file integrity checker.
Tripwire file integrity checker.
NOTE: Tripwire creates temp file in its current working directory.
This policy does not allow write access to home directories, so
users will need to either cd to a directory where they have write
permission, or set the TEMPDIRECTORY variable in the tripwire config
file. The latter is preferable, as then the file_type_auto_trans
rules will kick in and label the files as private to tripwire.
Execute tripwire in the tripwire domain.
Domain allowed access.
Execute tripwire in the tripwire domain, and
allow the specified role the tripwire domain.
Domain allowed access.
The role to be allowed the tripwire domain.
Execute twadmin in the twadmin domain.
Domain allowed access.
Execute twadmin in the twadmin domain, and
allow the specified role the twadmin domain.
Domain allowed access.
The role to be allowed the twadmin domain.
Execute twprint in the twprint domain.
Domain allowed access.
Execute twprint in the twprint domain, and
allow the specified role the twprint domain.
Domain allowed access.
The role to be allowed the twprint domain.
Execute siggen in the siggen domain.
Domain allowed access.
Execute siggen in the siggen domain, and
allow the specified role the siggen domain.
Domain allowed access.
The role to be allowed the siggen domain.
Time zone updater
Execute a domain transition to run tzdata.
Domain allowed to transition.
Execute the tzdata program in the tzdata domain.
Domain allowed access.
The role to allow the tzdata domain.
Red Hat utility to change /etc/fstab.
Execute updfstab in the updfstab domain.
The type of the process performing this action.
List kernel modules of USB devices
Execute usbmodules in the usbmodules domain.
Domain allowed access.
Execute usbmodules in the usbmodules domain, and
allow the specified role the usbmodules domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the usbmodules domain.
Policy for managing user accounts.
Execute chfn in the chfn domain.
The type of the process performing this action.
Execute chfn in the chfn domain, and
allow the specified role the chfn domain.
The type of the process performing this action.
The role to be allowed the chfn domain.
Execute groupadd in the groupadd domain.
The type of the process performing this action.
Check access to the groupadd executable.
Domain allowed access.
Execute groupadd in the groupadd domain, and
allow the specified role the groupadd domain.
The type of the process performing this action.
The role to be allowed the groupadd domain.
Execute passwd in the passwd domain.
The type of the process performing this action.
Send sigkills to passwd.
Domain allowed access.
Execute passwd in the passwd domain, and
allow the specified role the passwd domain.
The type of the process performing this action.
The role to be allowed the passwd domain.
Check access to the passwd executable
Domain allowed access.
Execute password admin functions in
the admin passwd domain.
Domain allowed access.
Execute passwd admin functions in the admin
passwd domain, and allow the specified role
the admin passwd domain.
The type of the process performing this action.
The role to be allowed the admin passwd domain.
Dontaudit attempts to use useradd fds
The type of the process performing this action.
Execute useradd in the useradd domain.
The type of the process performing this action.
Execute useradd in the useradd domain, and
allow the specified role the useradd domain.
The type of the process performing this action.
The role to be allowed the useradd domain.
Check access to the useradd executable.
Domain allowed access.
Read the crack database.
The type of the process performing this action.
run real-mode video BIOS code to alter hardware state
Execute vbetool application in the vbetool domain.
Domain allowed access.
Execute vbetool in the vbetool domain, and
allow the specified role the vbetool domain.
Domain allowed access.
The role to be allowed the vbetool domain.
Ignore vbetool mmap_zero errors.
Virtual Private Networking client
Execute VPN clients in the vpnc domain.
Domain allowed access.
Execute VPN clients in the vpnc domain, and
allow the specified role the vpnc domain.
Domain allowed access.
The role to be allowed the vpnc domain.
Send VPN clients the kill signal.
Domain allowed access.
Send generic signals to VPN clients.
Domain allowed access.
Send signull to VPN clients.
Domain allowed access.
Send and receive messages from
Vpnc over dbus.
Domain allowed access.
Relabelfrom from vpnc socket.
Domain allowed access.
Policy modules for applications
GNAT Ada95 compiler
Execute the ada program in the ada domain.
Domain allowed access.
Execute ada in the ada domain, and
allow the specified role the ada domain.
Domain allowed access.
The role to be allowed the ada domain.
Tool for non-root processes to bind to reserved ports
Use authbind to bind to a reserved port.
Domain allowed access.
AWStats is a free powerful and featureful tool that generates advanced
web, streaming, ftp or mail server statistics, graphically.
Read and write awstats unnamed pipes.
Domain allowed access.
Execute awstats cgi scripts in the caller domain.
Domain allowed access.
Determine whether awstats can
purge httpd log files.
Squid log analysis
Allow domain to read calamaris www files.
Domain allowed access.
Policy for cdrecord
Role access for cdrecord
Role allowed access
User domain for the role
Allow cdrecord to read various content.
nfs, samba, removable devices, user temp
and untrusted content files
policy for chrome
Execute a domain transition to run chrome_sandbox.
Domain allowed to transition.
Execute chrome_sandbox in the chrome_sandbox domain, and
allow the specified role the chrome_sandbox domain.
Domain allowed access
The role to be allowed the chrome_sandbox domain.
Role access for chrome sandbox
Role allowed access
User domain for the role
Role access for chrome sandbox
Role allowed access
User domain for the role
Dontaudit read/write to a chrome_sandbox leaks
Domain to not audit.
Command-line CPU frequency settings.
Ethereal packet capture tool.
Role access for ethereal
Role allowed access
User domain for the role
Run ethereal in ethereal domain.
Domain allowed access.
Run tethereal in the tethereal domain.
Domain allowed access.
Execute tethereal in the tethereal domain, and
allow the specified role the tethereal domain.
Domain allowed access.
The role to be allowed the tethereal domain.
Evolution email client
Role access for evolution
Role allowed access
User domain for the role
Create objects in users evolution home folders.
Domain allowed access.
Private file type.
The object class of the object being created.
Connect to evolution unix stream socket.
Domain allowed access.
Send and receive messages from
evolution over dbus.
Domain allowed access.
Send and receive messages from
evolution_alarm over dbus.
Domain allowed access.
execmem domain
Execute the execmem program in the execmem domain.
Domain allowed access.
The role template for the execmem module.
This template creates a derived domains which are used
for execmem applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Execute a execmem_exec file
in the specified domain.
Domain allowed access.
The type of the new process.
Execmod the execmem_exec applications
Domain allowed access.
policy for firewallgui
Send and receive messages from
firewallgui over dbus.
Domain allowed access.
Games
Role access for games
Role allowed access
User domain for the role
Allow the specified domain to read/write
games data.
Domain allowed access.
giFT peer to peer file sharing tool
Role access for gift
Role allowed access
User domain for the role
Tools for managing and hosting git repositories.
Execute a domain transition to run gitosis.
Domain allowed to transition.
Execute gitosis-serve in the gitosis domain, and
allow the specified role the gitosis domain.
Domain allowed access
Role allowed access.
Allow the specified domain to read
gitosis lib files.
Domain allowed access.
Allow the specified domain to manage
gitosis lib files.
Domain allowed access.
GNU network object model environment (GNOME)
Role access for gnome
Role allowed access
User domain for the role
gconf connection template.
The type of the user domain.
Run gconfd in gconfd domain.
Domain allowed access.
Dontaudit search gnome homedir content (.config)
The type of the user domain.
manage gnome homedir content (.config)
The type of the user domain.
Send general signals to all gconf domains.
Domain allowed access.
Create objects in a Gnome cache home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Read generic cache home files (.cache)
Domain allowed access.
Set attributes of cache home dir (.cache)
Domain allowed access.
write to generic cache home files (.cache)
Domain allowed access.
read gnome homedir content (.config)
The type of the user domain.
Set attributes of Gnome config dirs.
Domain allowed access.
Create objects in a Gnome gconf home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Read generic data home files.
Domain allowed access.
Create gconf_home_t objects in the /root directory
Domain allowed access.
The class of the object to be created.
read gconf config files
The type of the user domain.
Manage gconf config files
Domain allowed access.
Execute gconf programs in
in the caller domain.
Domain allowed access.
Read gconf home files
Domain allowed access.
search gconf homedir (.local)
The type of the domain.
Append gconf home files
Domain allowed access.
manage gconf home files
Domain allowed access.
Connect to gnome over an unix stream socket.
Domain allowed access.
The type of the user domain.
read gnome homedir content (.config)
The type of the user domain.
Read/Write all inherited gnome home config
Domain allowed access.
read gnome homedir content (.config)
Domain allowed access.
Send and receive messages from
gconf system service over dbus.
Domain allowed access.
Policy for GNU Privacy Guard and related programs.
Role access for gpg
Role allowed access
User domain for the role
Transition to a user gpg domain.
Domain allowed access.
Transition to a gpg web domain.
Domain allowed access.
Make gpg an entrypoint for
the specified domain.
The domain for which cifs_t is an entrypoint.
Send generic signals to user gpg processes.
Domain allowed access.
Read and write GPG named pipes.
Domain allowed access.
Send messages to and from GPG
Pinentry over DBUS.
Domain allowed access.
List Gnu Privacy Guard user
content dirs.
Domain allowed access.
Allow usage of the gpg-agent --write-env-file option.
This also allows gpg-agent to manage user files.
Allow gpg web domain to modify public files
used for public file transfer services.
IRC client policy
Role access for IRC
Role allowed access
User domain for the role
Allow the Irssi IRC Client to connect to any port,
and to bind to any unreserved port.
Java virtual machine
Role access for java
Role allowed access
User domain for the role
The role template for the java module.
This template creates a derived domains which are used
for java applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Run java in javaplugin domain.
Domain allowed access.
Execute java in the java domain, and
allow the specified role the java domain.
The type of the process performing this action.
The role to be allowed the java domain.
Execute the java program in the unconfined java domain.
Domain allowed access.
Execute the java program in the unconfined java domain.
Domain allowed access.
Role allowed access.
Allow read and write access to unconfined java shared memory.
Domain allowed access.
Execute the java program in the java domain.
Domain allowed access.
Allow java executable stack
system-config-kdump policy
Allow s-c-kdump to run bootloader in bootloader_t.
policy for livecd
Execute a domain transition to run livecd.
Domain allowed to transition.
Execute livecd in the livecd domain, and
allow the specified role the livecd domain.
Domain allowed access
The role to be allowed the livecd domain.
Dontaudit read/write to a livecd leaks
Domain allowed access.
Read livecd temporary files.
Domain allowed access.
Read and write livecd temporary files.
Domain allowed access.
Allow read and write access to livecd semaphores.
Domain allowed access.
Load keyboard mappings.
Execute the loadkeys program in the loadkeys domain.
The type of the process performing this action.
Execute the loadkeys program in the loadkeys domain.
The type of the process performing this action.
The role to allow the loadkeys domain.
Execute the loadkeys program in the caller domain.
The type of the process performing this action.
device locking policy for lockdev
Role access for lockdev
Role allowed access
User domain for the role
Mediawiki policy
Allow the specified domain to read
mediawiki tmp files.
Domain allowed access.
Delete mediawiki tmp files.
Domain allowed access.
Run .NET server and client applications on Linux.
The role template for the mono module.
This template creates a derived domains which are used
for mono applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Execute the mono program in the mono domain.
Domain allowed access.
Execute mono in the mono domain, and
allow the specified role the mono domain.
The type of the process performing this action.
The role to be allowed the mono domain.
Execute the mono program in the caller domain.
Domain allowed access.
Read and write to mono shared memory.
The type of the process performing this action.
Policy for Mozilla and related web browsers
Role access for mozilla
Role allowed access
User domain for the role
Read mozilla home directory content
Domain allowed access.
Write mozilla home directory content
Domain allowed access.
Dontaudit attempts to read/write mozilla home directory content
Domain allowed access.
Dontaudit attempts to write mozilla home directory content
Domain allowed access.
Run mozilla in the mozilla domain.
Domain allowed access.
Send and receive messages from
mozilla over dbus.
Domain allowed access.
Write mozilla home directory content
Domain allowed access.
Execute mozilla_exec_t
in the specified domain.
Execute a mozilla_exec_t
in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the new process.
Execute a domain transition to run mozilla_plugin.
Domain allowed access.
Execute mozilla_plugin in the mozilla_plugin domain, and
allow the specified role the mozilla_plugin domain.
Domain allowed access
The role to be allowed the mozilla_plugin domain.
Execute qemu unconfined programs in the role.
The role to allow the mozilla_plugin domain.
read/write mozilla per user tcp_socket
Domain allowed access.
Read mozilla_plugin tmpfs files
Domain allowed access
Delete mozilla_plugin tmpfs files
Domain allowed access
Dontaudit read/write to a mozilla_plugin leaks
Domain to not audit.
Execute mozilla home directory content.
Domain allowed access.
Control mozilla content access
Mplayer media player and encoder
Role access for mplayer
Role allowed access
User domain for the role
Run mplayer in mplayer domain.
Domain allowed access.
Execute mplayer in the caller domain.
Domain allowed access.
Read mplayer per user homedir
Domain allowed access.
Execute mplayer_exec_t
in the specified domain.
Execute a mplayer_exec_t
in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the new process.
Allow mplayer executable stack
policy for namespace
Execute a domain transition to run namespace_init.
Domain allowed access.
Execute namespace_init in the namespace_init domain, and
allow the specified role the namespace_init domain.
Domain allowed access
The role to be allowed the namespace_init domain.
policy for nsplugin
Create, read, write, and delete
nsplugin rw files.
Domain allowed access.
Manage nsplugin rw files.
Domain allowed access.
The per role template for the nsplugin module.
This template creates a derived domains which are used
for nsplugin web browser.
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
The role associated with the user domain.
The type of the user domain.
Role access for nsplugin
The role associated with the user domain.
The type of the user domain.
The per role template for the nsplugin module.
The type of the user domain.
The per role template for the nsplugin module.
The type of the user domain.
Search nsplugin rw directories.
Domain allowed access.
Read nsplugin rw files.
Domain allowed access.
Read nsplugin home files.
Domain allowed access.
Exec nsplugin rw files.
Domain allowed access.
Create, read, write, and delete
nsplugin home files.
Domain allowed access.
manage nnsplugin home dirs.
Domain allowed access.
Allow attempts to read and write to
nsplugin named pipes.
Domain to not audit.
Read and write to nsplugin shared memory.
The type of the process performing this action.
Allow read and write access to nsplugin semaphores.
Domain allowed access.
Execute nsplugin_exec_t
in the specified domain.
Execute a nsplugin_exec_t
in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the new process.
Create objects in a user home directory
with an automatic type transition to
the nsplugin home file type.
Domain allowed access.
The class of the object to be created.
Create objects in a user home directory
with an automatic type transition to
the nsplugin home file type.
Domain allowed access.
The class of the object to be created.
Send signull signal to nsplugin
processes.
Domain allowed access.
Send generic signals to user nsplugin processes.
Domain allowed access.
Allow nsplugin code to execmem/execstack
Allow nsplugin code to connect to unreserved ports
Openoffice
The per role template for the openoffice module.
The type of the user domain.
role for openoffice
This template creates a derived domains which are used
for java applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Execute openoffice_exec_t
in the specified domain.
Execute a openoffice_exec_t
in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the new process.
Podsleuth is a tool to get information about an Apple (TM) iPod (TM)
Execute a domain transition to run podsleuth.
Domain allowed to transition.
Execute podsleuth in the podsleuth domain, and
allow the specified role the podsleuth domain.
Domain allowed access
The role to be allowed the podsleuth domain.
helper function for grantpt(3), changes ownship and permissions of pseudotty
Execute a domain transition to run ptchown.
Domain allowed to transition.
Execute ptchown in the ptchown domain, and
allow the specified role the ptchown domain.
Domain allowed access.
The role to be allowed the ptchown domain.
Pulseaudio network sound server.
Role access for pulseaudio
Role allowed access
User domain for the role
Execute a domain transition to run pulseaudio.
Domain allowed to transition.
Execute pulseaudio in the pulseaudio domain, and
allow the specified role the pulseaudio domain.
Domain allowed access.
The role to be allowed the pulseaudio domain.
Execute a pulseaudio in the current domain.
Domain allowed to transition.
dontaudit attempts to execute a pulseaudio in the current domain.
Domain allowed to transition.
Connect to pulseaudio over a unix domain
stream socket.
Domain allowed access.
Send and receive messages from
pulseaudio over dbus.
Domain allowed access.
Set the attributes of the pulseaudio homedir.
Domain allowed access.
Read pulseaudio homedir files.
Domain allowed access.
Read and write Pulse Audio files.
Domain allowed access.
Create, read, write, and delete pulseaudio
home directory files.
Domain allowed access.
Send signull signal to pulseaudio
processes.
Domain allowed access.
Create, read, write, and delete pulseaudio
home directory symlinks.
Domain allowed access.
QEMU machine emulator and virtualizer
Creates types and rules for a basic
qemu process domain.
Prefix for the domain.
The per role template for the qemu module.
This template creates a derived domains which are used
for qemu web browser.
This template is invoked automatically for each user, and
generally does not need to be invoked directly
by policy writers.
The role associated with the user domain.
The type of the user domain.
Execute a domain transition to run qemu.
Domain allowed to transition.
Execute a qemu in the callers domain
Domain allowed access.
Execute qemu in the qemu domain.
Domain allowed to transition.
The role to allow the qemu domain.
Allow the domain to read state files in /proc.
Domain to allow access.
Set the schedule on qemu.
Domain allowed access.
Send a signal to qemu.
Domain allowed access.
Send a sigill to qemu
Domain allowed access.
Execute qemu_exec_t
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
Execute qemu_exec_t
in the specified domain. This allows
the specified domain to qemu programs
on these filesystems in the specified
domain.
Domain allowed access.
The type of the new process.
Manage qemu temporary dirs.
Domain allowed access.
Manage qemu temporary files.
Domain allowed access.
Make qemu_exec_t an entrypoint for
the specified domain.
The domain for which qemu_exec_t is an entrypoint.
Allow qemu to connect fully to the network
Allow qemu to use cifs/Samba file systems
Allow qemu to user serial/parallel communication ports
Allow qemu to use nfs file systems
Allow qemu to use usb devices
Restricted (scp/sftp) only shell
Role access for rssh
Role allowed access
User domain for the role
Transition to all user rssh domains.
Domain allowed access.
Execute the rssh program
in the caller domain.
Domain allowed access.
Read all users rssh read-only content.
Domain allowed access.
system-config-samba policy
policy for sandbox
Execute sandbox in the sandbox domain, and
allow the specified role the sandbox domain.
Domain allowed access
The role to be allowed the sandbox domain.
Creates types and rules for a basic
sandbox process domain.
Prefix for the domain.
Creates types and rules for a basic
sandbox process domain.
Prefix for the domain.
allow domain to read,
write sandbox_xserver tmp files
Domain allowed access
allow domain to read
sandbox tmpfs files
Domain allowed access
allow domain to manage
sandbox tmpfs files
Domain allowed access
Delete sandbox files
Domain allowed access
Delete sandbox sock files
Domain allowed access
Allow domain to set the attributes
of the sandbox directory.
Domain allowed access
allow domain to delete sandbox files
Domain allowed access
allow domain to list sandbox dirs
Domain allowed access
Read and write a sandbox domain pty.
Domain allowed access.
GNU terminal multiplexer
The role template for the screen module.
The prefix of the user role (e.g., user
is the prefix for user_r).
The role associated with the user domain.
The type of the user domain.
Execute the rssh program
in the caller domain.
Domain allowed access.
Filesystem namespacing/polyinstantiation application.
The role template for the seunshare module.
The prefix of the user role (e.g., user
is the prefix for user_r).
Role allowed access.
User domain for the role.
Update database for mlocate
Create the locate log with append mode.
Domain allowed access.
Read locate lib files.
Domain allowed access.
Telepathy framework.
Creates basic types for telepathy
domain
Prefix for the domain.
Role access for telepathy domains
The role associated with the user domain.
The type of the user domain.
Send DBus messages to and from
all Telepathy domain.
Domain allowed access.
Send DBus messages to and from
Telepathy Gabble.
Domain allowed access.
Stream connect to Telepathy Gabble
Domain allowed access.
Stream connect to telepathy MSN managers
Domain allowed access.
Stream connect to Telepathy Salut
Domain allowed access.
Allow the Telepathy connection managers
to connect to any generic TCP port.
Thunderbird email client
Role access for thunderbird
Role allowed access
User domain for the role
Run thunderbird in the user thunderbird domain.
Domain allowed access.
tvtime - a high quality television application
Role access for tvtime
Role allowed access
User domain for the role
Policy for UML
Role access for uml
Role allowed access
User domain for the role
Set attributes on uml utility socket files.
Domain allowed access.
Manage uml utility files.
Domain allowed access.
SELinux utility to run a shell with a new role
The role template for the userhelper module.
The prefix of the user role (e.g., user
is the prefix for user_r).
The user role.
The user domain associated with the role.
Search the userhelper configuration directory.
Domain allowed access.
Do not audit attempts to search
the userhelper configuration directory.
Domain to not audit.
Allow domain to use userhelper file descriptor.
Domain allowed access.
Allow domain to send sigchld to userhelper.
Domain allowed access.
Execute the userhelper program in the caller domain.
The type of the process performing this action.
The role template for the consolehelper module.
This template creates a derived domains which are used
for consolehelper applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
User network interface configuration helper
Execute usernetctl in the usernetctl domain.
Domain allowed access.
Execute usernetctl in the usernetctl domain, and
allow the specified role the usernetctl domain.
Domain allowed access.
The role to be allowed the usernetctl domain.
VMWare Workstation virtual machines
Role access for vmware
Role allowed access
User domain for the role
Read VMWare system configuration files.
Domain allowed access.
Append to VMWare system configuration files.
Domain allowed access.
Append to VMWare log files.
Domain allowed access.
Execute vmware host executables
Domain allowed access.
Web server log analysis
Execute webalizer in the webalizer domain.
The type of the process performing this action.
Execute webalizer in the webalizer domain, and
allow the specified role the webalizer domain.
The type of the process performing this action.
The role to be allowed the webalizer domain.
Wine Is Not an Emulator. Run Windows programs in Linux.
The per role template for the wine module.
This template creates a derived domains which are used
for wine applications.
The role associated with the user domain.
The type of the user domain.
The role template for the wine module.
This template creates a derived domains which are used
for wine applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Execute the wine program in the wine domain.
Domain allowed access.
Execute wine in the wine domain, and
allow the specified role the wine domain.
The type of the process performing this action.
The role to be allowed the wine domain.
Ignore wine mmap_zero errors
Wireshark packet capture tool.
Role access for wireshark
Role allowed access
User domain for the role
Run wireshark in wireshark domain.
Domain allowed access.
X Window Managers
The role template for the wm module.
This template creates a derived domains which are used
for window manager applications.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The role associated with the user domain.
The type of the user domain.
Execute the wm program in the wm domain.
Domain allowed access.
X Screensaver
Role access for xscreensaver
Role allowed access
User domain for the role
Yum/Apt Mirroring
Execute yam in the yam domain.
Domain allowed access.
Execute yam in the yam domain, and
allow the specified role the yam domain.
Domain allowed access.
The role to be allowed the yam domain.
Read yam content.
Domain allowed access.
Policy modules for kernel resources.
Core policy for shells, and generic programs
in /bin, /sbin, /usr/bin, and /usr/sbin.
Contains the base bin and sbin directory types
which need to be searched for the kernel to
run init.
Make the specified type usable for files
that are exectuables, such as binary programs.
This does not include shared libraries.
Type to be used for files.
Create a aliased type to generic bin files. (Deprecated)
Create a aliased type to generic bin files. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
Alias type for bin_t.
Make general progams in bin an entrypoint for
the specified domain.
The domain for which bin_t is an entrypoint.
Make general progams in sbin an entrypoint for
the specified domain. (Deprecated)
The domain for which sbin programs are an entrypoint.
Make the shell an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Search the contents of bin directories.
Domain allowed access.
Do not audit attempts to search the contents of bin directories.
Domain allowed access.
List the contents of bin directories.
Domain allowed access.
Do not auidt attempts to write bin directories.
Domain allowed access.
Do not audit attempts to write bin files.
Domain to not audit.
Get the attributes of files in bin directories.
Domain allowed access.
Get the attributes of files in bin directories.
Domain allowed access.
Read files in bin directories.
Domain allowed access.
Read symbolic links in bin directories.
Domain allowed access.
Read pipes in bin directories.
Domain allowed access.
Read named sockets in bin directories.
Domain allowed access.
Execute generic programs in bin directories,
in the caller domain.
Allow the specified domain to execute generic programs
in system bin directories (/bin, /sbin, /usr/bin,
/usr/sbin) a without domain transition.
Typically, this interface should be used when the domain
executes general system progams within the privileges
of the source domain. Some examples of these programs
are ls, cp, sed, python, and tar. This does not include
shells, such as bash.
Related interface:
Domain allowed access.
Create, read, write, and delete bin files.
Domain allowed access.
Relabel to and from the bin type.
Domain allowed access.
Mmap a bin file as executable.
Domain allowed access.
Execute a file in a bin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the userhelper policy.
Domain allowed access.
The type of the new process.
Execute a file in a bin directory
in the specified domain.
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the ssh-agent policy.
Domain allowed access.
The type of the new process.
Search the contents of sbin directories. (Deprecated)
Domain allowed access.
Do not audit attempts to search
sbin directories. (Deprecated)
Domain to not audit.
List the contents of sbin directories. (Deprecated)
Domain allowed access.
Do not audit attempts to write
sbin directories. (Deprecated)
Domain to not audit.
Get the attributes of sbin files. (Deprecated)
Domain allowed access.
Do not audit attempts to get the attibutes
of sbin files. (Deprecated)
Domain to not audit.
Read files in sbin directories. (Deprecated)
Domain allowed access.
Read symbolic links in sbin directories. (Deprecated)
Domain allowed access.
Read named pipes in sbin directories. (Deprecated)
Domain allowed access.
Read named sockets in sbin directories. (Deprecated)
Domain allowed access.
Execute generic programs in sbin directories,
in the caller domain. (Deprecated)
Domain allowed access.
Create, read, write, and delete sbin files. (Deprecated)
Domain allowed access.
Relabel to and from the sbin type. (Deprecated)
Domain allowed access.
Mmap a sbin file as executable. (Deprecated)
Domain allowed access.
Execute a file in a sbin directory
in the specified domain. (Deprecated)
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the ssh-agent policy.
Domain allowed access.
The type of the new process.
Execute a file in a sbin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon(). (Deprecated)
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the userhelper policy.
Domain allowed access.
The type of the new process.
Check if a shell is executable (DAC-wise).
Domain allowed access.
Execute shells in the caller domain.
Allow the specified domain to execute shells without
a domain transition.
Typically, this interface should be used when the domain
executes shells within the privileges
of the source domain. Some examples of these programs
are bash, tcsh, and zsh.
Related interface:
Domain allowed access.
Execute ls in the caller domain. (Deprecated)
Domain allowed access.
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Execute a shell in the specified domain.
Execute a shell in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Execute chroot in the caller domain.
Domain allowed access.
Get the attributes of all executable files.
Domain allowed access.
Read all executable files.
Domain allowed access.
Execute all executable files.
Domain allowed access.
Do not audit attempts to execute all executables.
Domain allowed access.
Create, read, write, and all executable files.
Domain allowed access.
Relabel to and from the bin type.
Domain allowed access.
Mmap all executables as executable.
Domain allowed access.
Policy controlling access to network objects
Contains the initial SIDs for network objects.
Define type to be a network packet type
Define type to be a network packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network packet.
Define type to be a network port type
Define type to be a network port type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define network type to be a reserved port (lt 1024)
Define network type to be a reserved port (lt 1024)
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define network type to be a rpc port ( 512 lt PORT lt 1024)
Define network type to be a rpc port ( 512 lt PORT lt 1024)
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define type to be a network client packet type
Define type to be a network client packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network client packet.
Define type to be a network server packet type
Define type to be a network server packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network server packet.
Send and receive TCP network traffic on generic interfaces.
Allow the specified domain to send and receive TCP network
traffic on generic network interfaces.
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_connect_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send and receive TCP network traffic on loopback interface.
The type of the process performing this action.
Send UDP network traffic on generic interfaces.
The type of the process performing this action.
Dontaudit attempts to send UDP network traffic
on generic interfaces.
Domain to not audit.
Receive UDP network traffic on generic interfaces.
The type of the process performing this action.
Do not audit attempts to receive UDP network
traffic on generic interfaces.
Domain to not audit.
Send and receive UDP network traffic on generic interfaces.
Allow the specified domain to send and receive UDP network
traffic on generic network interfaces.
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_node()
- corenet_udp_sendrecv_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Do not audit attempts to send and receive UDP network
traffic on generic interfaces.
Domain to not audit.
Send raw IP packets on generic interfaces.
The type of the process performing this action.
Receive raw IP packets on generic interfaces.
The type of the process performing this action.
Send and receive raw IP packets on generic interfaces.
The type of the process performing this action.
Allow outgoing network traffic on the generic interfaces.
The peer label of the outgoing network traffic.
Allow incoming traffic on the generic interfaces.
The peer label of the incoming network traffic.
Allow incoming and outgoing network traffic on the generic interfaces.
The peer label of the network traffic.
Send and receive TCP network traffic on all interfaces.
The type of the process performing this action.
Send UDP network traffic on all interfaces.
The type of the process performing this action.
Receive UDP network traffic on all interfaces.
The type of the process performing this action.
Send and receive UDP network traffic on all interfaces.
The type of the process performing this action.
Send raw IP packets on all interfaces.
The type of the process performing this action.
Receive raw IP packets on all interfaces.
The type of the process performing this action.
Send and receive raw IP packets on all interfaces.
The type of the process performing this action.
Send and receive TCP network traffic on generic nodes.
Allow the specified domain to send and receive TCP network
traffic to/from generic network nodes (hostnames/networks).
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_connect_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send UDP network traffic on generic nodes.
The type of the process performing this action.
Receive UDP network traffic on generic nodes.
The type of the process performing this action.
Send and receive UDP network traffic on generic nodes.
Allow the specified domain to send and receive UDP network
traffic to/from generic network nodes (hostnames/networks).
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_if()
- corenet_udp_sendrecv_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send raw IP packets on generic nodes.
The type of the process performing this action.
Receive raw IP packets on generic nodes.
The type of the process performing this action.
Send and receive raw IP packets on generic nodes.
The type of the process performing this action.
Bind TCP sockets to generic nodes.
Bind TCP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
Related interface:
- corenet_udp_bind_generic_node()
Domain allowed access.
Bind UDP sockets to generic nodes.
Bind UDP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
Related interface:
- corenet_tcp_bind_generic_node()
Domain allowed access.
Bind raw sockets to genric nodes.
The type of the process performing this action.
Allow outgoing network traffic to generic nodes.
The peer label of the outgoing network traffic.
Allow incoming network traffic from generic nodes.
The peer label of the incoming network traffic.
Allow incoming and outgoing network traffic with generic nodes.
The peer label of the network traffic.
Send and receive TCP network traffic on all nodes.
The type of the process performing this action.
Send UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to send UDP network
traffic on any nodes.
Domain to not audit.
Receive UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to receive UDP
network traffic on all nodes.
Domain to not audit.
Send and receive UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to send and receive UDP
network traffic on any nodes nodes.
Domain to not audit.
Send raw IP packets on all nodes.
The type of the process performing this action.
Receive raw IP packets on all nodes.
The type of the process performing this action.
Send and receive raw IP packets on all nodes.
The type of the process performing this action.
Bind TCP sockets to all nodes.
The type of the process performing this action.
Bind UDP sockets to all nodes.
The type of the process performing this action.
Bind raw sockets to all nodes.
The type of the process performing this action.
Send and receive TCP network traffic on generic ports.
The type of the process performing this action.
Do not audit send and receive TCP network traffic on generic ports.
The type of the process performing this action.
Send UDP network traffic on generic ports.
The type of the process performing this action.
Receive UDP network traffic on generic ports.
The type of the process performing this action.
Send and receive UDP network traffic on generic ports.
The type of the process performing this action.
Bind TCP sockets to generic ports.
The type of the process performing this action.
Do not audit bind TCP sockets to generic ports.
Domain to not audit.
Bind UDP sockets to generic ports.
The type of the process performing this action.
Connect TCP sockets to generic ports.
The type of the process performing this action.
Send and receive TCP network traffic on all ports.
Send and receive TCP network traffic on all ports.
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_connect_all_ports()
- corenet_tcp_bind_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send UDP network traffic on all ports.
The type of the process performing this action.
Receive UDP network traffic on all ports.
The type of the process performing this action.
Send and receive UDP network traffic on all ports.
Send and receive UDP network traffic on all ports.
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_if()
- corenet_udp_sendrecv_generic_node()
- corenet_udp_bind_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Bind TCP sockets to all ports.
The type of the process performing this action.
Do not audit attepts to bind TCP sockets to any ports.
Domain to not audit.
Bind UDP sockets to all ports.
The type of the process performing this action.
Do not audit attepts to bind UDP sockets to any ports.
Domain to not audit.
Connect TCP sockets to all ports.
Connect TCP sockets to all ports
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_bind_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Do not audit attempts to connect TCP sockets
to all ports.
Domain to not audit.
Send and receive TCP network traffic on generic reserved ports.
The type of the process performing this action.
Send UDP network traffic on generic reserved ports.
The type of the process performing this action.
Receive UDP network traffic on generic reserved ports.
The type of the process performing this action.
Send and receive UDP network traffic on generic reserved ports.
The type of the process performing this action.
Bind TCP sockets to generic reserved ports.
The type of the process performing this action.
Bind UDP sockets to generic reserved ports.
The type of the process performing this action.
Connect TCP sockets to generic reserved ports.
The type of the process performing this action.
Send and receive TCP network traffic on all reserved ports.
The type of the process performing this action.
Send UDP network traffic on all reserved ports.
The type of the process performing this action.
Receive UDP network traffic on all reserved ports.
The type of the process performing this action.
Send and receive UDP network traffic on all reserved ports.
The type of the process performing this action.
Bind TCP sockets to all reserved ports.
The type of the process performing this action.
Do not audit attempts to bind TCP sockets to all reserved ports.
The type of the process to not audit.
Bind UDP sockets to all reserved ports.
The type of the process performing this action.
Do not audit attempts to bind UDP sockets to all reserved ports.
The type of the process to not audit.
Bind TCP sockets to all ports > 1024.
The type of the process performing this action.
Bind UDP sockets to all ports > 1024.
The type of the process performing this action.
Connect TCP sockets to reserved ports.
The type of the process performing this action.
Connect TCP sockets to all ports > 1024.
The type of the process performing this action.
Do not audit attempts to connect TCP sockets
all reserved ports.
Domain to not audit.
Connect TCP sockets to rpc ports.
The type of the process performing this action.
Do not audit attempts to connect TCP sockets
all rpc ports.
Domain to not audit.
Read and write the TUN/TAP virtual network device.
The domain allowed access.
Do not audit attempts to read or write the TUN/TAP
virtual network device.
Domain to not audit.
Getattr the point-to-point device.
The domain allowed access.
Read and write the point-to-point device.
The domain allowed access.
Bind TCP sockets to all RPC ports.
The type of the process performing this action.
Do not audit attempts to bind TCP sockets to all RPC ports.
The type of the process to not audit.
Bind UDP sockets to all RPC ports.
The type of the process performing this action.
Do not audit attempts to bind UDP sockets to all RPC ports.
The type of the process to not audit.
Send and receive messages on a
non-encrypted (no IPSEC) network
session.
Send and receive messages on a
non-encrypted (no IPSEC) network
session. (Deprecated)
The corenet_all_recvfrom_unlabeled() interface should be used instead
of this one.
Domain allowed access.
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
The corenet_dontaudit_all_recvfrom_unlabeled() interface should be
used instead of this one.
Domain to not audit.
Receive TCP packets from a NetLabel connection.
Domain allowed access.
Receive TCP packets from a NetLabel connection.
Domain allowed access.
Receive TCP packets from an unlabled connection.
Domain allowed access.
Do not audit attempts to receive TCP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive TCP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
Domain to not audit.
Receive UDP packets from a NetLabel connection.
Domain allowed access.
Receive UDP packets from a NetLabel connection.
Domain allowed access.
Receive UDP packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive UDP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive UDP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
Domain to not audit.
Receive Raw IP packets from a NetLabel connection.
Domain allowed access.
Receive Raw IP packets from a NetLabel connection.
Domain allowed access.
Receive Raw IP packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
Domain to not audit.
Receive packets from an unlabeled connection.
Allow the specified domain to receive packets from an
unlabeled connection. On machines that do not utilize
labeled networking, this will be required on all
networking domains. On machines tha do utilize
labeled networking, this will be required for any
networking domain that is allowed to receive
network traffic that does not have a label.
Domain allowed access.
Receive packets from a NetLabel connection.
Allow the specified domain to receive NetLabel
network traffic, which utilizes the Commercial IP
Security Option (CIPSO) to set the MLS level
of the network packets. This is required for
all networking domains that receive NetLabel
network traffic.
Domain allowed access.
Enable unlabeled net packets
Allow unlabeled_packet_t to be used by all domains that use the network
Domain allowed access.
Do not audit attempts to receive packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive packets from a NetLabel
connection.
Domain to not audit.
Rules for receiving labeled TCP packets.
Rules for receiving labeled TCP packets.
Due to the nature of TCP, this is bidirectional.
Domain allowed access.
Peer domain.
Rules for receiving labeled UDP packets.
Domain allowed access.
Peer domain.
Rules for receiving labeled raw IP packets.
Domain allowed access.
Peer domain.
Rules for receiving labeled packets via TCP, UDP and raw IP.
Rules for receiving labeled packets via TCP, UDP and raw IP.
Due to the nature of TCP, the rules (for TCP
networking only) are bidirectional.
Domain allowed access.
Peer domain.
Send generic client packets.
Domain allowed access.
Receive generic client packets.
Domain allowed access.
Send and receive generic client packets.
Domain allowed access.
Relabel packets to the generic client packet type.
Domain allowed access.
Send generic server packets.
Domain allowed access.
Receive generic server packets.
Domain allowed access.
Send and receive generic server packets.
Domain allowed access.
Relabel packets to the generic server packet type.
Domain allowed access.
Send and receive unlabeled packets.
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
Domain allowed access.
Send all client packets.
Domain allowed access.
Receive all client packets.
Domain allowed access.
Send and receive all client packets.
Domain allowed access.
Relabel packets to any client packet type.
Domain allowed access.
Send all server packets.
Domain allowed access.
Receive all server packets.
Domain allowed access.
Send and receive all server packets.
Domain allowed access.
Relabel packets to any server packet type.
Domain allowed access.
Send all packets.
Domain allowed access.
Receive all packets.
Domain allowed access.
Send and receive all packets.
Domain allowed access.
Relabel packets to any packet type.
Domain allowed access.
Unconfined access to network objects.
The domain allowed access.
Send and receive TCP traffic on the afs_bos port.
Domain allowed access.
Send UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_bos port.
Domain to not audit.
Receive UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_bos port.
Domain to not audit.
Send and receive UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
Domain to not audit.
Bind TCP sockets to the afs_bos port.
Domain allowed access.
Bind UDP sockets to the afs_bos port.
Domain allowed access.
Make a TCP connection to the afs_bos port.
Domain allowed access.
Send afs_bos_client packets.
Domain allowed access.
Do not audit attempts to send afs_bos_client packets.
Domain to not audit.
Receive afs_bos_client packets.
Domain allowed access.
Do not audit attempts to receive afs_bos_client packets.
Domain allowed access.
Send and receive afs_bos_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_bos_client packets.
Domain to not audit.
Relabel packets to afs_bos_client the packet type.
Domain allowed access.
Send afs_bos_server packets.
Domain allowed access.
Do not audit attempts to send afs_bos_server packets.
Domain to not audit.
Receive afs_bos_server packets.
Domain allowed access.
Do not audit attempts to receive afs_bos_server packets.
Domain allowed access.
Send and receive afs_bos_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_bos_server packets.
Domain to not audit.
Relabel packets to afs_bos_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_client port.
Domain allowed access.
Send UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_client port.
Domain to not audit.
Receive UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_client port.
Domain to not audit.
Send and receive UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_client port.
Domain to not audit.
Bind TCP sockets to the afs_client port.
Domain allowed access.
Bind UDP sockets to the afs_client port.
Domain allowed access.
Make a TCP connection to the afs_client port.
Domain allowed access.
Send afs_client_client packets.
Domain allowed access.
Do not audit attempts to send afs_client_client packets.
Domain to not audit.
Receive afs_client_client packets.
Domain allowed access.
Do not audit attempts to receive afs_client_client packets.
Domain allowed access.
Send and receive afs_client_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_client_client packets.
Domain to not audit.
Relabel packets to afs_client_client the packet type.
Domain allowed access.
Send afs_client_server packets.
Domain allowed access.
Do not audit attempts to send afs_client_server packets.
Domain to not audit.
Receive afs_client_server packets.
Domain allowed access.
Do not audit attempts to receive afs_client_server packets.
Domain allowed access.
Send and receive afs_client_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_client_server packets.
Domain to not audit.
Relabel packets to afs_client_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_fs port.
Domain allowed access.
Send UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_fs port.
Domain to not audit.
Receive UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_fs port.
Domain to not audit.
Send and receive UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
Domain to not audit.
Bind TCP sockets to the afs_fs port.
Domain allowed access.
Bind UDP sockets to the afs_fs port.
Domain allowed access.
Make a TCP connection to the afs_fs port.
Domain allowed access.
Send afs_fs_client packets.
Domain allowed access.
Do not audit attempts to send afs_fs_client packets.
Domain to not audit.
Receive afs_fs_client packets.
Domain allowed access.
Do not audit attempts to receive afs_fs_client packets.
Domain allowed access.
Send and receive afs_fs_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_fs_client packets.
Domain to not audit.
Relabel packets to afs_fs_client the packet type.
Domain allowed access.
Send afs_fs_server packets.
Domain allowed access.
Do not audit attempts to send afs_fs_server packets.
Domain to not audit.
Receive afs_fs_server packets.
Domain allowed access.
Do not audit attempts to receive afs_fs_server packets.
Domain allowed access.
Send and receive afs_fs_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_fs_server packets.
Domain to not audit.
Relabel packets to afs_fs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_ka port.
Domain allowed access.
Send UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_ka port.
Domain to not audit.
Receive UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_ka port.
Domain to not audit.
Send and receive UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
Domain to not audit.
Bind TCP sockets to the afs_ka port.
Domain allowed access.
Bind UDP sockets to the afs_ka port.
Domain allowed access.
Make a TCP connection to the afs_ka port.
Domain allowed access.
Send afs_ka_client packets.
Domain allowed access.
Do not audit attempts to send afs_ka_client packets.
Domain to not audit.
Receive afs_ka_client packets.
Domain allowed access.
Do not audit attempts to receive afs_ka_client packets.
Domain allowed access.
Send and receive afs_ka_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_ka_client packets.
Domain to not audit.
Relabel packets to afs_ka_client the packet type.
Domain allowed access.
Send afs_ka_server packets.
Domain allowed access.
Do not audit attempts to send afs_ka_server packets.
Domain to not audit.
Receive afs_ka_server packets.
Domain allowed access.
Do not audit attempts to receive afs_ka_server packets.
Domain allowed access.
Send and receive afs_ka_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_ka_server packets.
Domain to not audit.
Relabel packets to afs_ka_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_pt port.
Domain allowed access.
Send UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_pt port.
Domain to not audit.
Receive UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_pt port.
Domain to not audit.
Send and receive UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
Domain to not audit.
Bind TCP sockets to the afs_pt port.
Domain allowed access.
Bind UDP sockets to the afs_pt port.
Domain allowed access.
Make a TCP connection to the afs_pt port.
Domain allowed access.
Send afs_pt_client packets.
Domain allowed access.
Do not audit attempts to send afs_pt_client packets.
Domain to not audit.
Receive afs_pt_client packets.
Domain allowed access.
Do not audit attempts to receive afs_pt_client packets.
Domain allowed access.
Send and receive afs_pt_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_pt_client packets.
Domain to not audit.
Relabel packets to afs_pt_client the packet type.
Domain allowed access.
Send afs_pt_server packets.
Domain allowed access.
Do not audit attempts to send afs_pt_server packets.
Domain to not audit.
Receive afs_pt_server packets.
Domain allowed access.
Do not audit attempts to receive afs_pt_server packets.
Domain allowed access.
Send and receive afs_pt_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_pt_server packets.
Domain to not audit.
Relabel packets to afs_pt_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_vl port.
Domain allowed access.
Send UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_vl port.
Domain to not audit.
Receive UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_vl port.
Domain to not audit.
Send and receive UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
Domain to not audit.
Bind TCP sockets to the afs_vl port.
Domain allowed access.
Bind UDP sockets to the afs_vl port.
Domain allowed access.
Make a TCP connection to the afs_vl port.
Domain allowed access.
Send afs_vl_client packets.
Domain allowed access.
Do not audit attempts to send afs_vl_client packets.
Domain to not audit.
Receive afs_vl_client packets.
Domain allowed access.
Do not audit attempts to receive afs_vl_client packets.
Domain allowed access.
Send and receive afs_vl_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_vl_client packets.
Domain to not audit.
Relabel packets to afs_vl_client the packet type.
Domain allowed access.
Send afs_vl_server packets.
Domain allowed access.
Do not audit attempts to send afs_vl_server packets.
Domain to not audit.
Receive afs_vl_server packets.
Domain allowed access.
Do not audit attempts to receive afs_vl_server packets.
Domain allowed access.
Send and receive afs_vl_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_vl_server packets.
Domain to not audit.
Relabel packets to afs_vl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the agentx port.
Domain allowed access.
Send UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the agentx port.
Domain to not audit.
Receive UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the agentx port.
Domain to not audit.
Send and receive UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the agentx port.
Domain to not audit.
Bind TCP sockets to the agentx port.
Domain allowed access.
Bind UDP sockets to the agentx port.
Domain allowed access.
Make a TCP connection to the agentx port.
Domain allowed access.
Send agentx_client packets.
Domain allowed access.
Do not audit attempts to send agentx_client packets.
Domain to not audit.
Receive agentx_client packets.
Domain allowed access.
Do not audit attempts to receive agentx_client packets.
Domain allowed access.
Send and receive agentx_client packets.
Domain allowed access.
Do not audit attempts to send and receive agentx_client packets.
Domain to not audit.
Relabel packets to agentx_client the packet type.
Domain allowed access.
Send agentx_server packets.
Domain allowed access.
Do not audit attempts to send agentx_server packets.
Domain to not audit.
Receive agentx_server packets.
Domain allowed access.
Do not audit attempts to receive agentx_server packets.
Domain allowed access.
Send and receive agentx_server packets.
Domain allowed access.
Do not audit attempts to send and receive agentx_server packets.
Domain to not audit.
Relabel packets to agentx_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amanda port.
Domain allowed access.
Send UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amanda port.
Domain to not audit.
Receive UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amanda port.
Domain to not audit.
Send and receive UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amanda port.
Domain to not audit.
Bind TCP sockets to the amanda port.
Domain allowed access.
Bind UDP sockets to the amanda port.
Domain allowed access.
Make a TCP connection to the amanda port.
Domain allowed access.
Send amanda_client packets.
Domain allowed access.
Do not audit attempts to send amanda_client packets.
Domain to not audit.
Receive amanda_client packets.
Domain allowed access.
Do not audit attempts to receive amanda_client packets.
Domain allowed access.
Send and receive amanda_client packets.
Domain allowed access.
Do not audit attempts to send and receive amanda_client packets.
Domain to not audit.
Relabel packets to amanda_client the packet type.
Domain allowed access.
Send amanda_server packets.
Domain allowed access.
Do not audit attempts to send amanda_server packets.
Domain to not audit.
Receive amanda_server packets.
Domain allowed access.
Do not audit attempts to receive amanda_server packets.
Domain allowed access.
Send and receive amanda_server packets.
Domain allowed access.
Do not audit attempts to send and receive amanda_server packets.
Domain to not audit.
Relabel packets to amanda_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amavisd_recv port.
Domain allowed access.
Send UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amavisd_recv port.
Domain to not audit.
Receive UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
Domain to not audit.
Send and receive UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
Domain to not audit.
Bind TCP sockets to the amavisd_recv port.
Domain allowed access.
Bind UDP sockets to the amavisd_recv port.
Domain allowed access.
Make a TCP connection to the amavisd_recv port.
Domain allowed access.
Send amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to send amavisd_recv_client packets.
Domain to not audit.
Receive amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to receive amavisd_recv_client packets.
Domain allowed access.
Send and receive amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_recv_client packets.
Domain to not audit.
Relabel packets to amavisd_recv_client the packet type.
Domain allowed access.
Send amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to send amavisd_recv_server packets.
Domain to not audit.
Receive amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to receive amavisd_recv_server packets.
Domain allowed access.
Send and receive amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_recv_server packets.
Domain to not audit.
Relabel packets to amavisd_recv_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amavisd_send port.
Domain allowed access.
Send UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amavisd_send port.
Domain to not audit.
Receive UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amavisd_send port.
Domain to not audit.
Send and receive UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
Domain to not audit.
Bind TCP sockets to the amavisd_send port.
Domain allowed access.
Bind UDP sockets to the amavisd_send port.
Domain allowed access.
Make a TCP connection to the amavisd_send port.
Domain allowed access.
Send amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to send amavisd_send_client packets.
Domain to not audit.
Receive amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to receive amavisd_send_client packets.
Domain allowed access.
Send and receive amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_send_client packets.
Domain to not audit.
Relabel packets to amavisd_send_client the packet type.
Domain allowed access.
Send amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to send amavisd_send_server packets.
Domain to not audit.
Receive amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to receive amavisd_send_server packets.
Domain allowed access.
Send and receive amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_send_server packets.
Domain to not audit.
Relabel packets to amavisd_send_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amqp port.
Domain allowed access.
Send UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amqp port.
Domain to not audit.
Receive UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amqp port.
Domain to not audit.
Send and receive UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amqp port.
Domain to not audit.
Bind TCP sockets to the amqp port.
Domain allowed access.
Bind UDP sockets to the amqp port.
Domain allowed access.
Make a TCP connection to the amqp port.
Domain allowed access.
Send amqp_client packets.
Domain allowed access.
Do not audit attempts to send amqp_client packets.
Domain to not audit.
Receive amqp_client packets.
Domain allowed access.
Do not audit attempts to receive amqp_client packets.
Domain allowed access.
Send and receive amqp_client packets.
Domain allowed access.
Do not audit attempts to send and receive amqp_client packets.
Domain to not audit.
Relabel packets to amqp_client the packet type.
Domain allowed access.
Send amqp_server packets.
Domain allowed access.
Do not audit attempts to send amqp_server packets.
Domain to not audit.
Receive amqp_server packets.
Domain allowed access.
Do not audit attempts to receive amqp_server packets.
Domain allowed access.
Send and receive amqp_server packets.
Domain allowed access.
Do not audit attempts to send and receive amqp_server packets.
Domain to not audit.
Relabel packets to amqp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the aol port.
Domain allowed access.
Send UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the aol port.
Domain to not audit.
Receive UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the aol port.
Domain to not audit.
Send and receive UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the aol port.
Domain to not audit.
Bind TCP sockets to the aol port.
Domain allowed access.
Bind UDP sockets to the aol port.
Domain allowed access.
Make a TCP connection to the aol port.
Domain allowed access.
Send aol_client packets.
Domain allowed access.
Do not audit attempts to send aol_client packets.
Domain to not audit.
Receive aol_client packets.
Domain allowed access.
Do not audit attempts to receive aol_client packets.
Domain allowed access.
Send and receive aol_client packets.
Domain allowed access.
Do not audit attempts to send and receive aol_client packets.
Domain to not audit.
Relabel packets to aol_client the packet type.
Domain allowed access.
Send aol_server packets.
Domain allowed access.
Do not audit attempts to send aol_server packets.
Domain to not audit.
Receive aol_server packets.
Domain allowed access.
Do not audit attempts to receive aol_server packets.
Domain allowed access.
Send and receive aol_server packets.
Domain allowed access.
Do not audit attempts to send and receive aol_server packets.
Domain to not audit.
Relabel packets to aol_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apc port.
Domain allowed access.
Send UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apc port.
Domain to not audit.
Receive UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apc port.
Domain to not audit.
Send and receive UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apc port.
Domain to not audit.
Bind TCP sockets to the apc port.
Domain allowed access.
Bind UDP sockets to the apc port.
Domain allowed access.
Make a TCP connection to the apc port.
Domain allowed access.
Send apc_client packets.
Domain allowed access.
Do not audit attempts to send apc_client packets.
Domain to not audit.
Receive apc_client packets.
Domain allowed access.
Do not audit attempts to receive apc_client packets.
Domain allowed access.
Send and receive apc_client packets.
Domain allowed access.
Do not audit attempts to send and receive apc_client packets.
Domain to not audit.
Relabel packets to apc_client the packet type.
Domain allowed access.
Send apc_server packets.
Domain allowed access.
Do not audit attempts to send apc_server packets.
Domain to not audit.
Receive apc_server packets.
Domain allowed access.
Do not audit attempts to receive apc_server packets.
Domain allowed access.
Send and receive apc_server packets.
Domain allowed access.
Do not audit attempts to send and receive apc_server packets.
Domain to not audit.
Relabel packets to apc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apcupsd port.
Domain allowed access.
Send UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apcupsd port.
Domain to not audit.
Receive UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apcupsd port.
Domain to not audit.
Send and receive UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
Domain to not audit.
Bind TCP sockets to the apcupsd port.
Domain allowed access.
Bind UDP sockets to the apcupsd port.
Domain allowed access.
Make a TCP connection to the apcupsd port.
Domain allowed access.
Send apcupsd_client packets.
Domain allowed access.
Do not audit attempts to send apcupsd_client packets.
Domain to not audit.
Receive apcupsd_client packets.
Domain allowed access.
Do not audit attempts to receive apcupsd_client packets.
Domain allowed access.
Send and receive apcupsd_client packets.
Domain allowed access.
Do not audit attempts to send and receive apcupsd_client packets.
Domain to not audit.
Relabel packets to apcupsd_client the packet type.
Domain allowed access.
Send apcupsd_server packets.
Domain allowed access.
Do not audit attempts to send apcupsd_server packets.
Domain to not audit.
Receive apcupsd_server packets.
Domain allowed access.
Do not audit attempts to receive apcupsd_server packets.
Domain allowed access.
Send and receive apcupsd_server packets.
Domain allowed access.
Do not audit attempts to send and receive apcupsd_server packets.
Domain to not audit.
Relabel packets to apcupsd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apertus_ldp port.
Domain allowed access.
Send UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apertus_ldp port.
Domain to not audit.
Receive UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
Domain to not audit.
Send and receive UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
Domain to not audit.
Bind TCP sockets to the apertus_ldp port.
Domain allowed access.
Bind UDP sockets to the apertus_ldp port.
Domain allowed access.
Make a TCP connection to the apertus_ldp port.
Domain allowed access.
Send apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to send apertus_ldp_client packets.
Domain to not audit.
Receive apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to receive apertus_ldp_client packets.
Domain allowed access.
Send and receive apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to send and receive apertus_ldp_client packets.
Domain to not audit.
Relabel packets to apertus_ldp_client the packet type.
Domain allowed access.
Send apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to send apertus_ldp_server packets.
Domain to not audit.
Receive apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to receive apertus_ldp_server packets.
Domain allowed access.
Send and receive apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to send and receive apertus_ldp_server packets.
Domain to not audit.
Relabel packets to apertus_ldp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the asterisk port.
Domain allowed access.
Send UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the asterisk port.
Domain to not audit.
Receive UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the asterisk port.
Domain to not audit.
Send and receive UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
Domain to not audit.
Bind TCP sockets to the asterisk port.
Domain allowed access.
Bind UDP sockets to the asterisk port.
Domain allowed access.
Make a TCP connection to the asterisk port.
Domain allowed access.
Send asterisk_client packets.
Domain allowed access.
Do not audit attempts to send asterisk_client packets.
Domain to not audit.
Receive asterisk_client packets.
Domain allowed access.
Do not audit attempts to receive asterisk_client packets.
Domain allowed access.
Send and receive asterisk_client packets.
Domain allowed access.
Do not audit attempts to send and receive asterisk_client packets.
Domain to not audit.
Relabel packets to asterisk_client the packet type.
Domain allowed access.
Send asterisk_server packets.
Domain allowed access.
Do not audit attempts to send asterisk_server packets.
Domain to not audit.
Receive asterisk_server packets.
Domain allowed access.
Do not audit attempts to receive asterisk_server packets.
Domain allowed access.
Send and receive asterisk_server packets.
Domain allowed access.
Do not audit attempts to send and receive asterisk_server packets.
Domain to not audit.
Relabel packets to asterisk_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the audit port.
Domain allowed access.
Send UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the audit port.
Domain to not audit.
Receive UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the audit port.
Domain to not audit.
Send and receive UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the audit port.
Domain to not audit.
Bind TCP sockets to the audit port.
Domain allowed access.
Bind UDP sockets to the audit port.
Domain allowed access.
Make a TCP connection to the audit port.
Domain allowed access.
Send audit_client packets.
Domain allowed access.
Do not audit attempts to send audit_client packets.
Domain to not audit.
Receive audit_client packets.
Domain allowed access.
Do not audit attempts to receive audit_client packets.
Domain allowed access.
Send and receive audit_client packets.
Domain allowed access.
Do not audit attempts to send and receive audit_client packets.
Domain to not audit.
Relabel packets to audit_client the packet type.
Domain allowed access.
Send audit_server packets.
Domain allowed access.
Do not audit attempts to send audit_server packets.
Domain to not audit.
Receive audit_server packets.
Domain allowed access.
Do not audit attempts to receive audit_server packets.
Domain allowed access.
Send and receive audit_server packets.
Domain allowed access.
Do not audit attempts to send and receive audit_server packets.
Domain to not audit.
Relabel packets to audit_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the auth port.
Domain allowed access.
Send UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the auth port.
Domain to not audit.
Receive UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the auth port.
Domain to not audit.
Send and receive UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the auth port.
Domain to not audit.
Bind TCP sockets to the auth port.
Domain allowed access.
Bind UDP sockets to the auth port.
Domain allowed access.
Make a TCP connection to the auth port.
Domain allowed access.
Send auth_client packets.
Domain allowed access.
Do not audit attempts to send auth_client packets.
Domain to not audit.
Receive auth_client packets.
Domain allowed access.
Do not audit attempts to receive auth_client packets.
Domain allowed access.
Send and receive auth_client packets.
Domain allowed access.
Do not audit attempts to send and receive auth_client packets.
Domain to not audit.
Relabel packets to auth_client the packet type.
Domain allowed access.
Send auth_server packets.
Domain allowed access.
Do not audit attempts to send auth_server packets.
Domain to not audit.
Receive auth_server packets.
Domain allowed access.
Do not audit attempts to receive auth_server packets.
Domain allowed access.
Send and receive auth_server packets.
Domain allowed access.
Do not audit attempts to send and receive auth_server packets.
Domain to not audit.
Relabel packets to auth_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the bacula port.
Domain allowed access.
Send UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the bacula port.
Domain to not audit.
Receive UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the bacula port.
Domain to not audit.
Send and receive UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the bacula port.
Domain to not audit.
Bind TCP sockets to the bacula port.
Domain allowed access.
Bind UDP sockets to the bacula port.
Domain allowed access.
Make a TCP connection to the bacula port.
Domain allowed access.
Send bacula_client packets.
Domain allowed access.
Do not audit attempts to send bacula_client packets.
Domain to not audit.
Receive bacula_client packets.
Domain allowed access.
Do not audit attempts to receive bacula_client packets.
Domain allowed access.
Send and receive bacula_client packets.
Domain allowed access.
Do not audit attempts to send and receive bacula_client packets.
Domain to not audit.
Relabel packets to bacula_client the packet type.
Domain allowed access.
Send bacula_server packets.
Domain allowed access.
Do not audit attempts to send bacula_server packets.
Domain to not audit.
Receive bacula_server packets.
Domain allowed access.
Do not audit attempts to receive bacula_server packets.
Domain allowed access.
Send and receive bacula_server packets.
Domain allowed access.
Do not audit attempts to send and receive bacula_server packets.
Domain to not audit.
Relabel packets to bacula_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the bgp port.
Domain allowed access.
Send UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the bgp port.
Domain to not audit.
Receive UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the bgp port.
Domain to not audit.
Send and receive UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the bgp port.
Domain to not audit.
Bind TCP sockets to the bgp port.
Domain allowed access.
Bind UDP sockets to the bgp port.
Domain allowed access.
Make a TCP connection to the bgp port.
Domain allowed access.
Send bgp_client packets.
Domain allowed access.
Do not audit attempts to send bgp_client packets.
Domain to not audit.
Receive bgp_client packets.
Domain allowed access.
Do not audit attempts to receive bgp_client packets.
Domain allowed access.
Send and receive bgp_client packets.
Domain allowed access.
Do not audit attempts to send and receive bgp_client packets.
Domain to not audit.
Relabel packets to bgp_client the packet type.
Domain allowed access.
Send bgp_server packets.
Domain allowed access.
Do not audit attempts to send bgp_server packets.
Domain to not audit.
Receive bgp_server packets.
Domain allowed access.
Do not audit attempts to receive bgp_server packets.
Domain allowed access.
Send and receive bgp_server packets.
Domain allowed access.
Do not audit attempts to send and receive bgp_server packets.
Domain to not audit.
Relabel packets to bgp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the boinc port.
Domain allowed access.
Send UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the boinc port.
Domain to not audit.
Receive UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the boinc port.
Domain to not audit.
Send and receive UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the boinc port.
Domain to not audit.
Bind TCP sockets to the boinc port.
Domain allowed access.
Bind UDP sockets to the boinc port.
Domain allowed access.
Make a TCP connection to the boinc port.
Domain allowed access.
Send boinc_client packets.
Domain allowed access.
Do not audit attempts to send boinc_client packets.
Domain to not audit.
Receive boinc_client packets.
Domain allowed access.
Do not audit attempts to receive boinc_client packets.
Domain allowed access.
Send and receive boinc_client packets.
Domain allowed access.
Do not audit attempts to send and receive boinc_client packets.
Domain to not audit.
Relabel packets to boinc_client the packet type.
Domain allowed access.
Send boinc_server packets.
Domain allowed access.
Do not audit attempts to send boinc_server packets.
Domain to not audit.
Receive boinc_server packets.
Domain allowed access.
Do not audit attempts to receive boinc_server packets.
Domain allowed access.
Send and receive boinc_server packets.
Domain allowed access.
Do not audit attempts to send and receive boinc_server packets.
Domain to not audit.
Relabel packets to boinc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the certmaster port.
Domain allowed access.
Send UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the certmaster port.
Domain to not audit.
Receive UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the certmaster port.
Domain to not audit.
Send and receive UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
Domain to not audit.
Bind TCP sockets to the certmaster port.
Domain allowed access.
Bind UDP sockets to the certmaster port.
Domain allowed access.
Make a TCP connection to the certmaster port.
Domain allowed access.
Send certmaster_client packets.
Domain allowed access.
Do not audit attempts to send certmaster_client packets.
Domain to not audit.
Receive certmaster_client packets.
Domain allowed access.
Do not audit attempts to receive certmaster_client packets.
Domain allowed access.
Send and receive certmaster_client packets.
Domain allowed access.
Do not audit attempts to send and receive certmaster_client packets.
Domain to not audit.
Relabel packets to certmaster_client the packet type.
Domain allowed access.
Send certmaster_server packets.
Domain allowed access.
Do not audit attempts to send certmaster_server packets.
Domain to not audit.
Receive certmaster_server packets.
Domain allowed access.
Do not audit attempts to receive certmaster_server packets.
Domain allowed access.
Send and receive certmaster_server packets.
Domain allowed access.
Do not audit attempts to send and receive certmaster_server packets.
Domain to not audit.
Relabel packets to certmaster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cockpit port.
Domain allowed access.
Send UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cockpit port.
Domain to not audit.
Receive UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cockpit port.
Domain to not audit.
Send and receive UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cockpit port.
Domain to not audit.
Bind TCP sockets to the cockpit port.
Domain allowed access.
Bind UDP sockets to the cockpit port.
Domain allowed access.
Make a TCP connection to the cockpit port.
Domain allowed access.
Send cockpit_client packets.
Domain allowed access.
Do not audit attempts to send cockpit_client packets.
Domain to not audit.
Receive cockpit_client packets.
Domain allowed access.
Do not audit attempts to receive cockpit_client packets.
Domain allowed access.
Send and receive cockpit_client packets.
Domain allowed access.
Do not audit attempts to send and receive cockpit_client packets.
Domain to not audit.
Relabel packets to cockpit_client the packet type.
Domain allowed access.
Send cockpit_server packets.
Domain allowed access.
Do not audit attempts to send cockpit_server packets.
Domain to not audit.
Receive cockpit_server packets.
Domain allowed access.
Do not audit attempts to receive cockpit_server packets.
Domain allowed access.
Send and receive cockpit_server packets.
Domain allowed access.
Do not audit attempts to send and receive cockpit_server packets.
Domain to not audit.
Relabel packets to cockpit_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the collectd port.
Domain allowed access.
Send UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the collectd port.
Domain to not audit.
Receive UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the collectd port.
Domain to not audit.
Send and receive UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the collectd port.
Domain to not audit.
Bind TCP sockets to the collectd port.
Domain allowed access.
Bind UDP sockets to the collectd port.
Domain allowed access.
Make a TCP connection to the collectd port.
Domain allowed access.
Send collectd_client packets.
Domain allowed access.
Do not audit attempts to send collectd_client packets.
Domain to not audit.
Receive collectd_client packets.
Domain allowed access.
Do not audit attempts to receive collectd_client packets.
Domain allowed access.
Send and receive collectd_client packets.
Domain allowed access.
Do not audit attempts to send and receive collectd_client packets.
Domain to not audit.
Relabel packets to collectd_client the packet type.
Domain allowed access.
Send collectd_server packets.
Domain allowed access.
Do not audit attempts to send collectd_server packets.
Domain to not audit.
Receive collectd_server packets.
Domain allowed access.
Do not audit attempts to receive collectd_server packets.
Domain allowed access.
Send and receive collectd_server packets.
Domain allowed access.
Do not audit attempts to send and receive collectd_server packets.
Domain to not audit.
Relabel packets to collectd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the chronyd port.
Domain allowed access.
Send UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the chronyd port.
Domain to not audit.
Receive UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the chronyd port.
Domain to not audit.
Send and receive UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
Domain to not audit.
Bind TCP sockets to the chronyd port.
Domain allowed access.
Bind UDP sockets to the chronyd port.
Domain allowed access.
Make a TCP connection to the chronyd port.
Domain allowed access.
Send chronyd_client packets.
Domain allowed access.
Do not audit attempts to send chronyd_client packets.
Domain to not audit.
Receive chronyd_client packets.
Domain allowed access.
Do not audit attempts to receive chronyd_client packets.
Domain allowed access.
Send and receive chronyd_client packets.
Domain allowed access.
Do not audit attempts to send and receive chronyd_client packets.
Domain to not audit.
Relabel packets to chronyd_client the packet type.
Domain allowed access.
Send chronyd_server packets.
Domain allowed access.
Do not audit attempts to send chronyd_server packets.
Domain to not audit.
Receive chronyd_server packets.
Domain allowed access.
Do not audit attempts to receive chronyd_server packets.
Domain allowed access.
Send and receive chronyd_server packets.
Domain allowed access.
Do not audit attempts to send and receive chronyd_server packets.
Domain to not audit.
Relabel packets to chronyd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the clamd port.
Domain allowed access.
Send UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the clamd port.
Domain to not audit.
Receive UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the clamd port.
Domain to not audit.
Send and receive UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the clamd port.
Domain to not audit.
Bind TCP sockets to the clamd port.
Domain allowed access.
Bind UDP sockets to the clamd port.
Domain allowed access.
Make a TCP connection to the clamd port.
Domain allowed access.
Send clamd_client packets.
Domain allowed access.
Do not audit attempts to send clamd_client packets.
Domain to not audit.
Receive clamd_client packets.
Domain allowed access.
Do not audit attempts to receive clamd_client packets.
Domain allowed access.
Send and receive clamd_client packets.
Domain allowed access.
Do not audit attempts to send and receive clamd_client packets.
Domain to not audit.
Relabel packets to clamd_client the packet type.
Domain allowed access.
Send clamd_server packets.
Domain allowed access.
Do not audit attempts to send clamd_server packets.
Domain to not audit.
Receive clamd_server packets.
Domain allowed access.
Do not audit attempts to receive clamd_server packets.
Domain allowed access.
Send and receive clamd_server packets.
Domain allowed access.
Do not audit attempts to send and receive clamd_server packets.
Domain to not audit.
Relabel packets to clamd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the clockspeed port.
Domain allowed access.
Send UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the clockspeed port.
Domain to not audit.
Receive UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the clockspeed port.
Domain to not audit.
Send and receive UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
Domain to not audit.
Bind TCP sockets to the clockspeed port.
Domain allowed access.
Bind UDP sockets to the clockspeed port.
Domain allowed access.
Make a TCP connection to the clockspeed port.
Domain allowed access.
Send clockspeed_client packets.
Domain allowed access.
Do not audit attempts to send clockspeed_client packets.
Domain to not audit.
Receive clockspeed_client packets.
Domain allowed access.
Do not audit attempts to receive clockspeed_client packets.
Domain allowed access.
Send and receive clockspeed_client packets.
Domain allowed access.
Do not audit attempts to send and receive clockspeed_client packets.
Domain to not audit.
Relabel packets to clockspeed_client the packet type.
Domain allowed access.
Send clockspeed_server packets.
Domain allowed access.
Do not audit attempts to send clockspeed_server packets.
Domain to not audit.
Receive clockspeed_server packets.
Domain allowed access.
Do not audit attempts to receive clockspeed_server packets.
Domain allowed access.
Send and receive clockspeed_server packets.
Domain allowed access.
Do not audit attempts to send and receive clockspeed_server packets.
Domain to not audit.
Relabel packets to clockspeed_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cluster port.
Domain allowed access.
Send UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cluster port.
Domain to not audit.
Receive UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cluster port.
Domain to not audit.
Send and receive UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cluster port.
Domain to not audit.
Bind TCP sockets to the cluster port.
Domain allowed access.
Bind UDP sockets to the cluster port.
Domain allowed access.
Make a TCP connection to the cluster port.
Domain allowed access.
Send cluster_client packets.
Domain allowed access.
Do not audit attempts to send cluster_client packets.
Domain to not audit.
Receive cluster_client packets.
Domain allowed access.
Do not audit attempts to receive cluster_client packets.
Domain allowed access.
Send and receive cluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive cluster_client packets.
Domain to not audit.
Relabel packets to cluster_client the packet type.
Domain allowed access.
Send cluster_server packets.
Domain allowed access.
Do not audit attempts to send cluster_server packets.
Domain to not audit.
Receive cluster_server packets.
Domain allowed access.
Do not audit attempts to receive cluster_server packets.
Domain allowed access.
Send and receive cluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive cluster_server packets.
Domain to not audit.
Relabel packets to cluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cma port.
Domain allowed access.
Send UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cma port.
Domain to not audit.
Receive UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cma port.
Domain to not audit.
Send and receive UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cma port.
Domain to not audit.
Bind TCP sockets to the cma port.
Domain allowed access.
Bind UDP sockets to the cma port.
Domain allowed access.
Make a TCP connection to the cma port.
Domain allowed access.
Send cma_client packets.
Domain allowed access.
Do not audit attempts to send cma_client packets.
Domain to not audit.
Receive cma_client packets.
Domain allowed access.
Do not audit attempts to receive cma_client packets.
Domain allowed access.
Send and receive cma_client packets.
Domain allowed access.
Do not audit attempts to send and receive cma_client packets.
Domain to not audit.
Relabel packets to cma_client the packet type.
Domain allowed access.
Send cma_server packets.
Domain allowed access.
Do not audit attempts to send cma_server packets.
Domain to not audit.
Receive cma_server packets.
Domain allowed access.
Do not audit attempts to receive cma_server packets.
Domain allowed access.
Send and receive cma_server packets.
Domain allowed access.
Do not audit attempts to send and receive cma_server packets.
Domain to not audit.
Relabel packets to cma_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cobbler port.
Domain allowed access.
Send UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cobbler port.
Domain to not audit.
Receive UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cobbler port.
Domain to not audit.
Send and receive UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
Domain to not audit.
Bind TCP sockets to the cobbler port.
Domain allowed access.
Bind UDP sockets to the cobbler port.
Domain allowed access.
Make a TCP connection to the cobbler port.
Domain allowed access.
Send cobbler_client packets.
Domain allowed access.
Do not audit attempts to send cobbler_client packets.
Domain to not audit.
Receive cobbler_client packets.
Domain allowed access.
Do not audit attempts to receive cobbler_client packets.
Domain allowed access.
Send and receive cobbler_client packets.
Domain allowed access.
Do not audit attempts to send and receive cobbler_client packets.
Domain to not audit.
Relabel packets to cobbler_client the packet type.
Domain allowed access.
Send cobbler_server packets.
Domain allowed access.
Do not audit attempts to send cobbler_server packets.
Domain to not audit.
Receive cobbler_server packets.
Domain allowed access.
Do not audit attempts to receive cobbler_server packets.
Domain allowed access.
Send and receive cobbler_server packets.
Domain allowed access.
Do not audit attempts to send and receive cobbler_server packets.
Domain to not audit.
Relabel packets to cobbler_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the commplex port.
Domain allowed access.
Send UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the commplex port.
Domain to not audit.
Receive UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the commplex port.
Domain to not audit.
Send and receive UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the commplex port.
Domain to not audit.
Bind TCP sockets to the commplex port.
Domain allowed access.
Bind UDP sockets to the commplex port.
Domain allowed access.
Make a TCP connection to the commplex port.
Domain allowed access.
Send commplex_client packets.
Domain allowed access.
Do not audit attempts to send commplex_client packets.
Domain to not audit.
Receive commplex_client packets.
Domain allowed access.
Do not audit attempts to receive commplex_client packets.
Domain allowed access.
Send and receive commplex_client packets.
Domain allowed access.
Do not audit attempts to send and receive commplex_client packets.
Domain to not audit.
Relabel packets to commplex_client the packet type.
Domain allowed access.
Send commplex_server packets.
Domain allowed access.
Do not audit attempts to send commplex_server packets.
Domain to not audit.
Receive commplex_server packets.
Domain allowed access.
Do not audit attempts to receive commplex_server packets.
Domain allowed access.
Send and receive commplex_server packets.
Domain allowed access.
Do not audit attempts to send and receive commplex_server packets.
Domain to not audit.
Relabel packets to commplex_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the comsat port.
Domain allowed access.
Send UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the comsat port.
Domain to not audit.
Receive UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the comsat port.
Domain to not audit.
Send and receive UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the comsat port.
Domain to not audit.
Bind TCP sockets to the comsat port.
Domain allowed access.
Bind UDP sockets to the comsat port.
Domain allowed access.
Make a TCP connection to the comsat port.
Domain allowed access.
Send comsat_client packets.
Domain allowed access.
Do not audit attempts to send comsat_client packets.
Domain to not audit.
Receive comsat_client packets.
Domain allowed access.
Do not audit attempts to receive comsat_client packets.
Domain allowed access.
Send and receive comsat_client packets.
Domain allowed access.
Do not audit attempts to send and receive comsat_client packets.
Domain to not audit.
Relabel packets to comsat_client the packet type.
Domain allowed access.
Send comsat_server packets.
Domain allowed access.
Do not audit attempts to send comsat_server packets.
Domain to not audit.
Receive comsat_server packets.
Domain allowed access.
Do not audit attempts to receive comsat_server packets.
Domain allowed access.
Send and receive comsat_server packets.
Domain allowed access.
Do not audit attempts to send and receive comsat_server packets.
Domain to not audit.
Relabel packets to comsat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the condor port.
Domain allowed access.
Send UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the condor port.
Domain to not audit.
Receive UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the condor port.
Domain to not audit.
Send and receive UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the condor port.
Domain to not audit.
Bind TCP sockets to the condor port.
Domain allowed access.
Bind UDP sockets to the condor port.
Domain allowed access.
Make a TCP connection to the condor port.
Domain allowed access.
Send condor_client packets.
Domain allowed access.
Do not audit attempts to send condor_client packets.
Domain to not audit.
Receive condor_client packets.
Domain allowed access.
Do not audit attempts to receive condor_client packets.
Domain allowed access.
Send and receive condor_client packets.
Domain allowed access.
Do not audit attempts to send and receive condor_client packets.
Domain to not audit.
Relabel packets to condor_client the packet type.
Domain allowed access.
Send condor_server packets.
Domain allowed access.
Do not audit attempts to send condor_server packets.
Domain to not audit.
Receive condor_server packets.
Domain allowed access.
Do not audit attempts to receive condor_server packets.
Domain allowed access.
Send and receive condor_server packets.
Domain allowed access.
Do not audit attempts to send and receive condor_server packets.
Domain to not audit.
Relabel packets to condor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the conman port.
Domain allowed access.
Send UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the conman port.
Domain to not audit.
Receive UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the conman port.
Domain to not audit.
Send and receive UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the conman port.
Domain to not audit.
Bind TCP sockets to the conman port.
Domain allowed access.
Bind UDP sockets to the conman port.
Domain allowed access.
Make a TCP connection to the conman port.
Domain allowed access.
Send conman_client packets.
Domain allowed access.
Do not audit attempts to send conman_client packets.
Domain to not audit.
Receive conman_client packets.
Domain allowed access.
Do not audit attempts to receive conman_client packets.
Domain allowed access.
Send and receive conman_client packets.
Domain allowed access.
Do not audit attempts to send and receive conman_client packets.
Domain to not audit.
Relabel packets to conman_client the packet type.
Domain allowed access.
Send conman_server packets.
Domain allowed access.
Do not audit attempts to send conman_server packets.
Domain to not audit.
Receive conman_server packets.
Domain allowed access.
Do not audit attempts to receive conman_server packets.
Domain allowed access.
Send and receive conman_server packets.
Domain allowed access.
Do not audit attempts to send and receive conman_server packets.
Domain to not audit.
Relabel packets to conman_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ctdb port.
Domain allowed access.
Send UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ctdb port.
Domain to not audit.
Receive UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ctdb port.
Domain to not audit.
Send and receive UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
Domain to not audit.
Bind TCP sockets to the ctdb port.
Domain allowed access.
Bind UDP sockets to the ctdb port.
Domain allowed access.
Make a TCP connection to the ctdb port.
Domain allowed access.
Send ctdb_client packets.
Domain allowed access.
Do not audit attempts to send ctdb_client packets.
Domain to not audit.
Receive ctdb_client packets.
Domain allowed access.
Do not audit attempts to receive ctdb_client packets.
Domain allowed access.
Send and receive ctdb_client packets.
Domain allowed access.
Do not audit attempts to send and receive ctdb_client packets.
Domain to not audit.
Relabel packets to ctdb_client the packet type.
Domain allowed access.
Send ctdb_server packets.
Domain allowed access.
Do not audit attempts to send ctdb_server packets.
Domain to not audit.
Receive ctdb_server packets.
Domain allowed access.
Do not audit attempts to receive ctdb_server packets.
Domain allowed access.
Send and receive ctdb_server packets.
Domain allowed access.
Do not audit attempts to send and receive ctdb_server packets.
Domain to not audit.
Relabel packets to ctdb_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cvs port.
Domain allowed access.
Send UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cvs port.
Domain to not audit.
Receive UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cvs port.
Domain to not audit.
Send and receive UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cvs port.
Domain to not audit.
Bind TCP sockets to the cvs port.
Domain allowed access.
Bind UDP sockets to the cvs port.
Domain allowed access.
Make a TCP connection to the cvs port.
Domain allowed access.
Send cvs_client packets.
Domain allowed access.
Do not audit attempts to send cvs_client packets.
Domain to not audit.
Receive cvs_client packets.
Domain allowed access.
Do not audit attempts to receive cvs_client packets.
Domain allowed access.
Send and receive cvs_client packets.
Domain allowed access.
Do not audit attempts to send and receive cvs_client packets.
Domain to not audit.
Relabel packets to cvs_client the packet type.
Domain allowed access.
Send cvs_server packets.
Domain allowed access.
Do not audit attempts to send cvs_server packets.
Domain to not audit.
Receive cvs_server packets.
Domain allowed access.
Do not audit attempts to receive cvs_server packets.
Domain allowed access.
Send and receive cvs_server packets.
Domain allowed access.
Do not audit attempts to send and receive cvs_server packets.
Domain to not audit.
Relabel packets to cvs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cyphesis port.
Domain allowed access.
Send UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cyphesis port.
Domain to not audit.
Receive UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cyphesis port.
Domain to not audit.
Send and receive UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
Domain to not audit.
Bind TCP sockets to the cyphesis port.
Domain allowed access.
Bind UDP sockets to the cyphesis port.
Domain allowed access.
Make a TCP connection to the cyphesis port.
Domain allowed access.
Send cyphesis_client packets.
Domain allowed access.
Do not audit attempts to send cyphesis_client packets.
Domain to not audit.
Receive cyphesis_client packets.
Domain allowed access.
Do not audit attempts to receive cyphesis_client packets.
Domain allowed access.
Send and receive cyphesis_client packets.
Domain allowed access.
Do not audit attempts to send and receive cyphesis_client packets.
Domain to not audit.
Relabel packets to cyphesis_client the packet type.
Domain allowed access.
Send cyphesis_server packets.
Domain allowed access.
Do not audit attempts to send cyphesis_server packets.
Domain to not audit.
Receive cyphesis_server packets.
Domain allowed access.
Do not audit attempts to receive cyphesis_server packets.
Domain allowed access.
Send and receive cyphesis_server packets.
Domain allowed access.
Do not audit attempts to send and receive cyphesis_server packets.
Domain to not audit.
Relabel packets to cyphesis_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cyrus_imapd port.
Domain allowed access.
Send UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cyrus_imapd port.
Domain to not audit.
Receive UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cyrus_imapd port.
Domain to not audit.
Send and receive UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cyrus_imapd port.
Domain to not audit.
Bind TCP sockets to the cyrus_imapd port.
Domain allowed access.
Bind UDP sockets to the cyrus_imapd port.
Domain allowed access.
Make a TCP connection to the cyrus_imapd port.
Domain allowed access.
Send cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to send cyrus_imapd_client packets.
Domain to not audit.
Receive cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to receive cyrus_imapd_client packets.
Domain allowed access.
Send and receive cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to send and receive cyrus_imapd_client packets.
Domain to not audit.
Relabel packets to cyrus_imapd_client the packet type.
Domain allowed access.
Send cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to send cyrus_imapd_server packets.
Domain to not audit.
Receive cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to receive cyrus_imapd_server packets.
Domain allowed access.
Send and receive cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to send and receive cyrus_imapd_server packets.
Domain to not audit.
Relabel packets to cyrus_imapd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the connlcli port.
Domain allowed access.
Send UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the connlcli port.
Domain to not audit.
Receive UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the connlcli port.
Domain to not audit.
Send and receive UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the connlcli port.
Domain to not audit.
Bind TCP sockets to the connlcli port.
Domain allowed access.
Bind UDP sockets to the connlcli port.
Domain allowed access.
Make a TCP connection to the connlcli port.
Domain allowed access.
Send connlcli_client packets.
Domain allowed access.
Do not audit attempts to send connlcli_client packets.
Domain to not audit.
Receive connlcli_client packets.
Domain allowed access.
Do not audit attempts to receive connlcli_client packets.
Domain allowed access.
Send and receive connlcli_client packets.
Domain allowed access.
Do not audit attempts to send and receive connlcli_client packets.
Domain to not audit.
Relabel packets to connlcli_client the packet type.
Domain allowed access.
Send connlcli_server packets.
Domain allowed access.
Do not audit attempts to send connlcli_server packets.
Domain to not audit.
Receive connlcli_server packets.
Domain allowed access.
Do not audit attempts to receive connlcli_server packets.
Domain allowed access.
Send and receive connlcli_server packets.
Domain allowed access.
Do not audit attempts to send and receive connlcli_server packets.
Domain to not audit.
Relabel packets to connlcli_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gluster port.
Domain allowed access.
Send UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gluster port.
Domain to not audit.
Receive UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gluster port.
Domain to not audit.
Send and receive UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gluster port.
Domain to not audit.
Bind TCP sockets to the gluster port.
Domain allowed access.
Bind UDP sockets to the gluster port.
Domain allowed access.
Make a TCP connection to the gluster port.
Domain allowed access.
Send gluster_client packets.
Domain allowed access.
Do not audit attempts to send gluster_client packets.
Domain to not audit.
Receive gluster_client packets.
Domain allowed access.
Do not audit attempts to receive gluster_client packets.
Domain allowed access.
Send and receive gluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive gluster_client packets.
Domain to not audit.
Relabel packets to gluster_client the packet type.
Domain allowed access.
Send gluster_server packets.
Domain allowed access.
Do not audit attempts to send gluster_server packets.
Domain to not audit.
Receive gluster_server packets.
Domain allowed access.
Do not audit attempts to receive gluster_server packets.
Domain allowed access.
Send and receive gluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive gluster_server packets.
Domain to not audit.
Relabel packets to gluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dbskkd port.
Domain allowed access.
Send UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dbskkd port.
Domain to not audit.
Receive UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dbskkd port.
Domain to not audit.
Send and receive UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
Domain to not audit.
Bind TCP sockets to the dbskkd port.
Domain allowed access.
Bind UDP sockets to the dbskkd port.
Domain allowed access.
Make a TCP connection to the dbskkd port.
Domain allowed access.
Send dbskkd_client packets.
Domain allowed access.
Do not audit attempts to send dbskkd_client packets.
Domain to not audit.
Receive dbskkd_client packets.
Domain allowed access.
Do not audit attempts to receive dbskkd_client packets.
Domain allowed access.
Send and receive dbskkd_client packets.
Domain allowed access.
Do not audit attempts to send and receive dbskkd_client packets.
Domain to not audit.
Relabel packets to dbskkd_client the packet type.
Domain allowed access.
Send dbskkd_server packets.
Domain allowed access.
Do not audit attempts to send dbskkd_server packets.
Domain to not audit.
Receive dbskkd_server packets.
Domain allowed access.
Do not audit attempts to receive dbskkd_server packets.
Domain allowed access.
Send and receive dbskkd_server packets.
Domain allowed access.
Do not audit attempts to send and receive dbskkd_server packets.
Domain to not audit.
Relabel packets to dbskkd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dcc port.
Domain allowed access.
Send UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dcc port.
Domain to not audit.
Receive UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dcc port.
Domain to not audit.
Send and receive UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dcc port.
Domain to not audit.
Bind TCP sockets to the dcc port.
Domain allowed access.
Bind UDP sockets to the dcc port.
Domain allowed access.
Make a TCP connection to the dcc port.
Domain allowed access.
Send dcc_client packets.
Domain allowed access.
Do not audit attempts to send dcc_client packets.
Domain to not audit.
Receive dcc_client packets.
Domain allowed access.
Do not audit attempts to receive dcc_client packets.
Domain allowed access.
Send and receive dcc_client packets.
Domain allowed access.
Do not audit attempts to send and receive dcc_client packets.
Domain to not audit.
Relabel packets to dcc_client the packet type.
Domain allowed access.
Send dcc_server packets.
Domain allowed access.
Do not audit attempts to send dcc_server packets.
Domain to not audit.
Receive dcc_server packets.
Domain allowed access.
Do not audit attempts to receive dcc_server packets.
Domain allowed access.
Send and receive dcc_server packets.
Domain allowed access.
Do not audit attempts to send and receive dcc_server packets.
Domain to not audit.
Relabel packets to dcc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dccm port.
Domain allowed access.
Send UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dccm port.
Domain to not audit.
Receive UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dccm port.
Domain to not audit.
Send and receive UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dccm port.
Domain to not audit.
Bind TCP sockets to the dccm port.
Domain allowed access.
Bind UDP sockets to the dccm port.
Domain allowed access.
Make a TCP connection to the dccm port.
Domain allowed access.
Send dccm_client packets.
Domain allowed access.
Do not audit attempts to send dccm_client packets.
Domain to not audit.
Receive dccm_client packets.
Domain allowed access.
Do not audit attempts to receive dccm_client packets.
Domain allowed access.
Send and receive dccm_client packets.
Domain allowed access.
Do not audit attempts to send and receive dccm_client packets.
Domain to not audit.
Relabel packets to dccm_client the packet type.
Domain allowed access.
Send dccm_server packets.
Domain allowed access.
Do not audit attempts to send dccm_server packets.
Domain to not audit.
Receive dccm_server packets.
Domain allowed access.
Do not audit attempts to receive dccm_server packets.
Domain allowed access.
Send and receive dccm_server packets.
Domain allowed access.
Do not audit attempts to send and receive dccm_server packets.
Domain to not audit.
Relabel packets to dccm_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dhcpc port.
Domain allowed access.
Send UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dhcpc port.
Domain to not audit.
Receive UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dhcpc port.
Domain to not audit.
Send and receive UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
Domain to not audit.
Bind TCP sockets to the dhcpc port.
Domain allowed access.
Bind UDP sockets to the dhcpc port.
Domain allowed access.
Make a TCP connection to the dhcpc port.
Domain allowed access.
Send dhcpc_client packets.
Domain allowed access.
Do not audit attempts to send dhcpc_client packets.
Domain to not audit.
Receive dhcpc_client packets.
Domain allowed access.
Do not audit attempts to receive dhcpc_client packets.
Domain allowed access.
Send and receive dhcpc_client packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpc_client packets.
Domain to not audit.
Relabel packets to dhcpc_client the packet type.
Domain allowed access.
Send dhcpc_server packets.
Domain allowed access.
Do not audit attempts to send dhcpc_server packets.
Domain to not audit.
Receive dhcpc_server packets.
Domain allowed access.
Do not audit attempts to receive dhcpc_server packets.
Domain allowed access.
Send and receive dhcpc_server packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpc_server packets.
Domain to not audit.
Relabel packets to dhcpc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dhcpd port.
Domain allowed access.
Send UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dhcpd port.
Domain to not audit.
Receive UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dhcpd port.
Domain to not audit.
Send and receive UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
Domain to not audit.
Bind TCP sockets to the dhcpd port.
Domain allowed access.
Bind UDP sockets to the dhcpd port.
Domain allowed access.
Make a TCP connection to the dhcpd port.
Domain allowed access.
Send dhcpd_client packets.
Domain allowed access.
Do not audit attempts to send dhcpd_client packets.
Domain to not audit.
Receive dhcpd_client packets.
Domain allowed access.
Do not audit attempts to receive dhcpd_client packets.
Domain allowed access.
Send and receive dhcpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpd_client packets.
Domain to not audit.
Relabel packets to dhcpd_client the packet type.
Domain allowed access.
Send dhcpd_server packets.
Domain allowed access.
Do not audit attempts to send dhcpd_server packets.
Domain to not audit.
Receive dhcpd_server packets.
Domain allowed access.
Do not audit attempts to receive dhcpd_server packets.
Domain allowed access.
Send and receive dhcpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpd_server packets.
Domain to not audit.
Relabel packets to dhcpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dey_sapi port.
Domain allowed access.
Send UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dey_sapi port.
Domain to not audit.
Receive UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dey_sapi port.
Domain to not audit.
Send and receive UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dey_sapi port.
Domain to not audit.
Bind TCP sockets to the dey_sapi port.
Domain allowed access.
Bind UDP sockets to the dey_sapi port.
Domain allowed access.
Make a TCP connection to the dey_sapi port.
Domain allowed access.
Send dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to send dey_sapi_client packets.
Domain to not audit.
Receive dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to receive dey_sapi_client packets.
Domain allowed access.
Send and receive dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to send and receive dey_sapi_client packets.
Domain to not audit.
Relabel packets to dey_sapi_client the packet type.
Domain allowed access.
Send dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to send dey_sapi_server packets.
Domain to not audit.
Receive dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to receive dey_sapi_server packets.
Domain allowed access.
Send and receive dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to send and receive dey_sapi_server packets.
Domain to not audit.
Relabel packets to dey_sapi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dict port.
Domain allowed access.
Send UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dict port.
Domain to not audit.
Receive UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dict port.
Domain to not audit.
Send and receive UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dict port.
Domain to not audit.
Bind TCP sockets to the dict port.
Domain allowed access.
Bind UDP sockets to the dict port.
Domain allowed access.
Make a TCP connection to the dict port.
Domain allowed access.
Send dict_client packets.
Domain allowed access.
Do not audit attempts to send dict_client packets.
Domain to not audit.
Receive dict_client packets.
Domain allowed access.
Do not audit attempts to receive dict_client packets.
Domain allowed access.
Send and receive dict_client packets.
Domain allowed access.
Do not audit attempts to send and receive dict_client packets.
Domain to not audit.
Relabel packets to dict_client the packet type.
Domain allowed access.
Send dict_server packets.
Domain allowed access.
Do not audit attempts to send dict_server packets.
Domain to not audit.
Receive dict_server packets.
Domain allowed access.
Do not audit attempts to receive dict_server packets.
Domain allowed access.
Send and receive dict_server packets.
Domain allowed access.
Do not audit attempts to send and receive dict_server packets.
Domain to not audit.
Relabel packets to dict_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the distccd port.
Domain allowed access.
Send UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the distccd port.
Domain to not audit.
Receive UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the distccd port.
Domain to not audit.
Send and receive UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the distccd port.
Domain to not audit.
Bind TCP sockets to the distccd port.
Domain allowed access.
Bind UDP sockets to the distccd port.
Domain allowed access.
Make a TCP connection to the distccd port.
Domain allowed access.
Send distccd_client packets.
Domain allowed access.
Do not audit attempts to send distccd_client packets.
Domain to not audit.
Receive distccd_client packets.
Domain allowed access.
Do not audit attempts to receive distccd_client packets.
Domain allowed access.
Send and receive distccd_client packets.
Domain allowed access.
Do not audit attempts to send and receive distccd_client packets.
Domain to not audit.
Relabel packets to distccd_client the packet type.
Domain allowed access.
Send distccd_server packets.
Domain allowed access.
Do not audit attempts to send distccd_server packets.
Domain to not audit.
Receive distccd_server packets.
Domain allowed access.
Do not audit attempts to receive distccd_server packets.
Domain allowed access.
Send and receive distccd_server packets.
Domain allowed access.
Do not audit attempts to send and receive distccd_server packets.
Domain to not audit.
Relabel packets to distccd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dns port.
Domain allowed access.
Send UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dns port.
Domain to not audit.
Receive UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dns port.
Domain to not audit.
Send and receive UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dns port.
Domain to not audit.
Bind TCP sockets to the dns port.
Domain allowed access.
Bind UDP sockets to the dns port.
Domain allowed access.
Make a TCP connection to the dns port.
Domain allowed access.
Send dns_client packets.
Domain allowed access.
Do not audit attempts to send dns_client packets.
Domain to not audit.
Receive dns_client packets.
Domain allowed access.
Do not audit attempts to receive dns_client packets.
Domain allowed access.
Send and receive dns_client packets.
Domain allowed access.
Do not audit attempts to send and receive dns_client packets.
Domain to not audit.
Relabel packets to dns_client the packet type.
Domain allowed access.
Send dns_server packets.
Domain allowed access.
Do not audit attempts to send dns_server packets.
Domain to not audit.
Receive dns_server packets.
Domain allowed access.
Do not audit attempts to receive dns_server packets.
Domain allowed access.
Send and receive dns_server packets.
Domain allowed access.
Do not audit attempts to send and receive dns_server packets.
Domain to not audit.
Relabel packets to dns_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dogtag port.
Domain allowed access.
Send UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dogtag port.
Domain to not audit.
Receive UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dogtag port.
Domain to not audit.
Send and receive UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dogtag port.
Domain to not audit.
Bind TCP sockets to the dogtag port.
Domain allowed access.
Bind UDP sockets to the dogtag port.
Domain allowed access.
Make a TCP connection to the dogtag port.
Domain allowed access.
Send dogtag_client packets.
Domain allowed access.
Do not audit attempts to send dogtag_client packets.
Domain to not audit.
Receive dogtag_client packets.
Domain allowed access.
Do not audit attempts to receive dogtag_client packets.
Domain allowed access.
Send and receive dogtag_client packets.
Domain allowed access.
Do not audit attempts to send and receive dogtag_client packets.
Domain to not audit.
Relabel packets to dogtag_client the packet type.
Domain allowed access.
Send dogtag_server packets.
Domain allowed access.
Do not audit attempts to send dogtag_server packets.
Domain to not audit.
Receive dogtag_server packets.
Domain allowed access.
Do not audit attempts to receive dogtag_server packets.
Domain allowed access.
Send and receive dogtag_server packets.
Domain allowed access.
Do not audit attempts to send and receive dogtag_server packets.
Domain to not audit.
Relabel packets to dogtag_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dspam port.
Domain allowed access.
Send UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dspam port.
Domain to not audit.
Receive UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dspam port.
Domain to not audit.
Send and receive UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dspam port.
Domain to not audit.
Bind TCP sockets to the dspam port.
Domain allowed access.
Bind UDP sockets to the dspam port.
Domain allowed access.
Make a TCP connection to the dspam port.
Domain allowed access.
Send dspam_client packets.
Domain allowed access.
Do not audit attempts to send dspam_client packets.
Domain to not audit.
Receive dspam_client packets.
Domain allowed access.
Do not audit attempts to receive dspam_client packets.
Domain allowed access.
Send and receive dspam_client packets.
Domain allowed access.
Do not audit attempts to send and receive dspam_client packets.
Domain to not audit.
Relabel packets to dspam_client the packet type.
Domain allowed access.
Send dspam_server packets.
Domain allowed access.
Do not audit attempts to send dspam_server packets.
Domain to not audit.
Receive dspam_server packets.
Domain allowed access.
Do not audit attempts to receive dspam_server packets.
Domain allowed access.
Send and receive dspam_server packets.
Domain allowed access.
Do not audit attempts to send and receive dspam_server packets.
Domain to not audit.
Relabel packets to dspam_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the epmap port.
Domain allowed access.
Send UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the epmap port.
Domain to not audit.
Receive UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the epmap port.
Domain to not audit.
Send and receive UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the epmap port.
Domain to not audit.
Bind TCP sockets to the epmap port.
Domain allowed access.
Bind UDP sockets to the epmap port.
Domain allowed access.
Make a TCP connection to the epmap port.
Domain allowed access.
Send epmap_client packets.
Domain allowed access.
Do not audit attempts to send epmap_client packets.
Domain to not audit.
Receive epmap_client packets.
Domain allowed access.
Do not audit attempts to receive epmap_client packets.
Domain allowed access.
Send and receive epmap_client packets.
Domain allowed access.
Do not audit attempts to send and receive epmap_client packets.
Domain to not audit.
Relabel packets to epmap_client the packet type.
Domain allowed access.
Send epmap_server packets.
Domain allowed access.
Do not audit attempts to send epmap_server packets.
Domain to not audit.
Receive epmap_server packets.
Domain allowed access.
Do not audit attempts to receive epmap_server packets.
Domain allowed access.
Send and receive epmap_server packets.
Domain allowed access.
Do not audit attempts to send and receive epmap_server packets.
Domain to not audit.
Relabel packets to epmap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the festival port.
Domain allowed access.
Send UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the festival port.
Domain to not audit.
Receive UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the festival port.
Domain to not audit.
Send and receive UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the festival port.
Domain to not audit.
Bind TCP sockets to the festival port.
Domain allowed access.
Bind UDP sockets to the festival port.
Domain allowed access.
Make a TCP connection to the festival port.
Domain allowed access.
Send festival_client packets.
Domain allowed access.
Do not audit attempts to send festival_client packets.
Domain to not audit.
Receive festival_client packets.
Domain allowed access.
Do not audit attempts to receive festival_client packets.
Domain allowed access.
Send and receive festival_client packets.
Domain allowed access.
Do not audit attempts to send and receive festival_client packets.
Domain to not audit.
Relabel packets to festival_client the packet type.
Domain allowed access.
Send festival_server packets.
Domain allowed access.
Do not audit attempts to send festival_server packets.
Domain to not audit.
Receive festival_server packets.
Domain allowed access.
Do not audit attempts to receive festival_server packets.
Domain allowed access.
Send and receive festival_server packets.
Domain allowed access.
Do not audit attempts to send and receive festival_server packets.
Domain to not audit.
Relabel packets to festival_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the fingerd port.
Domain allowed access.
Send UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the fingerd port.
Domain to not audit.
Receive UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the fingerd port.
Domain to not audit.
Send and receive UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
Domain to not audit.
Bind TCP sockets to the fingerd port.
Domain allowed access.
Bind UDP sockets to the fingerd port.
Domain allowed access.
Make a TCP connection to the fingerd port.
Domain allowed access.
Send fingerd_client packets.
Domain allowed access.
Do not audit attempts to send fingerd_client packets.
Domain to not audit.
Receive fingerd_client packets.
Domain allowed access.
Do not audit attempts to receive fingerd_client packets.
Domain allowed access.
Send and receive fingerd_client packets.
Domain allowed access.
Do not audit attempts to send and receive fingerd_client packets.
Domain to not audit.
Relabel packets to fingerd_client the packet type.
Domain allowed access.
Send fingerd_server packets.
Domain allowed access.
Do not audit attempts to send fingerd_server packets.
Domain to not audit.
Receive fingerd_server packets.
Domain allowed access.
Do not audit attempts to receive fingerd_server packets.
Domain allowed access.
Send and receive fingerd_server packets.
Domain allowed access.
Do not audit attempts to send and receive fingerd_server packets.
Domain to not audit.
Relabel packets to fingerd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the flash port.
Domain allowed access.
Send UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the flash port.
Domain to not audit.
Receive UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the flash port.
Domain to not audit.
Send and receive UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the flash port.
Domain to not audit.
Bind TCP sockets to the flash port.
Domain allowed access.
Bind UDP sockets to the flash port.
Domain allowed access.
Make a TCP connection to the flash port.
Domain allowed access.
Send flash_client packets.
Domain allowed access.
Do not audit attempts to send flash_client packets.
Domain to not audit.
Receive flash_client packets.
Domain allowed access.
Do not audit attempts to receive flash_client packets.
Domain allowed access.
Send and receive flash_client packets.
Domain allowed access.
Do not audit attempts to send and receive flash_client packets.
Domain to not audit.
Relabel packets to flash_client the packet type.
Domain allowed access.
Send flash_server packets.
Domain allowed access.
Do not audit attempts to send flash_server packets.
Domain to not audit.
Receive flash_server packets.
Domain allowed access.
Do not audit attempts to receive flash_server packets.
Domain allowed access.
Send and receive flash_server packets.
Domain allowed access.
Do not audit attempts to send and receive flash_server packets.
Domain to not audit.
Relabel packets to flash_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the florence port.
Domain allowed access.
Send UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the florence port.
Domain to not audit.
Receive UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the florence port.
Domain to not audit.
Send and receive UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the florence port.
Domain to not audit.
Bind TCP sockets to the florence port.
Domain allowed access.
Bind UDP sockets to the florence port.
Domain allowed access.
Make a TCP connection to the florence port.
Domain allowed access.
Send florence_client packets.
Domain allowed access.
Do not audit attempts to send florence_client packets.
Domain to not audit.
Receive florence_client packets.
Domain allowed access.
Do not audit attempts to receive florence_client packets.
Domain allowed access.
Send and receive florence_client packets.
Domain allowed access.
Do not audit attempts to send and receive florence_client packets.
Domain to not audit.
Relabel packets to florence_client the packet type.
Domain allowed access.
Send florence_server packets.
Domain allowed access.
Do not audit attempts to send florence_server packets.
Domain to not audit.
Receive florence_server packets.
Domain allowed access.
Do not audit attempts to receive florence_server packets.
Domain allowed access.
Send and receive florence_server packets.
Domain allowed access.
Do not audit attempts to send and receive florence_server packets.
Domain to not audit.
Relabel packets to florence_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the freeipmi port.
Domain allowed access.
Send UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the freeipmi port.
Domain to not audit.
Receive UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the freeipmi port.
Domain to not audit.
Send and receive UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the freeipmi port.
Domain to not audit.
Bind TCP sockets to the freeipmi port.
Domain allowed access.
Bind UDP sockets to the freeipmi port.
Domain allowed access.
Make a TCP connection to the freeipmi port.
Domain allowed access.
Send freeipmi_client packets.
Domain allowed access.
Do not audit attempts to send freeipmi_client packets.
Domain to not audit.
Receive freeipmi_client packets.
Domain allowed access.
Do not audit attempts to receive freeipmi_client packets.
Domain allowed access.
Send and receive freeipmi_client packets.
Domain allowed access.
Do not audit attempts to send and receive freeipmi_client packets.
Domain to not audit.
Relabel packets to freeipmi_client the packet type.
Domain allowed access.
Send freeipmi_server packets.
Domain allowed access.
Do not audit attempts to send freeipmi_server packets.
Domain to not audit.
Receive freeipmi_server packets.
Domain allowed access.
Do not audit attempts to receive freeipmi_server packets.
Domain allowed access.
Send and receive freeipmi_server packets.
Domain allowed access.
Do not audit attempts to send and receive freeipmi_server packets.
Domain to not audit.
Relabel packets to freeipmi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ftp port.
Domain allowed access.
Send UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ftp port.
Domain to not audit.
Receive UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ftp port.
Domain to not audit.
Send and receive UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ftp port.
Domain to not audit.
Bind TCP sockets to the ftp port.
Domain allowed access.
Bind UDP sockets to the ftp port.
Domain allowed access.
Make a TCP connection to the ftp port.
Domain allowed access.
Send ftp_client packets.
Domain allowed access.
Do not audit attempts to send ftp_client packets.
Domain to not audit.
Receive ftp_client packets.
Domain allowed access.
Do not audit attempts to receive ftp_client packets.
Domain allowed access.
Send and receive ftp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_client packets.
Domain to not audit.
Relabel packets to ftp_client the packet type.
Domain allowed access.
Send ftp_server packets.
Domain allowed access.
Do not audit attempts to send ftp_server packets.
Domain to not audit.
Receive ftp_server packets.
Domain allowed access.
Do not audit attempts to receive ftp_server packets.
Domain allowed access.
Send and receive ftp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_server packets.
Domain to not audit.
Relabel packets to ftp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ftp_data port.
Domain allowed access.
Send UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ftp_data port.
Domain to not audit.
Receive UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ftp_data port.
Domain to not audit.
Send and receive UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
Domain to not audit.
Bind TCP sockets to the ftp_data port.
Domain allowed access.
Bind UDP sockets to the ftp_data port.
Domain allowed access.
Make a TCP connection to the ftp_data port.
Domain allowed access.
Send ftp_data_client packets.
Domain allowed access.
Do not audit attempts to send ftp_data_client packets.
Domain to not audit.
Receive ftp_data_client packets.
Domain allowed access.
Do not audit attempts to receive ftp_data_client packets.
Domain allowed access.
Send and receive ftp_data_client packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_data_client packets.
Domain to not audit.
Relabel packets to ftp_data_client the packet type.
Domain allowed access.
Send ftp_data_server packets.
Domain allowed access.
Do not audit attempts to send ftp_data_server packets.
Domain to not audit.
Receive ftp_data_server packets.
Domain allowed access.
Do not audit attempts to receive ftp_data_server packets.
Domain allowed access.
Send and receive ftp_data_server packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_data_server packets.
Domain to not audit.
Relabel packets to ftp_data_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gatekeeper port.
Domain allowed access.
Send UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gatekeeper port.
Domain to not audit.
Receive UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gatekeeper port.
Domain to not audit.
Send and receive UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
Domain to not audit.
Bind TCP sockets to the gatekeeper port.
Domain allowed access.
Bind UDP sockets to the gatekeeper port.
Domain allowed access.
Make a TCP connection to the gatekeeper port.
Domain allowed access.
Send gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to send gatekeeper_client packets.
Domain to not audit.
Receive gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to receive gatekeeper_client packets.
Domain allowed access.
Send and receive gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to send and receive gatekeeper_client packets.
Domain to not audit.
Relabel packets to gatekeeper_client the packet type.
Domain allowed access.
Send gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to send gatekeeper_server packets.
Domain to not audit.
Receive gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to receive gatekeeper_server packets.
Domain allowed access.
Send and receive gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to send and receive gatekeeper_server packets.
Domain to not audit.
Relabel packets to gatekeeper_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the giftd port.
Domain allowed access.
Send UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the giftd port.
Domain to not audit.
Receive UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the giftd port.
Domain to not audit.
Send and receive UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the giftd port.
Domain to not audit.
Bind TCP sockets to the giftd port.
Domain allowed access.
Bind UDP sockets to the giftd port.
Domain allowed access.
Make a TCP connection to the giftd port.
Domain allowed access.
Send giftd_client packets.
Domain allowed access.
Do not audit attempts to send giftd_client packets.
Domain to not audit.
Receive giftd_client packets.
Domain allowed access.
Do not audit attempts to receive giftd_client packets.
Domain allowed access.
Send and receive giftd_client packets.
Domain allowed access.
Do not audit attempts to send and receive giftd_client packets.
Domain to not audit.
Relabel packets to giftd_client the packet type.
Domain allowed access.
Send giftd_server packets.
Domain allowed access.
Do not audit attempts to send giftd_server packets.
Domain to not audit.
Receive giftd_server packets.
Domain allowed access.
Do not audit attempts to receive giftd_server packets.
Domain allowed access.
Send and receive giftd_server packets.
Domain allowed access.
Do not audit attempts to send and receive giftd_server packets.
Domain to not audit.
Relabel packets to giftd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the git port.
Domain allowed access.
Send UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the git port.
Domain to not audit.
Receive UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the git port.
Domain to not audit.
Send and receive UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the git port.
Domain to not audit.
Bind TCP sockets to the git port.
Domain allowed access.
Bind UDP sockets to the git port.
Domain allowed access.
Make a TCP connection to the git port.
Domain allowed access.
Send git_client packets.
Domain allowed access.
Do not audit attempts to send git_client packets.
Domain to not audit.
Receive git_client packets.
Domain allowed access.
Do not audit attempts to receive git_client packets.
Domain allowed access.
Send and receive git_client packets.
Domain allowed access.
Do not audit attempts to send and receive git_client packets.
Domain to not audit.
Relabel packets to git_client the packet type.
Domain allowed access.
Send git_server packets.
Domain allowed access.
Do not audit attempts to send git_server packets.
Domain to not audit.
Receive git_server packets.
Domain allowed access.
Do not audit attempts to receive git_server packets.
Domain allowed access.
Send and receive git_server packets.
Domain allowed access.
Do not audit attempts to send and receive git_server packets.
Domain to not audit.
Relabel packets to git_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the glance port.
Domain allowed access.
Send UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the glance port.
Domain to not audit.
Receive UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the glance port.
Domain to not audit.
Send and receive UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the glance port.
Domain to not audit.
Bind TCP sockets to the glance port.
Domain allowed access.
Bind UDP sockets to the glance port.
Domain allowed access.
Make a TCP connection to the glance port.
Domain allowed access.
Send glance_client packets.
Domain allowed access.
Do not audit attempts to send glance_client packets.
Domain to not audit.
Receive glance_client packets.
Domain allowed access.
Do not audit attempts to receive glance_client packets.
Domain allowed access.
Send and receive glance_client packets.
Domain allowed access.
Do not audit attempts to send and receive glance_client packets.
Domain to not audit.
Relabel packets to glance_client the packet type.
Domain allowed access.
Send glance_server packets.
Domain allowed access.
Do not audit attempts to send glance_server packets.
Domain to not audit.
Receive glance_server packets.
Domain allowed access.
Do not audit attempts to receive glance_server packets.
Domain allowed access.
Send and receive glance_server packets.
Domain allowed access.
Do not audit attempts to send and receive glance_server packets.
Domain to not audit.
Relabel packets to glance_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the glance_registry port.
Domain allowed access.
Send UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the glance_registry port.
Domain to not audit.
Receive UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the glance_registry port.
Domain to not audit.
Send and receive UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
Domain to not audit.
Bind TCP sockets to the glance_registry port.
Domain allowed access.
Bind UDP sockets to the glance_registry port.
Domain allowed access.
Make a TCP connection to the glance_registry port.
Domain allowed access.
Send glance_registry_client packets.
Domain allowed access.
Do not audit attempts to send glance_registry_client packets.
Domain to not audit.
Receive glance_registry_client packets.
Domain allowed access.
Do not audit attempts to receive glance_registry_client packets.
Domain allowed access.
Send and receive glance_registry_client packets.
Domain allowed access.
Do not audit attempts to send and receive glance_registry_client packets.
Domain to not audit.
Relabel packets to glance_registry_client the packet type.
Domain allowed access.
Send glance_registry_server packets.
Domain allowed access.
Do not audit attempts to send glance_registry_server packets.
Domain to not audit.
Receive glance_registry_server packets.
Domain allowed access.
Do not audit attempts to receive glance_registry_server packets.
Domain allowed access.
Send and receive glance_registry_server packets.
Domain allowed access.
Do not audit attempts to send and receive glance_registry_server packets.
Domain to not audit.
Relabel packets to glance_registry_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gopher port.
Domain allowed access.
Send UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gopher port.
Domain to not audit.
Receive UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gopher port.
Domain to not audit.
Send and receive UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gopher port.
Domain to not audit.
Bind TCP sockets to the gopher port.
Domain allowed access.
Bind UDP sockets to the gopher port.
Domain allowed access.
Make a TCP connection to the gopher port.
Domain allowed access.
Send gopher_client packets.
Domain allowed access.
Do not audit attempts to send gopher_client packets.
Domain to not audit.
Receive gopher_client packets.
Domain allowed access.
Do not audit attempts to receive gopher_client packets.
Domain allowed access.
Send and receive gopher_client packets.
Domain allowed access.
Do not audit attempts to send and receive gopher_client packets.
Domain to not audit.
Relabel packets to gopher_client the packet type.
Domain allowed access.
Send gopher_server packets.
Domain allowed access.
Do not audit attempts to send gopher_server packets.
Domain to not audit.
Receive gopher_server packets.
Domain allowed access.
Do not audit attempts to receive gopher_server packets.
Domain allowed access.
Send and receive gopher_server packets.
Domain allowed access.
Do not audit attempts to send and receive gopher_server packets.
Domain to not audit.
Relabel packets to gopher_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gpsd port.
Domain allowed access.
Send UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gpsd port.
Domain to not audit.
Receive UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gpsd port.
Domain to not audit.
Send and receive UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
Domain to not audit.
Bind TCP sockets to the gpsd port.
Domain allowed access.
Bind UDP sockets to the gpsd port.
Domain allowed access.
Make a TCP connection to the gpsd port.
Domain allowed access.
Send gpsd_client packets.
Domain allowed access.
Do not audit attempts to send gpsd_client packets.
Domain to not audit.
Receive gpsd_client packets.
Domain allowed access.
Do not audit attempts to receive gpsd_client packets.
Domain allowed access.
Send and receive gpsd_client packets.
Domain allowed access.
Do not audit attempts to send and receive gpsd_client packets.
Domain to not audit.
Relabel packets to gpsd_client the packet type.
Domain allowed access.
Send gpsd_server packets.
Domain allowed access.
Do not audit attempts to send gpsd_server packets.
Domain to not audit.
Receive gpsd_server packets.
Domain allowed access.
Do not audit attempts to receive gpsd_server packets.
Domain allowed access.
Send and receive gpsd_server packets.
Domain allowed access.
Do not audit attempts to send and receive gpsd_server packets.
Domain to not audit.
Relabel packets to gpsd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the hddtemp port.
Domain allowed access.
Send UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the hddtemp port.
Domain to not audit.
Receive UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the hddtemp port.
Domain to not audit.
Send and receive UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
Domain to not audit.
Bind TCP sockets to the hddtemp port.
Domain allowed access.
Bind UDP sockets to the hddtemp port.
Domain allowed access.
Make a TCP connection to the hddtemp port.
Domain allowed access.
Send hddtemp_client packets.
Domain allowed access.
Do not audit attempts to send hddtemp_client packets.
Domain to not audit.
Receive hddtemp_client packets.
Domain allowed access.
Do not audit attempts to receive hddtemp_client packets.
Domain allowed access.
Send and receive hddtemp_client packets.
Domain allowed access.
Do not audit attempts to send and receive hddtemp_client packets.
Domain to not audit.
Relabel packets to hddtemp_client the packet type.
Domain allowed access.
Send hddtemp_server packets.
Domain allowed access.
Do not audit attempts to send hddtemp_server packets.
Domain to not audit.
Receive hddtemp_server packets.
Domain allowed access.
Do not audit attempts to receive hddtemp_server packets.
Domain allowed access.
Send and receive hddtemp_server packets.
Domain allowed access.
Do not audit attempts to send and receive hddtemp_server packets.
Domain to not audit.
Relabel packets to hddtemp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the howl port.
Domain allowed access.
Send UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the howl port.
Domain to not audit.
Receive UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the howl port.
Domain to not audit.
Send and receive UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the howl port.
Domain to not audit.
Bind TCP sockets to the howl port.
Domain allowed access.
Bind UDP sockets to the howl port.
Domain allowed access.
Make a TCP connection to the howl port.
Domain allowed access.
Send howl_client packets.
Domain allowed access.
Do not audit attempts to send howl_client packets.
Domain to not audit.
Receive howl_client packets.
Domain allowed access.
Do not audit attempts to receive howl_client packets.
Domain allowed access.
Send and receive howl_client packets.
Domain allowed access.
Do not audit attempts to send and receive howl_client packets.
Domain to not audit.
Relabel packets to howl_client the packet type.
Domain allowed access.
Send howl_server packets.
Domain allowed access.
Do not audit attempts to send howl_server packets.
Domain to not audit.
Receive howl_server packets.
Domain allowed access.
Do not audit attempts to receive howl_server packets.
Domain allowed access.
Send and receive howl_server packets.
Domain allowed access.
Do not audit attempts to send and receive howl_server packets.
Domain to not audit.
Relabel packets to howl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the hplip port.
Domain allowed access.
Send UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the hplip port.
Domain to not audit.
Receive UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the hplip port.
Domain to not audit.
Send and receive UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the hplip port.
Domain to not audit.
Bind TCP sockets to the hplip port.
Domain allowed access.
Bind UDP sockets to the hplip port.
Domain allowed access.
Make a TCP connection to the hplip port.
Domain allowed access.
Send hplip_client packets.
Domain allowed access.
Do not audit attempts to send hplip_client packets.
Domain to not audit.
Receive hplip_client packets.
Domain allowed access.
Do not audit attempts to receive hplip_client packets.
Domain allowed access.
Send and receive hplip_client packets.
Domain allowed access.
Do not audit attempts to send and receive hplip_client packets.
Domain to not audit.
Relabel packets to hplip_client the packet type.
Domain allowed access.
Send hplip_server packets.
Domain allowed access.
Do not audit attempts to send hplip_server packets.
Domain to not audit.
Receive hplip_server packets.
Domain allowed access.
Do not audit attempts to receive hplip_server packets.
Domain allowed access.
Send and receive hplip_server packets.
Domain allowed access.
Do not audit attempts to send and receive hplip_server packets.
Domain to not audit.
Relabel packets to hplip_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the http port.
Domain allowed access.
Send UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the http port.
Domain to not audit.
Receive UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the http port.
Domain to not audit.
Send and receive UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the http port.
Domain to not audit.
Bind TCP sockets to the http port.
Domain allowed access.
Bind UDP sockets to the http port.
Domain allowed access.
Make a TCP connection to the http port.
Domain allowed access.
Send http_client packets.
Domain allowed access.
Do not audit attempts to send http_client packets.
Domain to not audit.
Receive http_client packets.
Domain allowed access.
Do not audit attempts to receive http_client packets.
Domain allowed access.
Send and receive http_client packets.
Domain allowed access.
Do not audit attempts to send and receive http_client packets.
Domain to not audit.
Relabel packets to http_client the packet type.
Domain allowed access.
Send http_server packets.
Domain allowed access.
Do not audit attempts to send http_server packets.
Domain to not audit.
Receive http_server packets.
Domain allowed access.
Do not audit attempts to receive http_server packets.
Domain allowed access.
Send and receive http_server packets.
Domain allowed access.
Do not audit attempts to send and receive http_server packets.
Domain to not audit.
Relabel packets to http_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the http_cache port.
Domain allowed access.
Send UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the http_cache port.
Domain to not audit.
Receive UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the http_cache port.
Domain to not audit.
Send and receive UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
Domain to not audit.
Bind TCP sockets to the http_cache port.
Domain allowed access.
Bind UDP sockets to the http_cache port.
Domain allowed access.
Make a TCP connection to the http_cache port.
Domain allowed access.
Send http_cache_client packets.
Domain allowed access.
Do not audit attempts to send http_cache_client packets.
Domain to not audit.
Receive http_cache_client packets.
Domain allowed access.
Do not audit attempts to receive http_cache_client packets.
Domain allowed access.
Send and receive http_cache_client packets.
Domain allowed access.
Do not audit attempts to send and receive http_cache_client packets.
Domain to not audit.
Relabel packets to http_cache_client the packet type.
Domain allowed access.
Send http_cache_server packets.
Domain allowed access.
Do not audit attempts to send http_cache_server packets.
Domain to not audit.
Receive http_cache_server packets.
Domain allowed access.
Do not audit attempts to receive http_cache_server packets.
Domain allowed access.
Send and receive http_cache_server packets.
Domain allowed access.
Do not audit attempts to send and receive http_cache_server packets.
Domain to not audit.
Relabel packets to http_cache_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the i18n_input port.
Domain allowed access.
Send UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the i18n_input port.
Domain to not audit.
Receive UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the i18n_input port.
Domain to not audit.
Send and receive UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
Domain to not audit.
Bind TCP sockets to the i18n_input port.
Domain allowed access.
Bind UDP sockets to the i18n_input port.
Domain allowed access.
Make a TCP connection to the i18n_input port.
Domain allowed access.
Send i18n_input_client packets.
Domain allowed access.
Do not audit attempts to send i18n_input_client packets.
Domain to not audit.
Receive i18n_input_client packets.
Domain allowed access.
Do not audit attempts to receive i18n_input_client packets.
Domain allowed access.
Send and receive i18n_input_client packets.
Domain allowed access.
Do not audit attempts to send and receive i18n_input_client packets.
Domain to not audit.
Relabel packets to i18n_input_client the packet type.
Domain allowed access.
Send i18n_input_server packets.
Domain allowed access.
Do not audit attempts to send i18n_input_server packets.
Domain to not audit.
Receive i18n_input_server packets.
Domain allowed access.
Do not audit attempts to receive i18n_input_server packets.
Domain allowed access.
Send and receive i18n_input_server packets.
Domain allowed access.
Do not audit attempts to send and receive i18n_input_server packets.
Domain to not audit.
Relabel packets to i18n_input_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the imaze port.
Domain allowed access.
Send UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the imaze port.
Domain to not audit.
Receive UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the imaze port.
Domain to not audit.
Send and receive UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the imaze port.
Domain to not audit.
Bind TCP sockets to the imaze port.
Domain allowed access.
Bind UDP sockets to the imaze port.
Domain allowed access.
Make a TCP connection to the imaze port.
Domain allowed access.
Send imaze_client packets.
Domain allowed access.
Do not audit attempts to send imaze_client packets.
Domain to not audit.
Receive imaze_client packets.
Domain allowed access.
Do not audit attempts to receive imaze_client packets.
Domain allowed access.
Send and receive imaze_client packets.
Domain allowed access.
Do not audit attempts to send and receive imaze_client packets.
Domain to not audit.
Relabel packets to imaze_client the packet type.
Domain allowed access.
Send imaze_server packets.
Domain allowed access.
Do not audit attempts to send imaze_server packets.
Domain to not audit.
Receive imaze_server packets.
Domain allowed access.
Do not audit attempts to receive imaze_server packets.
Domain allowed access.
Send and receive imaze_server packets.
Domain allowed access.
Do not audit attempts to send and receive imaze_server packets.
Domain to not audit.
Relabel packets to imaze_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the inetd_child port.
Domain allowed access.
Send UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the inetd_child port.
Domain to not audit.
Receive UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the inetd_child port.
Domain to not audit.
Send and receive UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
Domain to not audit.
Bind TCP sockets to the inetd_child port.
Domain allowed access.
Bind UDP sockets to the inetd_child port.
Domain allowed access.
Make a TCP connection to the inetd_child port.
Domain allowed access.
Send inetd_child_client packets.
Domain allowed access.
Do not audit attempts to send inetd_child_client packets.
Domain to not audit.
Receive inetd_child_client packets.
Domain allowed access.
Do not audit attempts to receive inetd_child_client packets.
Domain allowed access.
Send and receive inetd_child_client packets.
Domain allowed access.
Do not audit attempts to send and receive inetd_child_client packets.
Domain to not audit.
Relabel packets to inetd_child_client the packet type.
Domain allowed access.
Send inetd_child_server packets.
Domain allowed access.
Do not audit attempts to send inetd_child_server packets.
Domain to not audit.
Receive inetd_child_server packets.
Domain allowed access.
Do not audit attempts to receive inetd_child_server packets.
Domain allowed access.
Send and receive inetd_child_server packets.
Domain allowed access.
Do not audit attempts to send and receive inetd_child_server packets.
Domain to not audit.
Relabel packets to inetd_child_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the innd port.
Domain allowed access.
Send UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the innd port.
Domain to not audit.
Receive UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the innd port.
Domain to not audit.
Send and receive UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the innd port.
Domain to not audit.
Bind TCP sockets to the innd port.
Domain allowed access.
Bind UDP sockets to the innd port.
Domain allowed access.
Make a TCP connection to the innd port.
Domain allowed access.
Send innd_client packets.
Domain allowed access.
Do not audit attempts to send innd_client packets.
Domain to not audit.
Receive innd_client packets.
Domain allowed access.
Do not audit attempts to receive innd_client packets.
Domain allowed access.
Send and receive innd_client packets.
Domain allowed access.
Do not audit attempts to send and receive innd_client packets.
Domain to not audit.
Relabel packets to innd_client the packet type.
Domain allowed access.
Send innd_server packets.
Domain allowed access.
Do not audit attempts to send innd_server packets.
Domain to not audit.
Receive innd_server packets.
Domain allowed access.
Do not audit attempts to receive innd_server packets.
Domain allowed access.
Send and receive innd_server packets.
Domain allowed access.
Do not audit attempts to send and receive innd_server packets.
Domain to not audit.
Relabel packets to innd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ionixnetmon port.
Domain allowed access.
Send UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ionixnetmon port.
Domain to not audit.
Receive UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
Domain to not audit.
Send and receive UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
Domain to not audit.
Bind TCP sockets to the ionixnetmon port.
Domain allowed access.
Bind UDP sockets to the ionixnetmon port.
Domain allowed access.
Make a TCP connection to the ionixnetmon port.
Domain allowed access.
Send ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to send ionixnetmon_client packets.
Domain to not audit.
Receive ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to receive ionixnetmon_client packets.
Domain allowed access.
Send and receive ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to send and receive ionixnetmon_client packets.
Domain to not audit.
Relabel packets to ionixnetmon_client the packet type.
Domain allowed access.
Send ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to send ionixnetmon_server packets.
Domain to not audit.
Receive ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to receive ionixnetmon_server packets.
Domain allowed access.
Send and receive ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to send and receive ionixnetmon_server packets.
Domain to not audit.
Relabel packets to ionixnetmon_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipmi port.
Domain allowed access.
Send UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipmi port.
Domain to not audit.
Receive UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipmi port.
Domain to not audit.
Send and receive UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
Domain to not audit.
Bind TCP sockets to the ipmi port.
Domain allowed access.
Bind UDP sockets to the ipmi port.
Domain allowed access.
Make a TCP connection to the ipmi port.
Domain allowed access.
Send ipmi_client packets.
Domain allowed access.
Do not audit attempts to send ipmi_client packets.
Domain to not audit.
Receive ipmi_client packets.
Domain allowed access.
Do not audit attempts to receive ipmi_client packets.
Domain allowed access.
Send and receive ipmi_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipmi_client packets.
Domain to not audit.
Relabel packets to ipmi_client the packet type.
Domain allowed access.
Send ipmi_server packets.
Domain allowed access.
Do not audit attempts to send ipmi_server packets.
Domain to not audit.
Receive ipmi_server packets.
Domain allowed access.
Do not audit attempts to receive ipmi_server packets.
Domain allowed access.
Send and receive ipmi_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipmi_server packets.
Domain to not audit.
Relabel packets to ipmi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipp port.
Domain allowed access.
Send UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipp port.
Domain to not audit.
Receive UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipp port.
Domain to not audit.
Send and receive UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipp port.
Domain to not audit.
Bind TCP sockets to the ipp port.
Domain allowed access.
Bind UDP sockets to the ipp port.
Domain allowed access.
Make a TCP connection to the ipp port.
Domain allowed access.
Send ipp_client packets.
Domain allowed access.
Do not audit attempts to send ipp_client packets.
Domain to not audit.
Receive ipp_client packets.
Domain allowed access.
Do not audit attempts to receive ipp_client packets.
Domain allowed access.
Send and receive ipp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipp_client packets.
Domain to not audit.
Relabel packets to ipp_client the packet type.
Domain allowed access.
Send ipp_server packets.
Domain allowed access.
Do not audit attempts to send ipp_server packets.
Domain to not audit.
Receive ipp_server packets.
Domain allowed access.
Do not audit attempts to receive ipp_server packets.
Domain allowed access.
Send and receive ipp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipp_server packets.
Domain to not audit.
Relabel packets to ipp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipsecnat port.
Domain allowed access.
Send UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipsecnat port.
Domain to not audit.
Receive UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipsecnat port.
Domain to not audit.
Send and receive UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
Domain to not audit.
Bind TCP sockets to the ipsecnat port.
Domain allowed access.
Bind UDP sockets to the ipsecnat port.
Domain allowed access.
Make a TCP connection to the ipsecnat port.
Domain allowed access.
Send ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to send ipsecnat_client packets.
Domain to not audit.
Receive ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to receive ipsecnat_client packets.
Domain allowed access.
Send and receive ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipsecnat_client packets.
Domain to not audit.
Relabel packets to ipsecnat_client the packet type.
Domain allowed access.
Send ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to send ipsecnat_server packets.
Domain to not audit.
Receive ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to receive ipsecnat_server packets.
Domain allowed access.
Send and receive ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipsecnat_server packets.
Domain to not audit.
Relabel packets to ipsecnat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ircd port.
Domain allowed access.
Send UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ircd port.
Domain to not audit.
Receive UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ircd port.
Domain to not audit.
Send and receive UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ircd port.
Domain to not audit.
Bind TCP sockets to the ircd port.
Domain allowed access.
Bind UDP sockets to the ircd port.
Domain allowed access.
Make a TCP connection to the ircd port.
Domain allowed access.
Send ircd_client packets.
Domain allowed access.
Do not audit attempts to send ircd_client packets.
Domain to not audit.
Receive ircd_client packets.
Domain allowed access.
Do not audit attempts to receive ircd_client packets.
Domain allowed access.
Send and receive ircd_client packets.
Domain allowed access.
Do not audit attempts to send and receive ircd_client packets.
Domain to not audit.
Relabel packets to ircd_client the packet type.
Domain allowed access.
Send ircd_server packets.
Domain allowed access.
Do not audit attempts to send ircd_server packets.
Domain to not audit.
Receive ircd_server packets.
Domain allowed access.
Do not audit attempts to receive ircd_server packets.
Domain allowed access.
Send and receive ircd_server packets.
Domain allowed access.
Do not audit attempts to send and receive ircd_server packets.
Domain to not audit.
Relabel packets to ircd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the isakmp port.
Domain allowed access.
Send UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the isakmp port.
Domain to not audit.
Receive UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the isakmp port.
Domain to not audit.
Send and receive UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
Domain to not audit.
Bind TCP sockets to the isakmp port.
Domain allowed access.
Bind UDP sockets to the isakmp port.
Domain allowed access.
Make a TCP connection to the isakmp port.
Domain allowed access.
Send isakmp_client packets.
Domain allowed access.
Do not audit attempts to send isakmp_client packets.
Domain to not audit.
Receive isakmp_client packets.
Domain allowed access.
Do not audit attempts to receive isakmp_client packets.
Domain allowed access.
Send and receive isakmp_client packets.
Domain allowed access.
Do not audit attempts to send and receive isakmp_client packets.
Domain to not audit.
Relabel packets to isakmp_client the packet type.
Domain allowed access.
Send isakmp_server packets.
Domain allowed access.
Do not audit attempts to send isakmp_server packets.
Domain to not audit.
Receive isakmp_server packets.
Domain allowed access.
Do not audit attempts to receive isakmp_server packets.
Domain allowed access.
Send and receive isakmp_server packets.
Domain allowed access.
Do not audit attempts to send and receive isakmp_server packets.
Domain to not audit.
Relabel packets to isakmp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the iscsi port.
Domain allowed access.
Send UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the iscsi port.
Domain to not audit.
Receive UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the iscsi port.
Domain to not audit.
Send and receive UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
Domain to not audit.
Bind TCP sockets to the iscsi port.
Domain allowed access.
Bind UDP sockets to the iscsi port.
Domain allowed access.
Make a TCP connection to the iscsi port.
Domain allowed access.
Send iscsi_client packets.
Domain allowed access.
Do not audit attempts to send iscsi_client packets.
Domain to not audit.
Receive iscsi_client packets.
Domain allowed access.
Do not audit attempts to receive iscsi_client packets.
Domain allowed access.
Send and receive iscsi_client packets.
Domain allowed access.
Do not audit attempts to send and receive iscsi_client packets.
Domain to not audit.
Relabel packets to iscsi_client the packet type.
Domain allowed access.
Send iscsi_server packets.
Domain allowed access.
Do not audit attempts to send iscsi_server packets.
Domain to not audit.
Receive iscsi_server packets.
Domain allowed access.
Do not audit attempts to receive iscsi_server packets.
Domain allowed access.
Send and receive iscsi_server packets.
Domain allowed access.
Do not audit attempts to send and receive iscsi_server packets.
Domain to not audit.
Relabel packets to iscsi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the isns port.
Domain allowed access.
Send UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the isns port.
Domain to not audit.
Receive UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the isns port.
Domain to not audit.
Send and receive UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the isns port.
Domain to not audit.
Bind TCP sockets to the isns port.
Domain allowed access.
Bind UDP sockets to the isns port.
Domain allowed access.
Make a TCP connection to the isns port.
Domain allowed access.
Send isns_client packets.
Domain allowed access.
Do not audit attempts to send isns_client packets.
Domain to not audit.
Receive isns_client packets.
Domain allowed access.
Do not audit attempts to receive isns_client packets.
Domain allowed access.
Send and receive isns_client packets.
Domain allowed access.
Do not audit attempts to send and receive isns_client packets.
Domain to not audit.
Relabel packets to isns_client the packet type.
Domain allowed access.
Send isns_server packets.
Domain allowed access.
Do not audit attempts to send isns_server packets.
Domain to not audit.
Receive isns_server packets.
Domain allowed access.
Do not audit attempts to receive isns_server packets.
Domain allowed access.
Send and receive isns_server packets.
Domain allowed access.
Do not audit attempts to send and receive isns_server packets.
Domain to not audit.
Relabel packets to isns_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_client port.
Domain allowed access.
Send UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_client port.
Domain to not audit.
Receive UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_client port.
Domain to not audit.
Send and receive UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
Domain to not audit.
Bind TCP sockets to the jabber_client port.
Domain allowed access.
Bind UDP sockets to the jabber_client port.
Domain allowed access.
Make a TCP connection to the jabber_client port.
Domain allowed access.
Send jabber_client_client packets.
Domain allowed access.
Do not audit attempts to send jabber_client_client packets.
Domain to not audit.
Receive jabber_client_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_client_client packets.
Domain allowed access.
Send and receive jabber_client_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_client_client packets.
Domain to not audit.
Relabel packets to jabber_client_client the packet type.
Domain allowed access.
Send jabber_client_server packets.
Domain allowed access.
Do not audit attempts to send jabber_client_server packets.
Domain to not audit.
Receive jabber_client_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_client_server packets.
Domain allowed access.
Send and receive jabber_client_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_client_server packets.
Domain to not audit.
Relabel packets to jabber_client_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_interserver port.
Domain allowed access.
Send UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_interserver port.
Domain to not audit.
Receive UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
Domain to not audit.
Send and receive UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
Domain to not audit.
Bind TCP sockets to the jabber_interserver port.
Domain allowed access.
Bind UDP sockets to the jabber_interserver port.
Domain allowed access.
Make a TCP connection to the jabber_interserver port.
Domain allowed access.
Send jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to send jabber_interserver_client packets.
Domain to not audit.
Receive jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_interserver_client packets.
Domain allowed access.
Send and receive jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_interserver_client packets.
Domain to not audit.
Relabel packets to jabber_interserver_client the packet type.
Domain allowed access.
Send jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to send jabber_interserver_server packets.
Domain to not audit.
Receive jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_interserver_server packets.
Domain allowed access.
Send and receive jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_interserver_server packets.
Domain to not audit.
Relabel packets to jabber_interserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_router port.
Domain allowed access.
Send UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_router port.
Domain to not audit.
Receive UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_router port.
Domain to not audit.
Send and receive UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_router port.
Domain to not audit.
Bind TCP sockets to the jabber_router port.
Domain allowed access.
Bind UDP sockets to the jabber_router port.
Domain allowed access.
Make a TCP connection to the jabber_router port.
Domain allowed access.
Send jabber_router_client packets.
Domain allowed access.
Do not audit attempts to send jabber_router_client packets.
Domain to not audit.
Receive jabber_router_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_router_client packets.
Domain allowed access.
Send and receive jabber_router_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_router_client packets.
Domain to not audit.
Relabel packets to jabber_router_client the packet type.
Domain allowed access.
Send jabber_router_server packets.
Domain allowed access.
Do not audit attempts to send jabber_router_server packets.
Domain to not audit.
Receive jabber_router_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_router_server packets.
Domain allowed access.
Send and receive jabber_router_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_router_server packets.
Domain to not audit.
Relabel packets to jabber_router_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jacorb port.
Domain allowed access.
Send UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jacorb port.
Domain to not audit.
Receive UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jacorb port.
Domain to not audit.
Send and receive UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jacorb port.
Domain to not audit.
Bind TCP sockets to the jacorb port.
Domain allowed access.
Bind UDP sockets to the jacorb port.
Domain allowed access.
Make a TCP connection to the jacorb port.
Domain allowed access.
Send jacorb_client packets.
Domain allowed access.
Do not audit attempts to send jacorb_client packets.
Domain to not audit.
Receive jacorb_client packets.
Domain allowed access.
Do not audit attempts to receive jacorb_client packets.
Domain allowed access.
Send and receive jacorb_client packets.
Domain allowed access.
Do not audit attempts to send and receive jacorb_client packets.
Domain to not audit.
Relabel packets to jacorb_client the packet type.
Domain allowed access.
Send jacorb_server packets.
Domain allowed access.
Do not audit attempts to send jacorb_server packets.
Domain to not audit.
Receive jacorb_server packets.
Domain allowed access.
Do not audit attempts to receive jacorb_server packets.
Domain allowed access.
Send and receive jacorb_server packets.
Domain allowed access.
Do not audit attempts to send and receive jacorb_server packets.
Domain to not audit.
Relabel packets to jacorb_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_debug port.
Domain allowed access.
Send UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_debug port.
Domain to not audit.
Receive UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_debug port.
Domain to not audit.
Send and receive UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_debug port.
Domain to not audit.
Bind TCP sockets to the jboss_debug port.
Domain allowed access.
Bind UDP sockets to the jboss_debug port.
Domain allowed access.
Make a TCP connection to the jboss_debug port.
Domain allowed access.
Send jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to send jboss_debug_client packets.
Domain to not audit.
Receive jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_debug_client packets.
Domain allowed access.
Send and receive jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_debug_client packets.
Domain to not audit.
Relabel packets to jboss_debug_client the packet type.
Domain allowed access.
Send jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to send jboss_debug_server packets.
Domain to not audit.
Receive jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_debug_server packets.
Domain allowed access.
Send and receive jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_debug_server packets.
Domain to not audit.
Relabel packets to jboss_debug_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_messaging port.
Domain allowed access.
Send UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_messaging port.
Domain to not audit.
Receive UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_messaging port.
Domain to not audit.
Send and receive UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_messaging port.
Domain to not audit.
Bind TCP sockets to the jboss_messaging port.
Domain allowed access.
Bind UDP sockets to the jboss_messaging port.
Domain allowed access.
Make a TCP connection to the jboss_messaging port.
Domain allowed access.
Send jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to send jboss_messaging_client packets.
Domain to not audit.
Receive jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_messaging_client packets.
Domain allowed access.
Send and receive jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_messaging_client packets.
Domain to not audit.
Relabel packets to jboss_messaging_client the packet type.
Domain allowed access.
Send jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to send jboss_messaging_server packets.
Domain to not audit.
Receive jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_messaging_server packets.
Domain allowed access.
Send and receive jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_messaging_server packets.
Domain to not audit.
Relabel packets to jboss_messaging_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_management port.
Domain allowed access.
Send UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_management port.
Domain to not audit.
Receive UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_management port.
Domain to not audit.
Send and receive UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_management port.
Domain to not audit.
Bind TCP sockets to the jboss_management port.
Domain allowed access.
Bind UDP sockets to the jboss_management port.
Domain allowed access.
Make a TCP connection to the jboss_management port.
Domain allowed access.
Send jboss_management_client packets.
Domain allowed access.
Do not audit attempts to send jboss_management_client packets.
Domain to not audit.
Receive jboss_management_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_management_client packets.
Domain allowed access.
Send and receive jboss_management_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_management_client packets.
Domain to not audit.
Relabel packets to jboss_management_client the packet type.
Domain allowed access.
Send jboss_management_server packets.
Domain allowed access.
Do not audit attempts to send jboss_management_server packets.
Domain to not audit.
Receive jboss_management_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_management_server packets.
Domain allowed access.
Send and receive jboss_management_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_management_server packets.
Domain to not audit.
Relabel packets to jboss_management_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos port.
Domain allowed access.
Send UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos port.
Domain to not audit.
Receive UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos port.
Domain to not audit.
Send and receive UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
Domain to not audit.
Bind TCP sockets to the kerberos port.
Domain allowed access.
Bind UDP sockets to the kerberos port.
Domain allowed access.
Make a TCP connection to the kerberos port.
Domain allowed access.
Send kerberos_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_client packets.
Domain to not audit.
Receive kerberos_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_client packets.
Domain allowed access.
Send and receive kerberos_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_client packets.
Domain to not audit.
Relabel packets to kerberos_client the packet type.
Domain allowed access.
Send kerberos_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_server packets.
Domain to not audit.
Receive kerberos_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_server packets.
Domain allowed access.
Send and receive kerberos_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_server packets.
Domain to not audit.
Relabel packets to kerberos_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_admin port.
Domain allowed access.
Send UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_admin port.
Domain to not audit.
Receive UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
Domain to not audit.
Bind TCP sockets to the kerberos_admin port.
Domain allowed access.
Bind UDP sockets to the kerberos_admin port.
Domain allowed access.
Make a TCP connection to the kerberos_admin port.
Domain allowed access.
Send kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_admin_client packets.
Domain to not audit.
Receive kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_admin_client packets.
Domain allowed access.
Send and receive kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_admin_client packets.
Domain to not audit.
Relabel packets to kerberos_admin_client the packet type.
Domain allowed access.
Send kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_admin_server packets.
Domain to not audit.
Receive kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_admin_server packets.
Domain allowed access.
Send and receive kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_admin_server packets.
Domain to not audit.
Relabel packets to kerberos_admin_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_master port.
Domain allowed access.
Send UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_master port.
Domain to not audit.
Receive UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_master port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_master port.
Domain to not audit.
Bind TCP sockets to the kerberos_master port.
Domain allowed access.
Bind UDP sockets to the kerberos_master port.
Domain allowed access.
Make a TCP connection to the kerberos_master port.
Domain allowed access.
Send kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_master_client packets.
Domain to not audit.
Receive kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_master_client packets.
Domain allowed access.
Send and receive kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_master_client packets.
Domain to not audit.
Relabel packets to kerberos_master_client the packet type.
Domain allowed access.
Send kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_master_server packets.
Domain to not audit.
Receive kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_master_server packets.
Domain allowed access.
Send and receive kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_master_server packets.
Domain to not audit.
Relabel packets to kerberos_master_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_password port.
Domain allowed access.
Send UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_password port.
Domain to not audit.
Receive UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_password port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_password port.
Domain to not audit.
Bind TCP sockets to the kerberos_password port.
Domain allowed access.
Bind UDP sockets to the kerberos_password port.
Domain allowed access.
Make a TCP connection to the kerberos_password port.
Domain allowed access.
Send kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_password_client packets.
Domain to not audit.
Receive kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_password_client packets.
Domain allowed access.
Send and receive kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_password_client packets.
Domain to not audit.
Relabel packets to kerberos_password_client the packet type.
Domain allowed access.
Send kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_password_server packets.
Domain to not audit.
Receive kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_password_server packets.
Domain allowed access.
Send and receive kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_password_server packets.
Domain to not audit.
Relabel packets to kerberos_password_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kismet port.
Domain allowed access.
Send UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kismet port.
Domain to not audit.
Receive UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kismet port.
Domain to not audit.
Send and receive UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kismet port.
Domain to not audit.
Bind TCP sockets to the kismet port.
Domain allowed access.
Bind UDP sockets to the kismet port.
Domain allowed access.
Make a TCP connection to the kismet port.
Domain allowed access.
Send kismet_client packets.
Domain allowed access.
Do not audit attempts to send kismet_client packets.
Domain to not audit.
Receive kismet_client packets.
Domain allowed access.
Do not audit attempts to receive kismet_client packets.
Domain allowed access.
Send and receive kismet_client packets.
Domain allowed access.
Do not audit attempts to send and receive kismet_client packets.
Domain to not audit.
Relabel packets to kismet_client the packet type.
Domain allowed access.
Send kismet_server packets.
Domain allowed access.
Do not audit attempts to send kismet_server packets.
Domain to not audit.
Receive kismet_server packets.
Domain allowed access.
Do not audit attempts to receive kismet_server packets.
Domain allowed access.
Send and receive kismet_server packets.
Domain allowed access.
Do not audit attempts to send and receive kismet_server packets.
Domain to not audit.
Relabel packets to kismet_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kprop port.
Domain allowed access.
Send UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kprop port.
Domain to not audit.
Receive UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kprop port.
Domain to not audit.
Send and receive UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kprop port.
Domain to not audit.
Bind TCP sockets to the kprop port.
Domain allowed access.
Bind UDP sockets to the kprop port.
Domain allowed access.
Make a TCP connection to the kprop port.
Domain allowed access.
Send kprop_client packets.
Domain allowed access.
Do not audit attempts to send kprop_client packets.
Domain to not audit.
Receive kprop_client packets.
Domain allowed access.
Do not audit attempts to receive kprop_client packets.
Domain allowed access.
Send and receive kprop_client packets.
Domain allowed access.
Do not audit attempts to send and receive kprop_client packets.
Domain to not audit.
Relabel packets to kprop_client the packet type.
Domain allowed access.
Send kprop_server packets.
Domain allowed access.
Do not audit attempts to send kprop_server packets.
Domain to not audit.
Receive kprop_server packets.
Domain allowed access.
Do not audit attempts to receive kprop_server packets.
Domain allowed access.
Send and receive kprop_server packets.
Domain allowed access.
Do not audit attempts to send and receive kprop_server packets.
Domain to not audit.
Relabel packets to kprop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ktalkd port.
Domain allowed access.
Send UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ktalkd port.
Domain to not audit.
Receive UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ktalkd port.
Domain to not audit.
Send and receive UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
Domain to not audit.
Bind TCP sockets to the ktalkd port.
Domain allowed access.
Bind UDP sockets to the ktalkd port.
Domain allowed access.
Make a TCP connection to the ktalkd port.
Domain allowed access.
Send ktalkd_client packets.
Domain allowed access.
Do not audit attempts to send ktalkd_client packets.
Domain to not audit.
Receive ktalkd_client packets.
Domain allowed access.
Do not audit attempts to receive ktalkd_client packets.
Domain allowed access.
Send and receive ktalkd_client packets.
Domain allowed access.
Do not audit attempts to send and receive ktalkd_client packets.
Domain to not audit.
Relabel packets to ktalkd_client the packet type.
Domain allowed access.
Send ktalkd_server packets.
Domain allowed access.
Do not audit attempts to send ktalkd_server packets.
Domain to not audit.
Receive ktalkd_server packets.
Domain allowed access.
Do not audit attempts to receive ktalkd_server packets.
Domain allowed access.
Send and receive ktalkd_server packets.
Domain allowed access.
Do not audit attempts to send and receive ktalkd_server packets.
Domain to not audit.
Relabel packets to ktalkd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ldap port.
Domain allowed access.
Send UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ldap port.
Domain to not audit.
Receive UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ldap port.
Domain to not audit.
Send and receive UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ldap port.
Domain to not audit.
Bind TCP sockets to the ldap port.
Domain allowed access.
Bind UDP sockets to the ldap port.
Domain allowed access.
Make a TCP connection to the ldap port.
Domain allowed access.
Send ldap_client packets.
Domain allowed access.
Do not audit attempts to send ldap_client packets.
Domain to not audit.
Receive ldap_client packets.
Domain allowed access.
Do not audit attempts to receive ldap_client packets.
Domain allowed access.
Send and receive ldap_client packets.
Domain allowed access.
Do not audit attempts to send and receive ldap_client packets.
Domain to not audit.
Relabel packets to ldap_client the packet type.
Domain allowed access.
Send ldap_server packets.
Domain allowed access.
Do not audit attempts to send ldap_server packets.
Domain to not audit.
Receive ldap_server packets.
Domain allowed access.
Do not audit attempts to receive ldap_server packets.
Domain allowed access.
Send and receive ldap_server packets.
Domain allowed access.
Do not audit attempts to send and receive ldap_server packets.
Domain to not audit.
Relabel packets to ldap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the lmtp port.
Domain allowed access.
Send UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the lmtp port.
Domain to not audit.
Receive UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the lmtp port.
Domain to not audit.
Send and receive UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
Domain to not audit.
Bind TCP sockets to the lmtp port.
Domain allowed access.
Bind UDP sockets to the lmtp port.
Domain allowed access.
Make a TCP connection to the lmtp port.
Domain allowed access.
Send lmtp_client packets.
Domain allowed access.
Do not audit attempts to send lmtp_client packets.
Domain to not audit.
Receive lmtp_client packets.
Domain allowed access.
Do not audit attempts to receive lmtp_client packets.
Domain allowed access.
Send and receive lmtp_client packets.
Domain allowed access.
Do not audit attempts to send and receive lmtp_client packets.
Domain to not audit.
Relabel packets to lmtp_client the packet type.
Domain allowed access.
Send lmtp_server packets.
Domain allowed access.
Do not audit attempts to send lmtp_server packets.
Domain to not audit.
Receive lmtp_server packets.
Domain allowed access.
Do not audit attempts to receive lmtp_server packets.
Domain allowed access.
Send and receive lmtp_server packets.
Domain allowed access.
Do not audit attempts to send and receive lmtp_server packets.
Domain to not audit.
Relabel packets to lmtp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the lirc port.
Domain allowed access.
Send UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the lirc port.
Domain to not audit.
Receive UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the lirc port.
Domain to not audit.
Send and receive UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the lirc port.
Domain to not audit.
Bind TCP sockets to the lirc port.
Domain allowed access.
Bind UDP sockets to the lirc port.
Domain allowed access.
Make a TCP connection to the lirc port.
Domain allowed access.
Send lirc_client packets.
Domain allowed access.
Do not audit attempts to send lirc_client packets.
Domain to not audit.
Receive lirc_client packets.
Domain allowed access.
Do not audit attempts to receive lirc_client packets.
Domain allowed access.
Send and receive lirc_client packets.
Domain allowed access.
Do not audit attempts to send and receive lirc_client packets.
Domain to not audit.
Relabel packets to lirc_client the packet type.
Domain allowed access.
Send lirc_server packets.
Domain allowed access.
Do not audit attempts to send lirc_server packets.
Domain to not audit.
Receive lirc_server packets.
Domain allowed access.
Do not audit attempts to receive lirc_server packets.
Domain allowed access.
Send and receive lirc_server packets.
Domain allowed access.
Do not audit attempts to send and receive lirc_server packets.
Domain to not audit.
Relabel packets to lirc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the luci port.
Domain allowed access.
Send UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the luci port.
Domain to not audit.
Receive UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the luci port.
Domain to not audit.
Send and receive UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the luci port.
Domain to not audit.
Bind TCP sockets to the luci port.
Domain allowed access.
Bind UDP sockets to the luci port.
Domain allowed access.
Make a TCP connection to the luci port.
Domain allowed access.
Send luci_client packets.
Domain allowed access.
Do not audit attempts to send luci_client packets.
Domain to not audit.
Receive luci_client packets.
Domain allowed access.
Do not audit attempts to receive luci_client packets.
Domain allowed access.
Send and receive luci_client packets.
Domain allowed access.
Do not audit attempts to send and receive luci_client packets.
Domain to not audit.
Relabel packets to luci_client the packet type.
Domain allowed access.
Send luci_server packets.
Domain allowed access.
Do not audit attempts to send luci_server packets.
Domain to not audit.
Receive luci_server packets.
Domain allowed access.
Do not audit attempts to receive luci_server packets.
Domain allowed access.
Send and receive luci_server packets.
Domain allowed access.
Do not audit attempts to send and receive luci_server packets.
Domain to not audit.
Relabel packets to luci_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the l2tp port.
Domain allowed access.
Send UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the l2tp port.
Domain to not audit.
Receive UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the l2tp port.
Domain to not audit.
Send and receive UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
Domain to not audit.
Bind TCP sockets to the l2tp port.
Domain allowed access.
Bind UDP sockets to the l2tp port.
Domain allowed access.
Make a TCP connection to the l2tp port.
Domain allowed access.
Send l2tp_client packets.
Domain allowed access.
Do not audit attempts to send l2tp_client packets.
Domain to not audit.
Receive l2tp_client packets.
Domain allowed access.
Do not audit attempts to receive l2tp_client packets.
Domain allowed access.
Send and receive l2tp_client packets.
Domain allowed access.
Do not audit attempts to send and receive l2tp_client packets.
Domain to not audit.
Relabel packets to l2tp_client the packet type.
Domain allowed access.
Send l2tp_server packets.
Domain allowed access.
Do not audit attempts to send l2tp_server packets.
Domain to not audit.
Receive l2tp_server packets.
Domain allowed access.
Do not audit attempts to receive l2tp_server packets.
Domain allowed access.
Send and receive l2tp_server packets.
Domain allowed access.
Do not audit attempts to send and receive l2tp_server packets.
Domain to not audit.
Relabel packets to l2tp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mail port.
Domain allowed access.
Send UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mail port.
Domain to not audit.
Receive UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mail port.
Domain to not audit.
Send and receive UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mail port.
Domain to not audit.
Bind TCP sockets to the mail port.
Domain allowed access.
Bind UDP sockets to the mail port.
Domain allowed access.
Make a TCP connection to the mail port.
Domain allowed access.
Send mail_client packets.
Domain allowed access.
Do not audit attempts to send mail_client packets.
Domain to not audit.
Receive mail_client packets.
Domain allowed access.
Do not audit attempts to receive mail_client packets.
Domain allowed access.
Send and receive mail_client packets.
Domain allowed access.
Do not audit attempts to send and receive mail_client packets.
Domain to not audit.
Relabel packets to mail_client the packet type.
Domain allowed access.
Send mail_server packets.
Domain allowed access.
Do not audit attempts to send mail_server packets.
Domain to not audit.
Receive mail_server packets.
Domain allowed access.
Do not audit attempts to receive mail_server packets.
Domain allowed access.
Send and receive mail_server packets.
Domain allowed access.
Do not audit attempts to send and receive mail_server packets.
Domain to not audit.
Relabel packets to mail_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the matahari port.
Domain allowed access.
Send UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the matahari port.
Domain to not audit.
Receive UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the matahari port.
Domain to not audit.
Send and receive UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the matahari port.
Domain to not audit.
Bind TCP sockets to the matahari port.
Domain allowed access.
Bind UDP sockets to the matahari port.
Domain allowed access.
Make a TCP connection to the matahari port.
Domain allowed access.
Send matahari_client packets.
Domain allowed access.
Do not audit attempts to send matahari_client packets.
Domain to not audit.
Receive matahari_client packets.
Domain allowed access.
Do not audit attempts to receive matahari_client packets.
Domain allowed access.
Send and receive matahari_client packets.
Domain allowed access.
Do not audit attempts to send and receive matahari_client packets.
Domain to not audit.
Relabel packets to matahari_client the packet type.
Domain allowed access.
Send matahari_server packets.
Domain allowed access.
Do not audit attempts to send matahari_server packets.
Domain to not audit.
Receive matahari_server packets.
Domain allowed access.
Do not audit attempts to receive matahari_server packets.
Domain allowed access.
Send and receive matahari_server packets.
Domain allowed access.
Do not audit attempts to send and receive matahari_server packets.
Domain to not audit.
Relabel packets to matahari_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the memcache port.
Domain allowed access.
Send UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the memcache port.
Domain to not audit.
Receive UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the memcache port.
Domain to not audit.
Send and receive UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the memcache port.
Domain to not audit.
Bind TCP sockets to the memcache port.
Domain allowed access.
Bind UDP sockets to the memcache port.
Domain allowed access.
Make a TCP connection to the memcache port.
Domain allowed access.
Send memcache_client packets.
Domain allowed access.
Do not audit attempts to send memcache_client packets.
Domain to not audit.
Receive memcache_client packets.
Domain allowed access.
Do not audit attempts to receive memcache_client packets.
Domain allowed access.
Send and receive memcache_client packets.
Domain allowed access.
Do not audit attempts to send and receive memcache_client packets.
Domain to not audit.
Relabel packets to memcache_client the packet type.
Domain allowed access.
Send memcache_server packets.
Domain allowed access.
Do not audit attempts to send memcache_server packets.
Domain to not audit.
Receive memcache_server packets.
Domain allowed access.
Do not audit attempts to receive memcache_server packets.
Domain allowed access.
Send and receive memcache_server packets.
Domain allowed access.
Do not audit attempts to send and receive memcache_server packets.
Domain to not audit.
Relabel packets to memcache_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the milter port.
Domain allowed access.
Send UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the milter port.
Domain to not audit.
Receive UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the milter port.
Domain to not audit.
Send and receive UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the milter port.
Domain to not audit.
Bind TCP sockets to the milter port.
Domain allowed access.
Bind UDP sockets to the milter port.
Domain allowed access.
Make a TCP connection to the milter port.
Domain allowed access.
Send milter_client packets.
Domain allowed access.
Do not audit attempts to send milter_client packets.
Domain to not audit.
Receive milter_client packets.
Domain allowed access.
Do not audit attempts to receive milter_client packets.
Domain allowed access.
Send and receive milter_client packets.
Domain allowed access.
Do not audit attempts to send and receive milter_client packets.
Domain to not audit.
Relabel packets to milter_client the packet type.
Domain allowed access.
Send milter_server packets.
Domain allowed access.
Do not audit attempts to send milter_server packets.
Domain to not audit.
Receive milter_server packets.
Domain allowed access.
Do not audit attempts to receive milter_server packets.
Domain allowed access.
Send and receive milter_server packets.
Domain allowed access.
Do not audit attempts to send and receive milter_server packets.
Domain to not audit.
Relabel packets to milter_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mmcc port.
Domain allowed access.
Send UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mmcc port.
Domain to not audit.
Receive UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mmcc port.
Domain to not audit.
Send and receive UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
Domain to not audit.
Bind TCP sockets to the mmcc port.
Domain allowed access.
Bind UDP sockets to the mmcc port.
Domain allowed access.
Make a TCP connection to the mmcc port.
Domain allowed access.
Send mmcc_client packets.
Domain allowed access.
Do not audit attempts to send mmcc_client packets.
Domain to not audit.
Receive mmcc_client packets.
Domain allowed access.
Do not audit attempts to receive mmcc_client packets.
Domain allowed access.
Send and receive mmcc_client packets.
Domain allowed access.
Do not audit attempts to send and receive mmcc_client packets.
Domain to not audit.
Relabel packets to mmcc_client the packet type.
Domain allowed access.
Send mmcc_server packets.
Domain allowed access.
Do not audit attempts to send mmcc_server packets.
Domain to not audit.
Receive mmcc_server packets.
Domain allowed access.
Do not audit attempts to receive mmcc_server packets.
Domain allowed access.
Send and receive mmcc_server packets.
Domain allowed access.
Do not audit attempts to send and receive mmcc_server packets.
Domain to not audit.
Relabel packets to mmcc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mongod port.
Domain allowed access.
Send UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mongod port.
Domain to not audit.
Receive UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mongod port.
Domain to not audit.
Send and receive UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mongod port.
Domain to not audit.
Bind TCP sockets to the mongod port.
Domain allowed access.
Bind UDP sockets to the mongod port.
Domain allowed access.
Make a TCP connection to the mongod port.
Domain allowed access.
Send mongod_client packets.
Domain allowed access.
Do not audit attempts to send mongod_client packets.
Domain to not audit.
Receive mongod_client packets.
Domain allowed access.
Do not audit attempts to receive mongod_client packets.
Domain allowed access.
Send and receive mongod_client packets.
Domain allowed access.
Do not audit attempts to send and receive mongod_client packets.
Domain to not audit.
Relabel packets to mongod_client the packet type.
Domain allowed access.
Send mongod_server packets.
Domain allowed access.
Do not audit attempts to send mongod_server packets.
Domain to not audit.
Receive mongod_server packets.
Domain allowed access.
Do not audit attempts to receive mongod_server packets.
Domain allowed access.
Send and receive mongod_server packets.
Domain allowed access.
Do not audit attempts to send and receive mongod_server packets.
Domain to not audit.
Relabel packets to mongod_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the monopd port.
Domain allowed access.
Send UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the monopd port.
Domain to not audit.
Receive UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the monopd port.
Domain to not audit.
Send and receive UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the monopd port.
Domain to not audit.
Bind TCP sockets to the monopd port.
Domain allowed access.
Bind UDP sockets to the monopd port.
Domain allowed access.
Make a TCP connection to the monopd port.
Domain allowed access.
Send monopd_client packets.
Domain allowed access.
Do not audit attempts to send monopd_client packets.
Domain to not audit.
Receive monopd_client packets.
Domain allowed access.
Do not audit attempts to receive monopd_client packets.
Domain allowed access.
Send and receive monopd_client packets.
Domain allowed access.
Do not audit attempts to send and receive monopd_client packets.
Domain to not audit.
Relabel packets to monopd_client the packet type.
Domain allowed access.
Send monopd_server packets.
Domain allowed access.
Do not audit attempts to send monopd_server packets.
Domain to not audit.
Receive monopd_server packets.
Domain allowed access.
Do not audit attempts to receive monopd_server packets.
Domain allowed access.
Send and receive monopd_server packets.
Domain allowed access.
Do not audit attempts to send and receive monopd_server packets.
Domain to not audit.
Relabel packets to monopd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mpd port.
Domain allowed access.
Send UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mpd port.
Domain to not audit.
Receive UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mpd port.
Domain to not audit.
Send and receive UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mpd port.
Domain to not audit.
Bind TCP sockets to the mpd port.
Domain allowed access.
Bind UDP sockets to the mpd port.
Domain allowed access.
Make a TCP connection to the mpd port.
Domain allowed access.
Send mpd_client packets.
Domain allowed access.
Do not audit attempts to send mpd_client packets.
Domain to not audit.
Receive mpd_client packets.
Domain allowed access.
Do not audit attempts to receive mpd_client packets.
Domain allowed access.
Send and receive mpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mpd_client packets.
Domain to not audit.
Relabel packets to mpd_client the packet type.
Domain allowed access.
Send mpd_server packets.
Domain allowed access.
Do not audit attempts to send mpd_server packets.
Domain to not audit.
Receive mpd_server packets.
Domain allowed access.
Do not audit attempts to receive mpd_server packets.
Domain allowed access.
Send and receive mpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mpd_server packets.
Domain to not audit.
Relabel packets to mpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the msnp port.
Domain allowed access.
Send UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the msnp port.
Domain to not audit.
Receive UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the msnp port.
Domain to not audit.
Send and receive UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the msnp port.
Domain to not audit.
Bind TCP sockets to the msnp port.
Domain allowed access.
Bind UDP sockets to the msnp port.
Domain allowed access.
Make a TCP connection to the msnp port.
Domain allowed access.
Send msnp_client packets.
Domain allowed access.
Do not audit attempts to send msnp_client packets.
Domain to not audit.
Receive msnp_client packets.
Domain allowed access.
Do not audit attempts to receive msnp_client packets.
Domain allowed access.
Send and receive msnp_client packets.
Domain allowed access.
Do not audit attempts to send and receive msnp_client packets.
Domain to not audit.
Relabel packets to msnp_client the packet type.
Domain allowed access.
Send msnp_server packets.
Domain allowed access.
Do not audit attempts to send msnp_server packets.
Domain to not audit.
Receive msnp_server packets.
Domain allowed access.
Do not audit attempts to receive msnp_server packets.
Domain allowed access.
Send and receive msnp_server packets.
Domain allowed access.
Do not audit attempts to send and receive msnp_server packets.
Domain to not audit.
Relabel packets to msnp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mssql port.
Domain allowed access.
Send UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mssql port.
Domain to not audit.
Receive UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mssql port.
Domain to not audit.
Send and receive UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mssql port.
Domain to not audit.
Bind TCP sockets to the mssql port.
Domain allowed access.
Bind UDP sockets to the mssql port.
Domain allowed access.
Make a TCP connection to the mssql port.
Domain allowed access.
Send mssql_client packets.
Domain allowed access.
Do not audit attempts to send mssql_client packets.
Domain to not audit.
Receive mssql_client packets.
Domain allowed access.
Do not audit attempts to receive mssql_client packets.
Domain allowed access.
Send and receive mssql_client packets.
Domain allowed access.
Do not audit attempts to send and receive mssql_client packets.
Domain to not audit.
Relabel packets to mssql_client the packet type.
Domain allowed access.
Send mssql_server packets.
Domain allowed access.
Do not audit attempts to send mssql_server packets.
Domain to not audit.
Receive mssql_server packets.
Domain allowed access.
Do not audit attempts to receive mssql_server packets.
Domain allowed access.
Send and receive mssql_server packets.
Domain allowed access.
Do not audit attempts to send and receive mssql_server packets.
Domain to not audit.
Relabel packets to mssql_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the munin port.
Domain allowed access.
Send UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the munin port.
Domain to not audit.
Receive UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the munin port.
Domain to not audit.
Send and receive UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the munin port.
Domain to not audit.
Bind TCP sockets to the munin port.
Domain allowed access.
Bind UDP sockets to the munin port.
Domain allowed access.
Make a TCP connection to the munin port.
Domain allowed access.
Send munin_client packets.
Domain allowed access.
Do not audit attempts to send munin_client packets.
Domain to not audit.
Receive munin_client packets.
Domain allowed access.
Do not audit attempts to receive munin_client packets.
Domain allowed access.
Send and receive munin_client packets.
Domain allowed access.
Do not audit attempts to send and receive munin_client packets.
Domain to not audit.
Relabel packets to munin_client the packet type.
Domain allowed access.
Send munin_server packets.
Domain allowed access.
Do not audit attempts to send munin_server packets.
Domain to not audit.
Receive munin_server packets.
Domain allowed access.
Do not audit attempts to receive munin_server packets.
Domain allowed access.
Send and receive munin_server packets.
Domain allowed access.
Do not audit attempts to send and receive munin_server packets.
Domain to not audit.
Relabel packets to munin_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mysqld port.
Domain allowed access.
Send UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mysqld port.
Domain to not audit.
Receive UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mysqld port.
Domain to not audit.
Send and receive UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
Domain to not audit.
Bind TCP sockets to the mysqld port.
Domain allowed access.
Bind UDP sockets to the mysqld port.
Domain allowed access.
Make a TCP connection to the mysqld port.
Domain allowed access.
Send mysqld_client packets.
Domain allowed access.
Do not audit attempts to send mysqld_client packets.
Domain to not audit.
Receive mysqld_client packets.
Domain allowed access.
Do not audit attempts to receive mysqld_client packets.
Domain allowed access.
Send and receive mysqld_client packets.
Domain allowed access.
Do not audit attempts to send and receive mysqld_client packets.
Domain to not audit.
Relabel packets to mysqld_client the packet type.
Domain allowed access.
Send mysqld_server packets.
Domain allowed access.
Do not audit attempts to send mysqld_server packets.
Domain to not audit.
Receive mysqld_server packets.
Domain allowed access.
Do not audit attempts to receive mysqld_server packets.
Domain allowed access.
Send and receive mysqld_server packets.
Domain allowed access.
Do not audit attempts to send and receive mysqld_server packets.
Domain to not audit.
Relabel packets to mysqld_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mysqlmanagerd port.
Domain allowed access.
Send UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Receive UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Send and receive UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Bind TCP sockets to the mysqlmanagerd port.
Domain allowed access.
Bind UDP sockets to the mysqlmanagerd port.
Domain allowed access.
Make a TCP connection to the mysqlmanagerd port.
Domain allowed access.
Send mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to send mysqlmanagerd_client packets.
Domain to not audit.
Receive mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to receive mysqlmanagerd_client packets.
Domain allowed access.
Send and receive mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mysqlmanagerd_client packets.
Domain to not audit.
Relabel packets to mysqlmanagerd_client the packet type.
Domain allowed access.
Send mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to send mysqlmanagerd_server packets.
Domain to not audit.
Receive mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to receive mysqlmanagerd_server packets.
Domain allowed access.
Send and receive mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mysqlmanagerd_server packets.
Domain to not audit.
Relabel packets to mysqlmanagerd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the movaz_ssc port.
Domain allowed access.
Send UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the movaz_ssc port.
Domain to not audit.
Receive UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
Domain to not audit.
Send and receive UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
Domain to not audit.
Bind TCP sockets to the movaz_ssc port.
Domain allowed access.
Bind UDP sockets to the movaz_ssc port.
Domain allowed access.
Make a TCP connection to the movaz_ssc port.
Domain allowed access.
Send movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to send movaz_ssc_client packets.
Domain to not audit.
Receive movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to receive movaz_ssc_client packets.
Domain allowed access.
Send and receive movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to send and receive movaz_ssc_client packets.
Domain to not audit.
Relabel packets to movaz_ssc_client the packet type.
Domain allowed access.
Send movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to send movaz_ssc_server packets.
Domain to not audit.
Receive movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to receive movaz_ssc_server packets.
Domain allowed access.
Send and receive movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to send and receive movaz_ssc_server packets.
Domain to not audit.
Relabel packets to movaz_ssc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mountd port.
Domain allowed access.
Send UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mountd port.
Domain to not audit.
Receive UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mountd port.
Domain to not audit.
Send and receive UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mountd port.
Domain to not audit.
Bind TCP sockets to the mountd port.
Domain allowed access.
Bind UDP sockets to the mountd port.
Domain allowed access.
Make a TCP connection to the mountd port.
Domain allowed access.
Send mountd_client packets.
Domain allowed access.
Do not audit attempts to send mountd_client packets.
Domain to not audit.
Receive mountd_client packets.
Domain allowed access.
Do not audit attempts to receive mountd_client packets.
Domain allowed access.
Send and receive mountd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mountd_client packets.
Domain to not audit.
Relabel packets to mountd_client the packet type.
Domain allowed access.
Send mountd_server packets.
Domain allowed access.
Do not audit attempts to send mountd_server packets.
Domain to not audit.
Receive mountd_server packets.
Domain allowed access.
Do not audit attempts to receive mountd_server packets.
Domain allowed access.
Send and receive mountd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mountd_server packets.
Domain to not audit.
Relabel packets to mountd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nessus port.
Domain allowed access.
Send UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nessus port.
Domain to not audit.
Receive UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nessus port.
Domain to not audit.
Send and receive UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nessus port.
Domain to not audit.
Bind TCP sockets to the nessus port.
Domain allowed access.
Bind UDP sockets to the nessus port.
Domain allowed access.
Make a TCP connection to the nessus port.
Domain allowed access.
Send nessus_client packets.
Domain allowed access.
Do not audit attempts to send nessus_client packets.
Domain to not audit.
Receive nessus_client packets.
Domain allowed access.
Do not audit attempts to receive nessus_client packets.
Domain allowed access.
Send and receive nessus_client packets.
Domain allowed access.
Do not audit attempts to send and receive nessus_client packets.
Domain to not audit.
Relabel packets to nessus_client the packet type.
Domain allowed access.
Send nessus_server packets.
Domain allowed access.
Do not audit attempts to send nessus_server packets.
Domain to not audit.
Receive nessus_server packets.
Domain allowed access.
Do not audit attempts to receive nessus_server packets.
Domain allowed access.
Send and receive nessus_server packets.
Domain allowed access.
Do not audit attempts to send and receive nessus_server packets.
Domain to not audit.
Relabel packets to nessus_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the netport port.
Domain allowed access.
Send UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the netport port.
Domain to not audit.
Receive UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the netport port.
Domain to not audit.
Send and receive UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the netport port.
Domain to not audit.
Bind TCP sockets to the netport port.
Domain allowed access.
Bind UDP sockets to the netport port.
Domain allowed access.
Make a TCP connection to the netport port.
Domain allowed access.
Send netport_client packets.
Domain allowed access.
Do not audit attempts to send netport_client packets.
Domain to not audit.
Receive netport_client packets.
Domain allowed access.
Do not audit attempts to receive netport_client packets.
Domain allowed access.
Send and receive netport_client packets.
Domain allowed access.
Do not audit attempts to send and receive netport_client packets.
Domain to not audit.
Relabel packets to netport_client the packet type.
Domain allowed access.
Send netport_server packets.
Domain allowed access.
Do not audit attempts to send netport_server packets.
Domain to not audit.
Receive netport_server packets.
Domain allowed access.
Do not audit attempts to receive netport_server packets.
Domain allowed access.
Send and receive netport_server packets.
Domain allowed access.
Do not audit attempts to send and receive netport_server packets.
Domain to not audit.
Relabel packets to netport_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the netsupport port.
Domain allowed access.
Send UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the netsupport port.
Domain to not audit.
Receive UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the netsupport port.
Domain to not audit.
Send and receive UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
Domain to not audit.
Bind TCP sockets to the netsupport port.
Domain allowed access.
Bind UDP sockets to the netsupport port.
Domain allowed access.
Make a TCP connection to the netsupport port.
Domain allowed access.
Send netsupport_client packets.
Domain allowed access.
Do not audit attempts to send netsupport_client packets.
Domain to not audit.
Receive netsupport_client packets.
Domain allowed access.
Do not audit attempts to receive netsupport_client packets.
Domain allowed access.
Send and receive netsupport_client packets.
Domain allowed access.
Do not audit attempts to send and receive netsupport_client packets.
Domain to not audit.
Relabel packets to netsupport_client the packet type.
Domain allowed access.
Send netsupport_server packets.
Domain allowed access.
Do not audit attempts to send netsupport_server packets.
Domain to not audit.
Receive netsupport_server packets.
Domain allowed access.
Do not audit attempts to receive netsupport_server packets.
Domain allowed access.
Send and receive netsupport_server packets.
Domain allowed access.
Do not audit attempts to send and receive netsupport_server packets.
Domain to not audit.
Relabel packets to netsupport_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nfs port.
Domain allowed access.
Send UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nfs port.
Domain to not audit.
Receive UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nfs port.
Domain to not audit.
Send and receive UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nfs port.
Domain to not audit.
Bind TCP sockets to the nfs port.
Domain allowed access.
Bind UDP sockets to the nfs port.
Domain allowed access.
Make a TCP connection to the nfs port.
Domain allowed access.
Send nfs_client packets.
Domain allowed access.
Do not audit attempts to send nfs_client packets.
Domain to not audit.
Receive nfs_client packets.
Domain allowed access.
Do not audit attempts to receive nfs_client packets.
Domain allowed access.
Send and receive nfs_client packets.
Domain allowed access.
Do not audit attempts to send and receive nfs_client packets.
Domain to not audit.
Relabel packets to nfs_client the packet type.
Domain allowed access.
Send nfs_server packets.
Domain allowed access.
Do not audit attempts to send nfs_server packets.
Domain to not audit.
Receive nfs_server packets.
Domain allowed access.
Do not audit attempts to receive nfs_server packets.
Domain allowed access.
Send and receive nfs_server packets.
Domain allowed access.
Do not audit attempts to send and receive nfs_server packets.
Domain to not audit.
Relabel packets to nfs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nmbd port.
Domain allowed access.
Send UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nmbd port.
Domain to not audit.
Receive UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nmbd port.
Domain to not audit.
Send and receive UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
Domain to not audit.
Bind TCP sockets to the nmbd port.
Domain allowed access.
Bind UDP sockets to the nmbd port.
Domain allowed access.
Make a TCP connection to the nmbd port.
Domain allowed access.
Send nmbd_client packets.
Domain allowed access.
Do not audit attempts to send nmbd_client packets.
Domain to not audit.
Receive nmbd_client packets.
Domain allowed access.
Do not audit attempts to receive nmbd_client packets.
Domain allowed access.
Send and receive nmbd_client packets.
Domain allowed access.
Do not audit attempts to send and receive nmbd_client packets.
Domain to not audit.
Relabel packets to nmbd_client the packet type.
Domain allowed access.
Send nmbd_server packets.
Domain allowed access.
Do not audit attempts to send nmbd_server packets.
Domain to not audit.
Receive nmbd_server packets.
Domain allowed access.
Do not audit attempts to receive nmbd_server packets.
Domain allowed access.
Send and receive nmbd_server packets.
Domain allowed access.
Do not audit attempts to send and receive nmbd_server packets.
Domain to not audit.
Relabel packets to nmbd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nodejs_debug port.
Domain allowed access.
Send UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nodejs_debug port.
Domain to not audit.
Receive UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nodejs_debug port.
Domain to not audit.
Send and receive UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nodejs_debug port.
Domain to not audit.
Bind TCP sockets to the nodejs_debug port.
Domain allowed access.
Bind UDP sockets to the nodejs_debug port.
Domain allowed access.
Make a TCP connection to the nodejs_debug port.
Domain allowed access.
Send nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to send nodejs_debug_client packets.
Domain to not audit.
Receive nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to receive nodejs_debug_client packets.
Domain allowed access.
Send and receive nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to send and receive nodejs_debug_client packets.
Domain to not audit.
Relabel packets to nodejs_debug_client the packet type.
Domain allowed access.
Send nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to send nodejs_debug_server packets.
Domain to not audit.
Receive nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to receive nodejs_debug_server packets.
Domain allowed access.
Send and receive nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to send and receive nodejs_debug_server packets.
Domain to not audit.
Relabel packets to nodejs_debug_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ntp port.
Domain allowed access.
Send UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ntp port.
Domain to not audit.
Receive UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ntp port.
Domain to not audit.
Send and receive UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ntp port.
Domain to not audit.
Bind TCP sockets to the ntp port.
Domain allowed access.
Bind UDP sockets to the ntp port.
Domain allowed access.
Make a TCP connection to the ntp port.
Domain allowed access.
Send ntp_client packets.
Domain allowed access.
Do not audit attempts to send ntp_client packets.
Domain to not audit.
Receive ntp_client packets.
Domain allowed access.
Do not audit attempts to receive ntp_client packets.
Domain allowed access.
Send and receive ntp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ntp_client packets.
Domain to not audit.
Relabel packets to ntp_client the packet type.
Domain allowed access.
Send ntp_server packets.
Domain allowed access.
Do not audit attempts to send ntp_server packets.
Domain to not audit.
Receive ntp_server packets.
Domain allowed access.
Do not audit attempts to receive ntp_server packets.
Domain allowed access.
Send and receive ntp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ntp_server packets.
Domain to not audit.
Relabel packets to ntp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ntop port.
Domain allowed access.
Send UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ntop port.
Domain to not audit.
Receive UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ntop port.
Domain to not audit.
Send and receive UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ntop port.
Domain to not audit.
Bind TCP sockets to the ntop port.
Domain allowed access.
Bind UDP sockets to the ntop port.
Domain allowed access.
Make a TCP connection to the ntop port.
Domain allowed access.
Send ntop_client packets.
Domain allowed access.
Do not audit attempts to send ntop_client packets.
Domain to not audit.
Receive ntop_client packets.
Domain allowed access.
Do not audit attempts to receive ntop_client packets.
Domain allowed access.
Send and receive ntop_client packets.
Domain allowed access.
Do not audit attempts to send and receive ntop_client packets.
Domain to not audit.
Relabel packets to ntop_client the packet type.
Domain allowed access.
Send ntop_server packets.
Domain allowed access.
Do not audit attempts to send ntop_server packets.
Domain to not audit.
Receive ntop_server packets.
Domain allowed access.
Do not audit attempts to receive ntop_server packets.
Domain allowed access.
Send and receive ntop_server packets.
Domain allowed access.
Do not audit attempts to send and receive ntop_server packets.
Domain to not audit.
Relabel packets to ntop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the oracle port.
Domain allowed access.
Send UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the oracle port.
Domain to not audit.
Receive UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the oracle port.
Domain to not audit.
Send and receive UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the oracle port.
Domain to not audit.
Bind TCP sockets to the oracle port.
Domain allowed access.
Bind UDP sockets to the oracle port.
Domain allowed access.
Make a TCP connection to the oracle port.
Domain allowed access.
Send oracle_client packets.
Domain allowed access.
Do not audit attempts to send oracle_client packets.
Domain to not audit.
Receive oracle_client packets.
Domain allowed access.
Do not audit attempts to receive oracle_client packets.
Domain allowed access.
Send and receive oracle_client packets.
Domain allowed access.
Do not audit attempts to send and receive oracle_client packets.
Domain to not audit.
Relabel packets to oracle_client the packet type.
Domain allowed access.
Send oracle_server packets.
Domain allowed access.
Do not audit attempts to send oracle_server packets.
Domain to not audit.
Receive oracle_server packets.
Domain allowed access.
Do not audit attempts to receive oracle_server packets.
Domain allowed access.
Send and receive oracle_server packets.
Domain allowed access.
Do not audit attempts to send and receive oracle_server packets.
Domain to not audit.
Relabel packets to oracle_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ocsp port.
Domain allowed access.
Send UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ocsp port.
Domain to not audit.
Receive UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ocsp port.
Domain to not audit.
Send and receive UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
Domain to not audit.
Bind TCP sockets to the ocsp port.
Domain allowed access.
Bind UDP sockets to the ocsp port.
Domain allowed access.
Make a TCP connection to the ocsp port.
Domain allowed access.
Send ocsp_client packets.
Domain allowed access.
Do not audit attempts to send ocsp_client packets.
Domain to not audit.
Receive ocsp_client packets.
Domain allowed access.
Do not audit attempts to receive ocsp_client packets.
Domain allowed access.
Send and receive ocsp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ocsp_client packets.
Domain to not audit.
Relabel packets to ocsp_client the packet type.
Domain allowed access.
Send ocsp_server packets.
Domain allowed access.
Do not audit attempts to send ocsp_server packets.
Domain to not audit.
Receive ocsp_server packets.
Domain allowed access.
Do not audit attempts to receive ocsp_server packets.
Domain allowed access.
Send and receive ocsp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ocsp_server packets.
Domain to not audit.
Relabel packets to ocsp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the openhpid port.
Domain allowed access.
Send UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the openhpid port.
Domain to not audit.
Receive UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the openhpid port.
Domain to not audit.
Send and receive UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
Domain to not audit.
Bind TCP sockets to the openhpid port.
Domain allowed access.
Bind UDP sockets to the openhpid port.
Domain allowed access.
Make a TCP connection to the openhpid port.
Domain allowed access.
Send openhpid_client packets.
Domain allowed access.
Do not audit attempts to send openhpid_client packets.
Domain to not audit.
Receive openhpid_client packets.
Domain allowed access.
Do not audit attempts to receive openhpid_client packets.
Domain allowed access.
Send and receive openhpid_client packets.
Domain allowed access.
Do not audit attempts to send and receive openhpid_client packets.
Domain to not audit.
Relabel packets to openhpid_client the packet type.
Domain allowed access.
Send openhpid_server packets.
Domain allowed access.
Do not audit attempts to send openhpid_server packets.
Domain to not audit.
Receive openhpid_server packets.
Domain allowed access.
Do not audit attempts to receive openhpid_server packets.
Domain allowed access.
Send and receive openhpid_server packets.
Domain allowed access.
Do not audit attempts to send and receive openhpid_server packets.
Domain to not audit.
Relabel packets to openhpid_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the openvpn port.
Domain allowed access.
Send UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the openvpn port.
Domain to not audit.
Receive UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the openvpn port.
Domain to not audit.
Send and receive UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
Domain to not audit.
Bind TCP sockets to the openvpn port.
Domain allowed access.
Bind UDP sockets to the openvpn port.
Domain allowed access.
Make a TCP connection to the openvpn port.
Domain allowed access.
Send openvpn_client packets.
Domain allowed access.
Do not audit attempts to send openvpn_client packets.
Domain to not audit.
Receive openvpn_client packets.
Domain allowed access.
Do not audit attempts to receive openvpn_client packets.
Domain allowed access.
Send and receive openvpn_client packets.
Domain allowed access.
Do not audit attempts to send and receive openvpn_client packets.
Domain to not audit.
Relabel packets to openvpn_client the packet type.
Domain allowed access.
Send openvpn_server packets.
Domain allowed access.
Do not audit attempts to send openvpn_server packets.
Domain to not audit.
Receive openvpn_server packets.
Domain allowed access.
Do not audit attempts to receive openvpn_server packets.
Domain allowed access.
Send and receive openvpn_server packets.
Domain allowed access.
Do not audit attempts to send and receive openvpn_server packets.
Domain to not audit.
Relabel packets to openvpn_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pktcable port.
Domain allowed access.
Send UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pktcable port.
Domain to not audit.
Receive UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pktcable port.
Domain to not audit.
Send and receive UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pktcable port.
Domain to not audit.
Bind TCP sockets to the pktcable port.
Domain allowed access.
Bind UDP sockets to the pktcable port.
Domain allowed access.
Make a TCP connection to the pktcable port.
Domain allowed access.
Send pktcable_client packets.
Domain allowed access.
Do not audit attempts to send pktcable_client packets.
Domain to not audit.
Receive pktcable_client packets.
Domain allowed access.
Do not audit attempts to receive pktcable_client packets.
Domain allowed access.
Send and receive pktcable_client packets.
Domain allowed access.
Do not audit attempts to send and receive pktcable_client packets.
Domain to not audit.
Relabel packets to pktcable_client the packet type.
Domain allowed access.
Send pktcable_server packets.
Domain allowed access.
Do not audit attempts to send pktcable_server packets.
Domain to not audit.
Receive pktcable_server packets.
Domain allowed access.
Do not audit attempts to receive pktcable_server packets.
Domain allowed access.
Send and receive pktcable_server packets.
Domain allowed access.
Do not audit attempts to send and receive pktcable_server packets.
Domain to not audit.
Relabel packets to pktcable_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pegasus_http port.
Domain allowed access.
Send UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pegasus_http port.
Domain to not audit.
Receive UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pegasus_http port.
Domain to not audit.
Send and receive UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
Domain to not audit.
Bind TCP sockets to the pegasus_http port.
Domain allowed access.
Bind UDP sockets to the pegasus_http port.
Domain allowed access.
Make a TCP connection to the pegasus_http port.
Domain allowed access.
Send pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to send pegasus_http_client packets.
Domain to not audit.
Receive pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to receive pegasus_http_client packets.
Domain allowed access.
Send and receive pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_http_client packets.
Domain to not audit.
Relabel packets to pegasus_http_client the packet type.
Domain allowed access.
Send pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to send pegasus_http_server packets.
Domain to not audit.
Receive pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to receive pegasus_http_server packets.
Domain allowed access.
Send and receive pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_http_server packets.
Domain to not audit.
Relabel packets to pegasus_http_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pegasus_https port.
Domain allowed access.
Send UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pegasus_https port.
Domain to not audit.
Receive UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pegasus_https port.
Domain to not audit.
Send and receive UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
Domain to not audit.
Bind TCP sockets to the pegasus_https port.
Domain allowed access.
Bind UDP sockets to the pegasus_https port.
Domain allowed access.
Make a TCP connection to the pegasus_https port.
Domain allowed access.
Send pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to send pegasus_https_client packets.
Domain to not audit.
Receive pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to receive pegasus_https_client packets.
Domain allowed access.
Send and receive pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_https_client packets.
Domain to not audit.
Relabel packets to pegasus_https_client the packet type.
Domain allowed access.
Send pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to send pegasus_https_server packets.
Domain to not audit.
Receive pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to receive pegasus_https_server packets.
Domain allowed access.
Send and receive pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_https_server packets.
Domain to not audit.
Relabel packets to pegasus_https_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pgpkeyserver port.
Domain allowed access.
Send UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
Domain to not audit.
Receive UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
Domain to not audit.
Send and receive UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
Domain to not audit.
Bind TCP sockets to the pgpkeyserver port.
Domain allowed access.
Bind UDP sockets to the pgpkeyserver port.
Domain allowed access.
Make a TCP connection to the pgpkeyserver port.
Domain allowed access.
Send pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to send pgpkeyserver_client packets.
Domain to not audit.
Receive pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to receive pgpkeyserver_client packets.
Domain allowed access.
Send and receive pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive pgpkeyserver_client packets.
Domain to not audit.
Relabel packets to pgpkeyserver_client the packet type.
Domain allowed access.
Send pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to send pgpkeyserver_server packets.
Domain to not audit.
Receive pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to receive pgpkeyserver_server packets.
Domain allowed access.
Send and receive pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive pgpkeyserver_server packets.
Domain to not audit.
Relabel packets to pgpkeyserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pingd port.
Domain allowed access.
Send UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pingd port.
Domain to not audit.
Receive UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pingd port.
Domain to not audit.
Send and receive UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pingd port.
Domain to not audit.
Bind TCP sockets to the pingd port.
Domain allowed access.
Bind UDP sockets to the pingd port.
Domain allowed access.
Make a TCP connection to the pingd port.
Domain allowed access.
Send pingd_client packets.
Domain allowed access.
Do not audit attempts to send pingd_client packets.
Domain to not audit.
Receive pingd_client packets.
Domain allowed access.
Do not audit attempts to receive pingd_client packets.
Domain allowed access.
Send and receive pingd_client packets.
Domain allowed access.
Do not audit attempts to send and receive pingd_client packets.
Domain to not audit.
Relabel packets to pingd_client the packet type.
Domain allowed access.
Send pingd_server packets.
Domain allowed access.
Do not audit attempts to send pingd_server packets.
Domain to not audit.
Receive pingd_server packets.
Domain allowed access.
Do not audit attempts to receive pingd_server packets.
Domain allowed access.
Send and receive pingd_server packets.
Domain allowed access.
Do not audit attempts to send and receive pingd_server packets.
Domain to not audit.
Relabel packets to pingd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the piranha port.
Domain allowed access.
Send UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the piranha port.
Domain to not audit.
Receive UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the piranha port.
Domain to not audit.
Send and receive UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the piranha port.
Domain to not audit.
Bind TCP sockets to the piranha port.
Domain allowed access.
Bind UDP sockets to the piranha port.
Domain allowed access.
Make a TCP connection to the piranha port.
Domain allowed access.
Send piranha_client packets.
Domain allowed access.
Do not audit attempts to send piranha_client packets.
Domain to not audit.
Receive piranha_client packets.
Domain allowed access.
Do not audit attempts to receive piranha_client packets.
Domain allowed access.
Send and receive piranha_client packets.
Domain allowed access.
Do not audit attempts to send and receive piranha_client packets.
Domain to not audit.
Relabel packets to piranha_client the packet type.
Domain allowed access.
Send piranha_server packets.
Domain allowed access.
Do not audit attempts to send piranha_server packets.
Domain to not audit.
Receive piranha_server packets.
Domain allowed access.
Do not audit attempts to receive piranha_server packets.
Domain allowed access.
Send and receive piranha_server packets.
Domain allowed access.
Do not audit attempts to send and receive piranha_server packets.
Domain to not audit.
Relabel packets to piranha_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ca port.
Domain allowed access.
Send UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ca port.
Domain to not audit.
Receive UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ca port.
Domain to not audit.
Send and receive UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ca port.
Domain to not audit.
Bind TCP sockets to the pki_ca port.
Domain allowed access.
Bind UDP sockets to the pki_ca port.
Domain allowed access.
Make a TCP connection to the pki_ca port.
Domain allowed access.
Send pki_ca_client packets.
Domain allowed access.
Do not audit attempts to send pki_ca_client packets.
Domain to not audit.
Receive pki_ca_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ca_client packets.
Domain allowed access.
Send and receive pki_ca_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ca_client packets.
Domain to not audit.
Relabel packets to pki_ca_client the packet type.
Domain allowed access.
Send pki_ca_server packets.
Domain allowed access.
Do not audit attempts to send pki_ca_server packets.
Domain to not audit.
Receive pki_ca_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ca_server packets.
Domain allowed access.
Send and receive pki_ca_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ca_server packets.
Domain to not audit.
Relabel packets to pki_ca_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_kra port.
Domain allowed access.
Send UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_kra port.
Domain to not audit.
Receive UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_kra port.
Domain to not audit.
Send and receive UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_kra port.
Domain to not audit.
Bind TCP sockets to the pki_kra port.
Domain allowed access.
Bind UDP sockets to the pki_kra port.
Domain allowed access.
Make a TCP connection to the pki_kra port.
Domain allowed access.
Send pki_kra_client packets.
Domain allowed access.
Do not audit attempts to send pki_kra_client packets.
Domain to not audit.
Receive pki_kra_client packets.
Domain allowed access.
Do not audit attempts to receive pki_kra_client packets.
Domain allowed access.
Send and receive pki_kra_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_kra_client packets.
Domain to not audit.
Relabel packets to pki_kra_client the packet type.
Domain allowed access.
Send pki_kra_server packets.
Domain allowed access.
Do not audit attempts to send pki_kra_server packets.
Domain to not audit.
Receive pki_kra_server packets.
Domain allowed access.
Do not audit attempts to receive pki_kra_server packets.
Domain allowed access.
Send and receive pki_kra_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_kra_server packets.
Domain to not audit.
Relabel packets to pki_kra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ocsp port.
Domain allowed access.
Send UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ocsp port.
Domain to not audit.
Receive UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ocsp port.
Domain to not audit.
Send and receive UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ocsp port.
Domain to not audit.
Bind TCP sockets to the pki_ocsp port.
Domain allowed access.
Bind UDP sockets to the pki_ocsp port.
Domain allowed access.
Make a TCP connection to the pki_ocsp port.
Domain allowed access.
Send pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to send pki_ocsp_client packets.
Domain to not audit.
Receive pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ocsp_client packets.
Domain allowed access.
Send and receive pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ocsp_client packets.
Domain to not audit.
Relabel packets to pki_ocsp_client the packet type.
Domain allowed access.
Send pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to send pki_ocsp_server packets.
Domain to not audit.
Receive pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ocsp_server packets.
Domain allowed access.
Send and receive pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ocsp_server packets.
Domain to not audit.
Relabel packets to pki_ocsp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_tks port.
Domain allowed access.
Send UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_tks port.
Domain to not audit.
Receive UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_tks port.
Domain to not audit.
Send and receive UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_tks port.
Domain to not audit.
Bind TCP sockets to the pki_tks port.
Domain allowed access.
Bind UDP sockets to the pki_tks port.
Domain allowed access.
Make a TCP connection to the pki_tks port.
Domain allowed access.
Send pki_tks_client packets.
Domain allowed access.
Do not audit attempts to send pki_tks_client packets.
Domain to not audit.
Receive pki_tks_client packets.
Domain allowed access.
Do not audit attempts to receive pki_tks_client packets.
Domain allowed access.
Send and receive pki_tks_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tks_client packets.
Domain to not audit.
Relabel packets to pki_tks_client the packet type.
Domain allowed access.
Send pki_tks_server packets.
Domain allowed access.
Do not audit attempts to send pki_tks_server packets.
Domain to not audit.
Receive pki_tks_server packets.
Domain allowed access.
Do not audit attempts to receive pki_tks_server packets.
Domain allowed access.
Send and receive pki_tks_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tks_server packets.
Domain to not audit.
Relabel packets to pki_tks_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ra port.
Domain allowed access.
Send UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ra port.
Domain to not audit.
Receive UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ra port.
Domain to not audit.
Send and receive UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ra port.
Domain to not audit.
Bind TCP sockets to the pki_ra port.
Domain allowed access.
Bind UDP sockets to the pki_ra port.
Domain allowed access.
Make a TCP connection to the pki_ra port.
Domain allowed access.
Send pki_ra_client packets.
Domain allowed access.
Do not audit attempts to send pki_ra_client packets.
Domain to not audit.
Receive pki_ra_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ra_client packets.
Domain allowed access.
Send and receive pki_ra_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ra_client packets.
Domain to not audit.
Relabel packets to pki_ra_client the packet type.
Domain allowed access.
Send pki_ra_server packets.
Domain allowed access.
Do not audit attempts to send pki_ra_server packets.
Domain to not audit.
Receive pki_ra_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ra_server packets.
Domain allowed access.
Send and receive pki_ra_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ra_server packets.
Domain to not audit.
Relabel packets to pki_ra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_tps port.
Domain allowed access.
Send UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_tps port.
Domain to not audit.
Receive UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_tps port.
Domain to not audit.
Send and receive UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_tps port.
Domain to not audit.
Bind TCP sockets to the pki_tps port.
Domain allowed access.
Bind UDP sockets to the pki_tps port.
Domain allowed access.
Make a TCP connection to the pki_tps port.
Domain allowed access.
Send pki_tps_client packets.
Domain allowed access.
Do not audit attempts to send pki_tps_client packets.
Domain to not audit.
Receive pki_tps_client packets.
Domain allowed access.
Do not audit attempts to receive pki_tps_client packets.
Domain allowed access.
Send and receive pki_tps_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tps_client packets.
Domain to not audit.
Relabel packets to pki_tps_client the packet type.
Domain allowed access.
Send pki_tps_server packets.
Domain allowed access.
Do not audit attempts to send pki_tps_server packets.
Domain to not audit.
Receive pki_tps_server packets.
Domain allowed access.
Do not audit attempts to receive pki_tps_server packets.
Domain allowed access.
Send and receive pki_tps_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tps_server packets.
Domain to not audit.
Relabel packets to pki_tps_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pop port.
Domain allowed access.
Send UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pop port.
Domain to not audit.
Receive UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pop port.
Domain to not audit.
Send and receive UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pop port.
Domain to not audit.
Bind TCP sockets to the pop port.
Domain allowed access.
Bind UDP sockets to the pop port.
Domain allowed access.
Make a TCP connection to the pop port.
Domain allowed access.
Send pop_client packets.
Domain allowed access.
Do not audit attempts to send pop_client packets.
Domain to not audit.
Receive pop_client packets.
Domain allowed access.
Do not audit attempts to receive pop_client packets.
Domain allowed access.
Send and receive pop_client packets.
Domain allowed access.
Do not audit attempts to send and receive pop_client packets.
Domain to not audit.
Relabel packets to pop_client the packet type.
Domain allowed access.
Send pop_server packets.
Domain allowed access.
Do not audit attempts to send pop_server packets.
Domain to not audit.
Receive pop_server packets.
Domain allowed access.
Do not audit attempts to receive pop_server packets.
Domain allowed access.
Send and receive pop_server packets.
Domain allowed access.
Do not audit attempts to send and receive pop_server packets.
Domain to not audit.
Relabel packets to pop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the portmap port.
Domain allowed access.
Send UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the portmap port.
Domain to not audit.
Receive UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the portmap port.
Domain to not audit.
Send and receive UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the portmap port.
Domain to not audit.
Bind TCP sockets to the portmap port.
Domain allowed access.
Bind UDP sockets to the portmap port.
Domain allowed access.
Make a TCP connection to the portmap port.
Domain allowed access.
Send portmap_client packets.
Domain allowed access.
Do not audit attempts to send portmap_client packets.
Domain to not audit.
Receive portmap_client packets.
Domain allowed access.
Do not audit attempts to receive portmap_client packets.
Domain allowed access.
Send and receive portmap_client packets.
Domain allowed access.
Do not audit attempts to send and receive portmap_client packets.
Domain to not audit.
Relabel packets to portmap_client the packet type.
Domain allowed access.
Send portmap_server packets.
Domain allowed access.
Do not audit attempts to send portmap_server packets.
Domain to not audit.
Receive portmap_server packets.
Domain allowed access.
Do not audit attempts to receive portmap_server packets.
Domain allowed access.
Send and receive portmap_server packets.
Domain allowed access.
Do not audit attempts to send and receive portmap_server packets.
Domain to not audit.
Relabel packets to portmap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postfix_policyd port.
Domain allowed access.
Send UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postfix_policyd port.
Domain to not audit.
Receive UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
Domain to not audit.
Send and receive UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
Domain to not audit.
Bind TCP sockets to the postfix_policyd port.
Domain allowed access.
Bind UDP sockets to the postfix_policyd port.
Domain allowed access.
Make a TCP connection to the postfix_policyd port.
Domain allowed access.
Send postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to send postfix_policyd_client packets.
Domain to not audit.
Receive postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to receive postfix_policyd_client packets.
Domain allowed access.
Send and receive postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to send and receive postfix_policyd_client packets.
Domain to not audit.
Relabel packets to postfix_policyd_client the packet type.
Domain allowed access.
Send postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to send postfix_policyd_server packets.
Domain to not audit.
Receive postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to receive postfix_policyd_server packets.
Domain allowed access.
Send and receive postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to send and receive postfix_policyd_server packets.
Domain to not audit.
Relabel packets to postfix_policyd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postgresql port.
Domain allowed access.
Send UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postgresql port.
Domain to not audit.
Receive UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postgresql port.
Domain to not audit.
Send and receive UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
Domain to not audit.
Bind TCP sockets to the postgresql port.
Domain allowed access.
Bind UDP sockets to the postgresql port.
Domain allowed access.
Make a TCP connection to the postgresql port.
Domain allowed access.
Send postgresql_client packets.
Domain allowed access.
Do not audit attempts to send postgresql_client packets.
Domain to not audit.
Receive postgresql_client packets.
Domain allowed access.
Do not audit attempts to receive postgresql_client packets.
Domain allowed access.
Send and receive postgresql_client packets.
Domain allowed access.
Do not audit attempts to send and receive postgresql_client packets.
Domain to not audit.
Relabel packets to postgresql_client the packet type.
Domain allowed access.
Send postgresql_server packets.
Domain allowed access.
Do not audit attempts to send postgresql_server packets.
Domain to not audit.
Receive postgresql_server packets.
Domain allowed access.
Do not audit attempts to receive postgresql_server packets.
Domain allowed access.
Send and receive postgresql_server packets.
Domain allowed access.
Do not audit attempts to send and receive postgresql_server packets.
Domain to not audit.
Relabel packets to postgresql_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postgrey port.
Domain allowed access.
Send UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postgrey port.
Domain to not audit.
Receive UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postgrey port.
Domain to not audit.
Send and receive UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
Domain to not audit.
Bind TCP sockets to the postgrey port.
Domain allowed access.
Bind UDP sockets to the postgrey port.
Domain allowed access.
Make a TCP connection to the postgrey port.
Domain allowed access.
Send postgrey_client packets.
Domain allowed access.
Do not audit attempts to send postgrey_client packets.
Domain to not audit.
Receive postgrey_client packets.
Domain allowed access.
Do not audit attempts to receive postgrey_client packets.
Domain allowed access.
Send and receive postgrey_client packets.
Domain allowed access.
Do not audit attempts to send and receive postgrey_client packets.
Domain to not audit.
Relabel packets to postgrey_client the packet type.
Domain allowed access.
Send postgrey_server packets.
Domain allowed access.
Do not audit attempts to send postgrey_server packets.
Domain to not audit.
Receive postgrey_server packets.
Domain allowed access.
Do not audit attempts to receive postgrey_server packets.
Domain allowed access.
Send and receive postgrey_server packets.
Domain allowed access.
Do not audit attempts to send and receive postgrey_server packets.
Domain to not audit.
Relabel packets to postgrey_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the prelude port.
Domain allowed access.
Send UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the prelude port.
Domain to not audit.
Receive UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the prelude port.
Domain to not audit.
Send and receive UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the prelude port.
Domain to not audit.
Bind TCP sockets to the prelude port.
Domain allowed access.
Bind UDP sockets to the prelude port.
Domain allowed access.
Make a TCP connection to the prelude port.
Domain allowed access.
Send prelude_client packets.
Domain allowed access.
Do not audit attempts to send prelude_client packets.
Domain to not audit.
Receive prelude_client packets.
Domain allowed access.
Do not audit attempts to receive prelude_client packets.
Domain allowed access.
Send and receive prelude_client packets.
Domain allowed access.
Do not audit attempts to send and receive prelude_client packets.
Domain to not audit.
Relabel packets to prelude_client the packet type.
Domain allowed access.
Send prelude_server packets.
Domain allowed access.
Do not audit attempts to send prelude_server packets.
Domain to not audit.
Receive prelude_server packets.
Domain allowed access.
Do not audit attempts to receive prelude_server packets.
Domain allowed access.
Send and receive prelude_server packets.
Domain allowed access.
Do not audit attempts to send and receive prelude_server packets.
Domain to not audit.
Relabel packets to prelude_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the presence port.
Domain allowed access.
Send UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the presence port.
Domain to not audit.
Receive UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the presence port.
Domain to not audit.
Send and receive UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the presence port.
Domain to not audit.
Bind TCP sockets to the presence port.
Domain allowed access.
Bind UDP sockets to the presence port.
Domain allowed access.
Make a TCP connection to the presence port.
Domain allowed access.
Send presence_client packets.
Domain allowed access.
Do not audit attempts to send presence_client packets.
Domain to not audit.
Receive presence_client packets.
Domain allowed access.
Do not audit attempts to receive presence_client packets.
Domain allowed access.
Send and receive presence_client packets.
Domain allowed access.
Do not audit attempts to send and receive presence_client packets.
Domain to not audit.
Relabel packets to presence_client the packet type.
Domain allowed access.
Send presence_server packets.
Domain allowed access.
Do not audit attempts to send presence_server packets.
Domain to not audit.
Receive presence_server packets.
Domain allowed access.
Do not audit attempts to receive presence_server packets.
Domain allowed access.
Send and receive presence_server packets.
Domain allowed access.
Do not audit attempts to send and receive presence_server packets.
Domain to not audit.
Relabel packets to presence_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the preupgrade port.
Domain allowed access.
Send UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the preupgrade port.
Domain to not audit.
Receive UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the preupgrade port.
Domain to not audit.
Send and receive UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the preupgrade port.
Domain to not audit.
Bind TCP sockets to the preupgrade port.
Domain allowed access.
Bind UDP sockets to the preupgrade port.
Domain allowed access.
Make a TCP connection to the preupgrade port.
Domain allowed access.
Send preupgrade_client packets.
Domain allowed access.
Do not audit attempts to send preupgrade_client packets.
Domain to not audit.
Receive preupgrade_client packets.
Domain allowed access.
Do not audit attempts to receive preupgrade_client packets.
Domain allowed access.
Send and receive preupgrade_client packets.
Domain allowed access.
Do not audit attempts to send and receive preupgrade_client packets.
Domain to not audit.
Relabel packets to preupgrade_client the packet type.
Domain allowed access.
Send preupgrade_server packets.
Domain allowed access.
Do not audit attempts to send preupgrade_server packets.
Domain to not audit.
Receive preupgrade_server packets.
Domain allowed access.
Do not audit attempts to receive preupgrade_server packets.
Domain allowed access.
Send and receive preupgrade_server packets.
Domain allowed access.
Do not audit attempts to send and receive preupgrade_server packets.
Domain to not audit.
Relabel packets to preupgrade_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the printer port.
Domain allowed access.
Send UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the printer port.
Domain to not audit.
Receive UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the printer port.
Domain to not audit.
Send and receive UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the printer port.
Domain to not audit.
Bind TCP sockets to the printer port.
Domain allowed access.
Bind UDP sockets to the printer port.
Domain allowed access.
Make a TCP connection to the printer port.
Domain allowed access.
Send printer_client packets.
Domain allowed access.
Do not audit attempts to send printer_client packets.
Domain to not audit.
Receive printer_client packets.
Domain allowed access.
Do not audit attempts to receive printer_client packets.
Domain allowed access.
Send and receive printer_client packets.
Domain allowed access.
Do not audit attempts to send and receive printer_client packets.
Domain to not audit.
Relabel packets to printer_client the packet type.
Domain allowed access.
Send printer_server packets.
Domain allowed access.
Do not audit attempts to send printer_server packets.
Domain to not audit.
Receive printer_server packets.
Domain allowed access.
Do not audit attempts to receive printer_server packets.
Domain allowed access.
Send and receive printer_server packets.
Domain allowed access.
Do not audit attempts to send and receive printer_server packets.
Domain to not audit.
Relabel packets to printer_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ptal port.
Domain allowed access.
Send UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ptal port.
Domain to not audit.
Receive UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ptal port.
Domain to not audit.
Send and receive UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ptal port.
Domain to not audit.
Bind TCP sockets to the ptal port.
Domain allowed access.
Bind UDP sockets to the ptal port.
Domain allowed access.
Make a TCP connection to the ptal port.
Domain allowed access.
Send ptal_client packets.
Domain allowed access.
Do not audit attempts to send ptal_client packets.
Domain to not audit.
Receive ptal_client packets.
Domain allowed access.
Do not audit attempts to receive ptal_client packets.
Domain allowed access.
Send and receive ptal_client packets.
Domain allowed access.
Do not audit attempts to send and receive ptal_client packets.
Domain to not audit.
Relabel packets to ptal_client the packet type.
Domain allowed access.
Send ptal_server packets.
Domain allowed access.
Do not audit attempts to send ptal_server packets.
Domain to not audit.
Receive ptal_server packets.
Domain allowed access.
Do not audit attempts to receive ptal_server packets.
Domain allowed access.
Send and receive ptal_server packets.
Domain allowed access.
Do not audit attempts to send and receive ptal_server packets.
Domain to not audit.
Relabel packets to ptal_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pulseaudio port.
Domain allowed access.
Send UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pulseaudio port.
Domain to not audit.
Receive UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pulseaudio port.
Domain to not audit.
Send and receive UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
Domain to not audit.
Bind TCP sockets to the pulseaudio port.
Domain allowed access.
Bind UDP sockets to the pulseaudio port.
Domain allowed access.
Make a TCP connection to the pulseaudio port.
Domain allowed access.
Send pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to send pulseaudio_client packets.
Domain to not audit.
Receive pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to receive pulseaudio_client packets.
Domain allowed access.
Send and receive pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to send and receive pulseaudio_client packets.
Domain to not audit.
Relabel packets to pulseaudio_client the packet type.
Domain allowed access.
Send pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to send pulseaudio_server packets.
Domain to not audit.
Receive pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to receive pulseaudio_server packets.
Domain allowed access.
Send and receive pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to send and receive pulseaudio_server packets.
Domain to not audit.
Relabel packets to pulseaudio_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the puppet port.
Domain allowed access.
Send UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the puppet port.
Domain to not audit.
Receive UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the puppet port.
Domain to not audit.
Send and receive UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the puppet port.
Domain to not audit.
Bind TCP sockets to the puppet port.
Domain allowed access.
Bind UDP sockets to the puppet port.
Domain allowed access.
Make a TCP connection to the puppet port.
Domain allowed access.
Send puppet_client packets.
Domain allowed access.
Do not audit attempts to send puppet_client packets.
Domain to not audit.
Receive puppet_client packets.
Domain allowed access.
Do not audit attempts to receive puppet_client packets.
Domain allowed access.
Send and receive puppet_client packets.
Domain allowed access.
Do not audit attempts to send and receive puppet_client packets.
Domain to not audit.
Relabel packets to puppet_client the packet type.
Domain allowed access.
Send puppet_server packets.
Domain allowed access.
Do not audit attempts to send puppet_server packets.
Domain to not audit.
Receive puppet_server packets.
Domain allowed access.
Do not audit attempts to receive puppet_server packets.
Domain allowed access.
Send and receive puppet_server packets.
Domain allowed access.
Do not audit attempts to send and receive puppet_server packets.
Domain to not audit.
Relabel packets to puppet_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pxe port.
Domain allowed access.
Send UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pxe port.
Domain to not audit.
Receive UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pxe port.
Domain to not audit.
Send and receive UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pxe port.
Domain to not audit.
Bind TCP sockets to the pxe port.
Domain allowed access.
Bind UDP sockets to the pxe port.
Domain allowed access.
Make a TCP connection to the pxe port.
Domain allowed access.
Send pxe_client packets.
Domain allowed access.
Do not audit attempts to send pxe_client packets.
Domain to not audit.
Receive pxe_client packets.
Domain allowed access.
Do not audit attempts to receive pxe_client packets.
Domain allowed access.
Send and receive pxe_client packets.
Domain allowed access.
Do not audit attempts to send and receive pxe_client packets.
Domain to not audit.
Relabel packets to pxe_client the packet type.
Domain allowed access.
Send pxe_server packets.
Domain allowed access.
Do not audit attempts to send pxe_server packets.
Domain to not audit.
Receive pxe_server packets.
Domain allowed access.
Do not audit attempts to receive pxe_server packets.
Domain allowed access.
Send and receive pxe_server packets.
Domain allowed access.
Do not audit attempts to send and receive pxe_server packets.
Domain to not audit.
Relabel packets to pxe_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pyzor port.
Domain allowed access.
Send UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pyzor port.
Domain to not audit.
Receive UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pyzor port.
Domain to not audit.
Send and receive UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
Domain to not audit.
Bind TCP sockets to the pyzor port.
Domain allowed access.
Bind UDP sockets to the pyzor port.
Domain allowed access.
Make a TCP connection to the pyzor port.
Domain allowed access.
Send pyzor_client packets.
Domain allowed access.
Do not audit attempts to send pyzor_client packets.
Domain to not audit.
Receive pyzor_client packets.
Domain allowed access.
Do not audit attempts to receive pyzor_client packets.
Domain allowed access.
Send and receive pyzor_client packets.
Domain allowed access.
Do not audit attempts to send and receive pyzor_client packets.
Domain to not audit.
Relabel packets to pyzor_client the packet type.
Domain allowed access.
Send pyzor_server packets.
Domain allowed access.
Do not audit attempts to send pyzor_server packets.
Domain to not audit.
Receive pyzor_server packets.
Domain allowed access.
Do not audit attempts to receive pyzor_server packets.
Domain allowed access.
Send and receive pyzor_server packets.
Domain allowed access.
Do not audit attempts to send and receive pyzor_server packets.
Domain to not audit.
Relabel packets to pyzor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the neutron port.
Domain allowed access.
Send UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the neutron port.
Domain to not audit.
Receive UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the neutron port.
Domain to not audit.
Send and receive UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the neutron port.
Domain to not audit.
Bind TCP sockets to the neutron port.
Domain allowed access.
Bind UDP sockets to the neutron port.
Domain allowed access.
Make a TCP connection to the neutron port.
Domain allowed access.
Send neutron_client packets.
Domain allowed access.
Do not audit attempts to send neutron_client packets.
Domain to not audit.
Receive neutron_client packets.
Domain allowed access.
Do not audit attempts to receive neutron_client packets.
Domain allowed access.
Send and receive neutron_client packets.
Domain allowed access.
Do not audit attempts to send and receive neutron_client packets.
Domain to not audit.
Relabel packets to neutron_client the packet type.
Domain allowed access.
Send neutron_server packets.
Domain allowed access.
Do not audit attempts to send neutron_server packets.
Domain to not audit.
Receive neutron_server packets.
Domain allowed access.
Do not audit attempts to receive neutron_server packets.
Domain allowed access.
Send and receive neutron_server packets.
Domain allowed access.
Do not audit attempts to send and receive neutron_server packets.
Domain to not audit.
Relabel packets to neutron_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radacct port.
Domain allowed access.
Send UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radacct port.
Domain to not audit.
Receive UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radacct port.
Domain to not audit.
Send and receive UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radacct port.
Domain to not audit.
Bind TCP sockets to the radacct port.
Domain allowed access.
Bind UDP sockets to the radacct port.
Domain allowed access.
Make a TCP connection to the radacct port.
Domain allowed access.
Send radacct_client packets.
Domain allowed access.
Do not audit attempts to send radacct_client packets.
Domain to not audit.
Receive radacct_client packets.
Domain allowed access.
Do not audit attempts to receive radacct_client packets.
Domain allowed access.
Send and receive radacct_client packets.
Domain allowed access.
Do not audit attempts to send and receive radacct_client packets.
Domain to not audit.
Relabel packets to radacct_client the packet type.
Domain allowed access.
Send radacct_server packets.
Domain allowed access.
Do not audit attempts to send radacct_server packets.
Domain to not audit.
Receive radacct_server packets.
Domain allowed access.
Do not audit attempts to receive radacct_server packets.
Domain allowed access.
Send and receive radacct_server packets.
Domain allowed access.
Do not audit attempts to send and receive radacct_server packets.
Domain to not audit.
Relabel packets to radacct_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radius port.
Domain allowed access.
Send UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radius port.
Domain to not audit.
Receive UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radius port.
Domain to not audit.
Send and receive UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radius port.
Domain to not audit.
Bind TCP sockets to the radius port.
Domain allowed access.
Bind UDP sockets to the radius port.
Domain allowed access.
Make a TCP connection to the radius port.
Domain allowed access.
Send radius_client packets.
Domain allowed access.
Do not audit attempts to send radius_client packets.
Domain to not audit.
Receive radius_client packets.
Domain allowed access.
Do not audit attempts to receive radius_client packets.
Domain allowed access.
Send and receive radius_client packets.
Domain allowed access.
Do not audit attempts to send and receive radius_client packets.
Domain to not audit.
Relabel packets to radius_client the packet type.
Domain allowed access.
Send radius_server packets.
Domain allowed access.
Do not audit attempts to send radius_server packets.
Domain to not audit.
Receive radius_server packets.
Domain allowed access.
Do not audit attempts to receive radius_server packets.
Domain allowed access.
Send and receive radius_server packets.
Domain allowed access.
Do not audit attempts to send and receive radius_server packets.
Domain to not audit.
Relabel packets to radius_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radsec port.
Domain allowed access.
Send UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radsec port.
Domain to not audit.
Receive UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radsec port.
Domain to not audit.
Send and receive UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radsec port.
Domain to not audit.
Bind TCP sockets to the radsec port.
Domain allowed access.
Bind UDP sockets to the radsec port.
Domain allowed access.
Make a TCP connection to the radsec port.
Domain allowed access.
Send radsec_client packets.
Domain allowed access.
Do not audit attempts to send radsec_client packets.
Domain to not audit.
Receive radsec_client packets.
Domain allowed access.
Do not audit attempts to receive radsec_client packets.
Domain allowed access.
Send and receive radsec_client packets.
Domain allowed access.
Do not audit attempts to send and receive radsec_client packets.
Domain to not audit.
Relabel packets to radsec_client the packet type.
Domain allowed access.
Send radsec_server packets.
Domain allowed access.
Do not audit attempts to send radsec_server packets.
Domain to not audit.
Receive radsec_server packets.
Domain allowed access.
Do not audit attempts to receive radsec_server packets.
Domain allowed access.
Send and receive radsec_server packets.
Domain allowed access.
Do not audit attempts to send and receive radsec_server packets.
Domain to not audit.
Relabel packets to radsec_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the razor port.
Domain allowed access.
Send UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the razor port.
Domain to not audit.
Receive UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the razor port.
Domain to not audit.
Send and receive UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the razor port.
Domain to not audit.
Bind TCP sockets to the razor port.
Domain allowed access.
Bind UDP sockets to the razor port.
Domain allowed access.
Make a TCP connection to the razor port.
Domain allowed access.
Send razor_client packets.
Domain allowed access.
Do not audit attempts to send razor_client packets.
Domain to not audit.
Receive razor_client packets.
Domain allowed access.
Do not audit attempts to receive razor_client packets.
Domain allowed access.
Send and receive razor_client packets.
Domain allowed access.
Do not audit attempts to send and receive razor_client packets.
Domain to not audit.
Relabel packets to razor_client the packet type.
Domain allowed access.
Send razor_server packets.
Domain allowed access.
Do not audit attempts to send razor_server packets.
Domain to not audit.
Receive razor_server packets.
Domain allowed access.
Do not audit attempts to receive razor_server packets.
Domain allowed access.
Send and receive razor_server packets.
Domain allowed access.
Do not audit attempts to send and receive razor_server packets.
Domain to not audit.
Relabel packets to razor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the redis port.
Domain allowed access.
Send UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the redis port.
Domain to not audit.
Receive UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the redis port.
Domain to not audit.
Send and receive UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the redis port.
Domain to not audit.
Bind TCP sockets to the redis port.
Domain allowed access.
Bind UDP sockets to the redis port.
Domain allowed access.
Make a TCP connection to the redis port.
Domain allowed access.
Send redis_client packets.
Domain allowed access.
Do not audit attempts to send redis_client packets.
Domain to not audit.
Receive redis_client packets.
Domain allowed access.
Do not audit attempts to receive redis_client packets.
Domain allowed access.
Send and receive redis_client packets.
Domain allowed access.
Do not audit attempts to send and receive redis_client packets.
Domain to not audit.
Relabel packets to redis_client the packet type.
Domain allowed access.
Send redis_server packets.
Domain allowed access.
Do not audit attempts to send redis_server packets.
Domain to not audit.
Receive redis_server packets.
Domain allowed access.
Do not audit attempts to receive redis_server packets.
Domain allowed access.
Send and receive redis_server packets.
Domain allowed access.
Do not audit attempts to send and receive redis_server packets.
Domain to not audit.
Relabel packets to redis_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the repository port.
Domain allowed access.
Send UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the repository port.
Domain to not audit.
Receive UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the repository port.
Domain to not audit.
Send and receive UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the repository port.
Domain to not audit.
Bind TCP sockets to the repository port.
Domain allowed access.
Bind UDP sockets to the repository port.
Domain allowed access.
Make a TCP connection to the repository port.
Domain allowed access.
Send repository_client packets.
Domain allowed access.
Do not audit attempts to send repository_client packets.
Domain to not audit.
Receive repository_client packets.
Domain allowed access.
Do not audit attempts to receive repository_client packets.
Domain allowed access.
Send and receive repository_client packets.
Domain allowed access.
Do not audit attempts to send and receive repository_client packets.
Domain to not audit.
Relabel packets to repository_client the packet type.
Domain allowed access.
Send repository_server packets.
Domain allowed access.
Do not audit attempts to send repository_server packets.
Domain to not audit.
Receive repository_server packets.
Domain allowed access.
Do not audit attempts to receive repository_server packets.
Domain allowed access.
Send and receive repository_server packets.
Domain allowed access.
Do not audit attempts to send and receive repository_server packets.
Domain to not audit.
Relabel packets to repository_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ricci port.
Domain allowed access.
Send UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ricci port.
Domain to not audit.
Receive UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ricci port.
Domain to not audit.
Send and receive UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ricci port.
Domain to not audit.
Bind TCP sockets to the ricci port.
Domain allowed access.
Bind UDP sockets to the ricci port.
Domain allowed access.
Make a TCP connection to the ricci port.
Domain allowed access.
Send ricci_client packets.
Domain allowed access.
Do not audit attempts to send ricci_client packets.
Domain to not audit.
Receive ricci_client packets.
Domain allowed access.
Do not audit attempts to receive ricci_client packets.
Domain allowed access.
Send and receive ricci_client packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_client packets.
Domain to not audit.
Relabel packets to ricci_client the packet type.
Domain allowed access.
Send ricci_server packets.
Domain allowed access.
Do not audit attempts to send ricci_server packets.
Domain to not audit.
Receive ricci_server packets.
Domain allowed access.
Do not audit attempts to receive ricci_server packets.
Domain allowed access.
Send and receive ricci_server packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_server packets.
Domain to not audit.
Relabel packets to ricci_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ricci_modcluster port.
Domain allowed access.
Send UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
Domain to not audit.
Receive UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
Domain to not audit.
Send and receive UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
Domain to not audit.
Bind TCP sockets to the ricci_modcluster port.
Domain allowed access.
Bind UDP sockets to the ricci_modcluster port.
Domain allowed access.
Make a TCP connection to the ricci_modcluster port.
Domain allowed access.
Send ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to send ricci_modcluster_client packets.
Domain to not audit.
Receive ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to receive ricci_modcluster_client packets.
Domain allowed access.
Send and receive ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_modcluster_client packets.
Domain to not audit.
Relabel packets to ricci_modcluster_client the packet type.
Domain allowed access.
Send ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to send ricci_modcluster_server packets.
Domain to not audit.
Receive ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to receive ricci_modcluster_server packets.
Domain allowed access.
Send and receive ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_modcluster_server packets.
Domain to not audit.
Relabel packets to ricci_modcluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rlogind port.
Domain allowed access.
Send UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rlogind port.
Domain to not audit.
Receive UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rlogind port.
Domain to not audit.
Send and receive UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
Domain to not audit.
Bind TCP sockets to the rlogind port.
Domain allowed access.
Bind UDP sockets to the rlogind port.
Domain allowed access.
Make a TCP connection to the rlogind port.
Domain allowed access.
Send rlogind_client packets.
Domain allowed access.
Do not audit attempts to send rlogind_client packets.
Domain to not audit.
Receive rlogind_client packets.
Domain allowed access.
Do not audit attempts to receive rlogind_client packets.
Domain allowed access.
Send and receive rlogind_client packets.
Domain allowed access.
Do not audit attempts to send and receive rlogind_client packets.
Domain to not audit.
Relabel packets to rlogind_client the packet type.
Domain allowed access.
Send rlogind_server packets.
Domain allowed access.
Do not audit attempts to send rlogind_server packets.
Domain to not audit.
Receive rlogind_server packets.
Domain allowed access.
Do not audit attempts to receive rlogind_server packets.
Domain allowed access.
Send and receive rlogind_server packets.
Domain allowed access.
Do not audit attempts to send and receive rlogind_server packets.
Domain to not audit.
Relabel packets to rlogind_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rndc port.
Domain allowed access.
Send UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rndc port.
Domain to not audit.
Receive UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rndc port.
Domain to not audit.
Send and receive UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rndc port.
Domain to not audit.
Bind TCP sockets to the rndc port.
Domain allowed access.
Bind UDP sockets to the rndc port.
Domain allowed access.
Make a TCP connection to the rndc port.
Domain allowed access.
Send rndc_client packets.
Domain allowed access.
Do not audit attempts to send rndc_client packets.
Domain to not audit.
Receive rndc_client packets.
Domain allowed access.
Do not audit attempts to receive rndc_client packets.
Domain allowed access.
Send and receive rndc_client packets.
Domain allowed access.
Do not audit attempts to send and receive rndc_client packets.
Domain to not audit.
Relabel packets to rndc_client the packet type.
Domain allowed access.
Send rndc_server packets.
Domain allowed access.
Do not audit attempts to send rndc_server packets.
Domain to not audit.
Receive rndc_server packets.
Domain allowed access.
Do not audit attempts to receive rndc_server packets.
Domain allowed access.
Send and receive rndc_server packets.
Domain allowed access.
Do not audit attempts to send and receive rndc_server packets.
Domain to not audit.
Relabel packets to rndc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the router port.
Domain allowed access.
Send UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the router port.
Domain to not audit.
Receive UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the router port.
Domain to not audit.
Send and receive UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the router port.
Domain to not audit.
Bind TCP sockets to the router port.
Domain allowed access.
Bind UDP sockets to the router port.
Domain allowed access.
Make a TCP connection to the router port.
Domain allowed access.
Send router_client packets.
Domain allowed access.
Do not audit attempts to send router_client packets.
Domain to not audit.
Receive router_client packets.
Domain allowed access.
Do not audit attempts to receive router_client packets.
Domain allowed access.
Send and receive router_client packets.
Domain allowed access.
Do not audit attempts to send and receive router_client packets.
Domain to not audit.
Relabel packets to router_client the packet type.
Domain allowed access.
Send router_server packets.
Domain allowed access.
Do not audit attempts to send router_server packets.
Domain to not audit.
Receive router_server packets.
Domain allowed access.
Do not audit attempts to receive router_server packets.
Domain allowed access.
Send and receive router_server packets.
Domain allowed access.
Do not audit attempts to send and receive router_server packets.
Domain to not audit.
Relabel packets to router_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rsh port.
Domain allowed access.
Send UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rsh port.
Domain to not audit.
Receive UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rsh port.
Domain to not audit.
Send and receive UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rsh port.
Domain to not audit.
Bind TCP sockets to the rsh port.
Domain allowed access.
Bind UDP sockets to the rsh port.
Domain allowed access.
Make a TCP connection to the rsh port.
Domain allowed access.
Send rsh_client packets.
Domain allowed access.
Do not audit attempts to send rsh_client packets.
Domain to not audit.
Receive rsh_client packets.
Domain allowed access.
Do not audit attempts to receive rsh_client packets.
Domain allowed access.
Send and receive rsh_client packets.
Domain allowed access.
Do not audit attempts to send and receive rsh_client packets.
Domain to not audit.
Relabel packets to rsh_client the packet type.
Domain allowed access.
Send rsh_server packets.
Domain allowed access.
Do not audit attempts to send rsh_server packets.
Domain to not audit.
Receive rsh_server packets.
Domain allowed access.
Do not audit attempts to receive rsh_server packets.
Domain allowed access.
Send and receive rsh_server packets.
Domain allowed access.
Do not audit attempts to send and receive rsh_server packets.
Domain to not audit.
Relabel packets to rsh_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rsync port.
Domain allowed access.
Send UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rsync port.
Domain to not audit.
Receive UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rsync port.
Domain to not audit.
Send and receive UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rsync port.
Domain to not audit.
Bind TCP sockets to the rsync port.
Domain allowed access.
Bind UDP sockets to the rsync port.
Domain allowed access.
Make a TCP connection to the rsync port.
Domain allowed access.
Send rsync_client packets.
Domain allowed access.
Do not audit attempts to send rsync_client packets.
Domain to not audit.
Receive rsync_client packets.
Domain allowed access.
Do not audit attempts to receive rsync_client packets.
Domain allowed access.
Send and receive rsync_client packets.
Domain allowed access.
Do not audit attempts to send and receive rsync_client packets.
Domain to not audit.
Relabel packets to rsync_client the packet type.
Domain allowed access.
Send rsync_server packets.
Domain allowed access.
Do not audit attempts to send rsync_server packets.
Domain to not audit.
Receive rsync_server packets.
Domain allowed access.
Do not audit attempts to receive rsync_server packets.
Domain allowed access.
Send and receive rsync_server packets.
Domain allowed access.
Do not audit attempts to send and receive rsync_server packets.
Domain to not audit.
Relabel packets to rsync_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rwho port.
Domain allowed access.
Send UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rwho port.
Domain to not audit.
Receive UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rwho port.
Domain to not audit.
Send and receive UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rwho port.
Domain to not audit.
Bind TCP sockets to the rwho port.
Domain allowed access.
Bind UDP sockets to the rwho port.
Domain allowed access.
Make a TCP connection to the rwho port.
Domain allowed access.
Send rwho_client packets.
Domain allowed access.
Do not audit attempts to send rwho_client packets.
Domain to not audit.
Receive rwho_client packets.
Domain allowed access.
Do not audit attempts to receive rwho_client packets.
Domain allowed access.
Send and receive rwho_client packets.
Domain allowed access.
Do not audit attempts to send and receive rwho_client packets.
Domain to not audit.
Relabel packets to rwho_client the packet type.
Domain allowed access.
Send rwho_server packets.
Domain allowed access.
Do not audit attempts to send rwho_server packets.
Domain to not audit.
Receive rwho_server packets.
Domain allowed access.
Do not audit attempts to receive rwho_server packets.
Domain allowed access.
Send and receive rwho_server packets.
Domain allowed access.
Do not audit attempts to send and receive rwho_server packets.
Domain to not audit.
Relabel packets to rwho_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sap port.
Domain allowed access.
Send UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sap port.
Domain to not audit.
Receive UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sap port.
Domain to not audit.
Send and receive UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sap port.
Domain to not audit.
Bind TCP sockets to the sap port.
Domain allowed access.
Bind UDP sockets to the sap port.
Domain allowed access.
Make a TCP connection to the sap port.
Domain allowed access.
Send sap_client packets.
Domain allowed access.
Do not audit attempts to send sap_client packets.
Domain to not audit.
Receive sap_client packets.
Domain allowed access.
Do not audit attempts to receive sap_client packets.
Domain allowed access.
Send and receive sap_client packets.
Domain allowed access.
Do not audit attempts to send and receive sap_client packets.
Domain to not audit.
Relabel packets to sap_client the packet type.
Domain allowed access.
Send sap_server packets.
Domain allowed access.
Do not audit attempts to send sap_server packets.
Domain to not audit.
Receive sap_server packets.
Domain allowed access.
Do not audit attempts to receive sap_server packets.
Domain allowed access.
Send and receive sap_server packets.
Domain allowed access.
Do not audit attempts to send and receive sap_server packets.
Domain to not audit.
Relabel packets to sap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the saphostctrl port.
Domain allowed access.
Send UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the saphostctrl port.
Domain to not audit.
Receive UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the saphostctrl port.
Domain to not audit.
Send and receive UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the saphostctrl port.
Domain to not audit.
Bind TCP sockets to the saphostctrl port.
Domain allowed access.
Bind UDP sockets to the saphostctrl port.
Domain allowed access.
Make a TCP connection to the saphostctrl port.
Domain allowed access.
Send saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to send saphostctrl_client packets.
Domain to not audit.
Receive saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to receive saphostctrl_client packets.
Domain allowed access.
Send and receive saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to send and receive saphostctrl_client packets.
Domain to not audit.
Relabel packets to saphostctrl_client the packet type.
Domain allowed access.
Send saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to send saphostctrl_server packets.
Domain to not audit.
Receive saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to receive saphostctrl_server packets.
Domain allowed access.
Send and receive saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to send and receive saphostctrl_server packets.
Domain to not audit.
Relabel packets to saphostctrl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sieve port.
Domain allowed access.
Send UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sieve port.
Domain to not audit.
Receive UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sieve port.
Domain to not audit.
Send and receive UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sieve port.
Domain to not audit.
Bind TCP sockets to the sieve port.
Domain allowed access.
Bind UDP sockets to the sieve port.
Domain allowed access.
Make a TCP connection to the sieve port.
Domain allowed access.
Send sieve_client packets.
Domain allowed access.
Do not audit attempts to send sieve_client packets.
Domain to not audit.
Receive sieve_client packets.
Domain allowed access.
Do not audit attempts to receive sieve_client packets.
Domain allowed access.
Send and receive sieve_client packets.
Domain allowed access.
Do not audit attempts to send and receive sieve_client packets.
Domain to not audit.
Relabel packets to sieve_client the packet type.
Domain allowed access.
Send sieve_server packets.
Domain allowed access.
Do not audit attempts to send sieve_server packets.
Domain to not audit.
Receive sieve_server packets.
Domain allowed access.
Do not audit attempts to receive sieve_server packets.
Domain allowed access.
Send and receive sieve_server packets.
Domain allowed access.
Do not audit attempts to send and receive sieve_server packets.
Domain to not audit.
Relabel packets to sieve_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sip port.
Domain allowed access.
Send UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sip port.
Domain to not audit.
Receive UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sip port.
Domain to not audit.
Send and receive UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sip port.
Domain to not audit.
Bind TCP sockets to the sip port.
Domain allowed access.
Bind UDP sockets to the sip port.
Domain allowed access.
Make a TCP connection to the sip port.
Domain allowed access.
Send sip_client packets.
Domain allowed access.
Do not audit attempts to send sip_client packets.
Domain to not audit.
Receive sip_client packets.
Domain allowed access.
Do not audit attempts to receive sip_client packets.
Domain allowed access.
Send and receive sip_client packets.
Domain allowed access.
Do not audit attempts to send and receive sip_client packets.
Domain to not audit.
Relabel packets to sip_client the packet type.
Domain allowed access.
Send sip_server packets.
Domain allowed access.
Do not audit attempts to send sip_server packets.
Domain to not audit.
Receive sip_server packets.
Domain allowed access.
Do not audit attempts to receive sip_server packets.
Domain allowed access.
Send and receive sip_server packets.
Domain allowed access.
Do not audit attempts to send and receive sip_server packets.
Domain to not audit.
Relabel packets to sip_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sixxsconfig port.
Domain allowed access.
Send UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sixxsconfig port.
Domain to not audit.
Receive UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
Domain to not audit.
Send and receive UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
Domain to not audit.
Bind TCP sockets to the sixxsconfig port.
Domain allowed access.
Bind UDP sockets to the sixxsconfig port.
Domain allowed access.
Make a TCP connection to the sixxsconfig port.
Domain allowed access.
Send sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to send sixxsconfig_client packets.
Domain to not audit.
Receive sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to receive sixxsconfig_client packets.
Domain allowed access.
Send and receive sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to send and receive sixxsconfig_client packets.
Domain to not audit.
Relabel packets to sixxsconfig_client the packet type.
Domain allowed access.
Send sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to send sixxsconfig_server packets.
Domain to not audit.
Receive sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to receive sixxsconfig_server packets.
Domain allowed access.
Send and receive sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to send and receive sixxsconfig_server packets.
Domain to not audit.
Relabel packets to sixxsconfig_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the smbd port.
Domain allowed access.
Send UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the smbd port.
Domain to not audit.
Receive UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the smbd port.
Domain to not audit.
Send and receive UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the smbd port.
Domain to not audit.
Bind TCP sockets to the smbd port.
Domain allowed access.
Bind UDP sockets to the smbd port.
Domain allowed access.
Make a TCP connection to the smbd port.
Domain allowed access.
Send smbd_client packets.
Domain allowed access.
Do not audit attempts to send smbd_client packets.
Domain to not audit.
Receive smbd_client packets.
Domain allowed access.
Do not audit attempts to receive smbd_client packets.
Domain allowed access.
Send and receive smbd_client packets.
Domain allowed access.
Do not audit attempts to send and receive smbd_client packets.
Domain to not audit.
Relabel packets to smbd_client the packet type.
Domain allowed access.
Send smbd_server packets.
Domain allowed access.
Do not audit attempts to send smbd_server packets.
Domain to not audit.
Receive smbd_server packets.
Domain allowed access.
Do not audit attempts to receive smbd_server packets.
Domain allowed access.
Send and receive smbd_server packets.
Domain allowed access.
Do not audit attempts to send and receive smbd_server packets.
Domain to not audit.
Relabel packets to smbd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the smtp port.
Domain allowed access.
Send UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the smtp port.
Domain to not audit.
Receive UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the smtp port.
Domain to not audit.
Send and receive UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the smtp port.
Domain to not audit.
Bind TCP sockets to the smtp port.
Domain allowed access.
Bind UDP sockets to the smtp port.
Domain allowed access.
Make a TCP connection to the smtp port.
Domain allowed access.
Send smtp_client packets.
Domain allowed access.
Do not audit attempts to send smtp_client packets.
Domain to not audit.
Receive smtp_client packets.
Domain allowed access.
Do not audit attempts to receive smtp_client packets.
Domain allowed access.
Send and receive smtp_client packets.
Domain allowed access.
Do not audit attempts to send and receive smtp_client packets.
Domain to not audit.
Relabel packets to smtp_client the packet type.
Domain allowed access.
Send smtp_server packets.
Domain allowed access.
Do not audit attempts to send smtp_server packets.
Domain to not audit.
Receive smtp_server packets.
Domain allowed access.
Do not audit attempts to receive smtp_server packets.
Domain allowed access.
Send and receive smtp_server packets.
Domain allowed access.
Do not audit attempts to send and receive smtp_server packets.
Domain to not audit.
Relabel packets to smtp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the snmp port.
Domain allowed access.
Send UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the snmp port.
Domain to not audit.
Receive UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the snmp port.
Domain to not audit.
Send and receive UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the snmp port.
Domain to not audit.
Bind TCP sockets to the snmp port.
Domain allowed access.
Bind UDP sockets to the snmp port.
Domain allowed access.
Make a TCP connection to the snmp port.
Domain allowed access.
Send snmp_client packets.
Domain allowed access.
Do not audit attempts to send snmp_client packets.
Domain to not audit.
Receive snmp_client packets.
Domain allowed access.
Do not audit attempts to receive snmp_client packets.
Domain allowed access.
Send and receive snmp_client packets.
Domain allowed access.
Do not audit attempts to send and receive snmp_client packets.
Domain to not audit.
Relabel packets to snmp_client the packet type.
Domain allowed access.
Send snmp_server packets.
Domain allowed access.
Do not audit attempts to send snmp_server packets.
Domain to not audit.
Receive snmp_server packets.
Domain allowed access.
Do not audit attempts to receive snmp_server packets.
Domain allowed access.
Send and receive snmp_server packets.
Domain allowed access.
Do not audit attempts to send and receive snmp_server packets.
Domain to not audit.
Relabel packets to snmp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the soundd port.
Domain allowed access.
Send UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the soundd port.
Domain to not audit.
Receive UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the soundd port.
Domain to not audit.
Send and receive UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the soundd port.
Domain to not audit.
Bind TCP sockets to the soundd port.
Domain allowed access.
Bind UDP sockets to the soundd port.
Domain allowed access.
Make a TCP connection to the soundd port.
Domain allowed access.
Send soundd_client packets.
Domain allowed access.
Do not audit attempts to send soundd_client packets.
Domain to not audit.
Receive soundd_client packets.
Domain allowed access.
Do not audit attempts to receive soundd_client packets.
Domain allowed access.
Send and receive soundd_client packets.
Domain allowed access.
Do not audit attempts to send and receive soundd_client packets.
Domain to not audit.
Relabel packets to soundd_client the packet type.
Domain allowed access.
Send soundd_server packets.
Domain allowed access.
Do not audit attempts to send soundd_server packets.
Domain to not audit.
Receive soundd_server packets.
Domain allowed access.
Do not audit attempts to receive soundd_server packets.
Domain allowed access.
Send and receive soundd_server packets.
Domain allowed access.
Do not audit attempts to send and receive soundd_server packets.
Domain to not audit.
Relabel packets to soundd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the spamd port.
Domain allowed access.
Send UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the spamd port.
Domain to not audit.
Receive UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the spamd port.
Domain to not audit.
Send and receive UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the spamd port.
Domain to not audit.
Bind TCP sockets to the spamd port.
Domain allowed access.
Bind UDP sockets to the spamd port.
Domain allowed access.
Make a TCP connection to the spamd port.
Domain allowed access.
Send spamd_client packets.
Domain allowed access.
Do not audit attempts to send spamd_client packets.
Domain to not audit.
Receive spamd_client packets.
Domain allowed access.
Do not audit attempts to receive spamd_client packets.
Domain allowed access.
Send and receive spamd_client packets.
Domain allowed access.
Do not audit attempts to send and receive spamd_client packets.
Domain to not audit.
Relabel packets to spamd_client the packet type.
Domain allowed access.
Send spamd_server packets.
Domain allowed access.
Do not audit attempts to send spamd_server packets.
Domain to not audit.
Receive spamd_server packets.
Domain allowed access.
Do not audit attempts to receive spamd_server packets.
Domain allowed access.
Send and receive spamd_server packets.
Domain allowed access.
Do not audit attempts to send and receive spamd_server packets.
Domain to not audit.
Relabel packets to spamd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the speech port.
Domain allowed access.
Send UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the speech port.
Domain to not audit.
Receive UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the speech port.
Domain to not audit.
Send and receive UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the speech port.
Domain to not audit.
Bind TCP sockets to the speech port.
Domain allowed access.
Bind UDP sockets to the speech port.
Domain allowed access.
Make a TCP connection to the speech port.
Domain allowed access.
Send speech_client packets.
Domain allowed access.
Do not audit attempts to send speech_client packets.
Domain to not audit.
Receive speech_client packets.
Domain allowed access.
Do not audit attempts to receive speech_client packets.
Domain allowed access.
Send and receive speech_client packets.
Domain allowed access.
Do not audit attempts to send and receive speech_client packets.
Domain to not audit.
Relabel packets to speech_client the packet type.
Domain allowed access.
Send speech_server packets.
Domain allowed access.
Do not audit attempts to send speech_server packets.
Domain to not audit.
Receive speech_server packets.
Domain allowed access.
Do not audit attempts to receive speech_server packets.
Domain allowed access.
Send and receive speech_server packets.
Domain allowed access.
Do not audit attempts to send and receive speech_server packets.
Domain to not audit.
Relabel packets to speech_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the squid port.
Domain allowed access.
Send UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the squid port.
Domain to not audit.
Receive UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the squid port.
Domain to not audit.
Send and receive UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the squid port.
Domain to not audit.
Bind TCP sockets to the squid port.
Domain allowed access.
Bind UDP sockets to the squid port.
Domain allowed access.
Make a TCP connection to the squid port.
Domain allowed access.
Send squid_client packets.
Domain allowed access.
Do not audit attempts to send squid_client packets.
Domain to not audit.
Receive squid_client packets.
Domain allowed access.
Do not audit attempts to receive squid_client packets.
Domain allowed access.
Send and receive squid_client packets.
Domain allowed access.
Do not audit attempts to send and receive squid_client packets.
Domain to not audit.
Relabel packets to squid_client the packet type.
Domain allowed access.
Send squid_server packets.
Domain allowed access.
Do not audit attempts to send squid_server packets.
Domain to not audit.
Receive squid_server packets.
Domain allowed access.
Do not audit attempts to receive squid_server packets.
Domain allowed access.
Send and receive squid_server packets.
Domain allowed access.
Do not audit attempts to send and receive squid_server packets.
Domain to not audit.
Relabel packets to squid_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ssh port.
Domain allowed access.
Send UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ssh port.
Domain to not audit.
Receive UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ssh port.
Domain to not audit.
Send and receive UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ssh port.
Domain to not audit.
Bind TCP sockets to the ssh port.
Domain allowed access.
Bind UDP sockets to the ssh port.
Domain allowed access.
Make a TCP connection to the ssh port.
Domain allowed access.
Send ssh_client packets.
Domain allowed access.
Do not audit attempts to send ssh_client packets.
Domain to not audit.
Receive ssh_client packets.
Domain allowed access.
Do not audit attempts to receive ssh_client packets.
Domain allowed access.
Send and receive ssh_client packets.
Domain allowed access.
Do not audit attempts to send and receive ssh_client packets.
Domain to not audit.
Relabel packets to ssh_client the packet type.
Domain allowed access.
Send ssh_server packets.
Domain allowed access.
Do not audit attempts to send ssh_server packets.
Domain to not audit.
Receive ssh_server packets.
Domain allowed access.
Do not audit attempts to receive ssh_server packets.
Domain allowed access.
Send and receive ssh_server packets.
Domain allowed access.
Do not audit attempts to send and receive ssh_server packets.
Domain to not audit.
Relabel packets to ssh_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the streaming port.
Domain allowed access.
Send UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the streaming port.
Domain to not audit.
Receive UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the streaming port.
Domain to not audit.
Send and receive UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the streaming port.
Domain to not audit.
Bind TCP sockets to the streaming port.
Domain allowed access.
Bind UDP sockets to the streaming port.
Domain allowed access.
Make a TCP connection to the streaming port.
Domain allowed access.
Send streaming_client packets.
Domain allowed access.
Do not audit attempts to send streaming_client packets.
Domain to not audit.
Receive streaming_client packets.
Domain allowed access.
Do not audit attempts to receive streaming_client packets.
Domain allowed access.
Send and receive streaming_client packets.
Domain allowed access.
Do not audit attempts to send and receive streaming_client packets.
Domain to not audit.
Relabel packets to streaming_client the packet type.
Domain allowed access.
Send streaming_server packets.
Domain allowed access.
Do not audit attempts to send streaming_server packets.
Domain to not audit.
Receive streaming_server packets.
Domain allowed access.
Do not audit attempts to receive streaming_server packets.
Domain allowed access.
Send and receive streaming_server packets.
Domain allowed access.
Do not audit attempts to send and receive streaming_server packets.
Domain to not audit.
Relabel packets to streaming_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the svn port.
Domain allowed access.
Send UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the svn port.
Domain to not audit.
Receive UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the svn port.
Domain to not audit.
Send and receive UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the svn port.
Domain to not audit.
Bind TCP sockets to the svn port.
Domain allowed access.
Bind UDP sockets to the svn port.
Domain allowed access.
Make a TCP connection to the svn port.
Domain allowed access.
Send svn_client packets.
Domain allowed access.
Do not audit attempts to send svn_client packets.
Domain to not audit.
Receive svn_client packets.
Domain allowed access.
Do not audit attempts to receive svn_client packets.
Domain allowed access.
Send and receive svn_client packets.
Domain allowed access.
Do not audit attempts to send and receive svn_client packets.
Domain to not audit.
Relabel packets to svn_client the packet type.
Domain allowed access.
Send svn_server packets.
Domain allowed access.
Do not audit attempts to send svn_server packets.
Domain to not audit.
Receive svn_server packets.
Domain allowed access.
Do not audit attempts to receive svn_server packets.
Domain allowed access.
Send and receive svn_server packets.
Domain allowed access.
Do not audit attempts to send and receive svn_server packets.
Domain to not audit.
Relabel packets to svn_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the swat port.
Domain allowed access.
Send UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the swat port.
Domain to not audit.
Receive UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the swat port.
Domain to not audit.
Send and receive UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the swat port.
Domain to not audit.
Bind TCP sockets to the swat port.
Domain allowed access.
Bind UDP sockets to the swat port.
Domain allowed access.
Make a TCP connection to the swat port.
Domain allowed access.
Send swat_client packets.
Domain allowed access.
Do not audit attempts to send swat_client packets.
Domain to not audit.
Receive swat_client packets.
Domain allowed access.
Do not audit attempts to receive swat_client packets.
Domain allowed access.
Send and receive swat_client packets.
Domain allowed access.
Do not audit attempts to send and receive swat_client packets.
Domain to not audit.
Relabel packets to swat_client the packet type.
Domain allowed access.
Send swat_server packets.
Domain allowed access.
Do not audit attempts to send swat_server packets.
Domain to not audit.
Receive swat_server packets.
Domain allowed access.
Do not audit attempts to receive swat_server packets.
Domain allowed access.
Send and receive swat_server packets.
Domain allowed access.
Do not audit attempts to send and receive swat_server packets.
Domain to not audit.
Relabel packets to swat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sype port.
Domain allowed access.
Send UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sype port.
Domain to not audit.
Receive UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sype port.
Domain to not audit.
Send and receive UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sype port.
Domain to not audit.
Bind TCP sockets to the sype port.
Domain allowed access.
Bind UDP sockets to the sype port.
Domain allowed access.
Make a TCP connection to the sype port.
Domain allowed access.
Send sype_client packets.
Domain allowed access.
Do not audit attempts to send sype_client packets.
Domain to not audit.
Receive sype_client packets.
Domain allowed access.
Do not audit attempts to receive sype_client packets.
Domain allowed access.
Send and receive sype_client packets.
Domain allowed access.
Do not audit attempts to send and receive sype_client packets.
Domain to not audit.
Relabel packets to sype_client the packet type.
Domain allowed access.
Send sype_server packets.
Domain allowed access.
Do not audit attempts to send sype_server packets.
Domain to not audit.
Receive sype_server packets.
Domain allowed access.
Do not audit attempts to receive sype_server packets.
Domain allowed access.
Send and receive sype_server packets.
Domain allowed access.
Do not audit attempts to send and receive sype_server packets.
Domain to not audit.
Relabel packets to sype_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the syslogd port.
Domain allowed access.
Send UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the syslogd port.
Domain to not audit.
Receive UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the syslogd port.
Domain to not audit.
Send and receive UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
Domain to not audit.
Bind TCP sockets to the syslogd port.
Domain allowed access.
Bind UDP sockets to the syslogd port.
Domain allowed access.
Make a TCP connection to the syslogd port.
Domain allowed access.
Send syslogd_client packets.
Domain allowed access.
Do not audit attempts to send syslogd_client packets.
Domain to not audit.
Receive syslogd_client packets.
Domain allowed access.
Do not audit attempts to receive syslogd_client packets.
Domain allowed access.
Send and receive syslogd_client packets.
Domain allowed access.
Do not audit attempts to send and receive syslogd_client packets.
Domain to not audit.
Relabel packets to syslogd_client the packet type.
Domain allowed access.
Send syslogd_server packets.
Domain allowed access.
Do not audit attempts to send syslogd_server packets.
Domain to not audit.
Receive syslogd_server packets.
Domain allowed access.
Do not audit attempts to receive syslogd_server packets.
Domain allowed access.
Send and receive syslogd_server packets.
Domain allowed access.
Do not audit attempts to send and receive syslogd_server packets.
Domain to not audit.
Relabel packets to syslogd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the telnetd port.
Domain allowed access.
Send UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the telnetd port.
Domain to not audit.
Receive UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the telnetd port.
Domain to not audit.
Send and receive UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
Domain to not audit.
Bind TCP sockets to the telnetd port.
Domain allowed access.
Bind UDP sockets to the telnetd port.
Domain allowed access.
Make a TCP connection to the telnetd port.
Domain allowed access.
Send telnetd_client packets.
Domain allowed access.
Do not audit attempts to send telnetd_client packets.
Domain to not audit.
Receive telnetd_client packets.
Domain allowed access.
Do not audit attempts to receive telnetd_client packets.
Domain allowed access.
Send and receive telnetd_client packets.
Domain allowed access.
Do not audit attempts to send and receive telnetd_client packets.
Domain to not audit.
Relabel packets to telnetd_client the packet type.
Domain allowed access.
Send telnetd_server packets.
Domain allowed access.
Do not audit attempts to send telnetd_server packets.
Domain to not audit.
Receive telnetd_server packets.
Domain allowed access.
Do not audit attempts to receive telnetd_server packets.
Domain allowed access.
Send and receive telnetd_server packets.
Domain allowed access.
Do not audit attempts to send and receive telnetd_server packets.
Domain to not audit.
Relabel packets to telnetd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tftp port.
Domain allowed access.
Send UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tftp port.
Domain to not audit.
Receive UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tftp port.
Domain to not audit.
Send and receive UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tftp port.
Domain to not audit.
Bind TCP sockets to the tftp port.
Domain allowed access.
Bind UDP sockets to the tftp port.
Domain allowed access.
Make a TCP connection to the tftp port.
Domain allowed access.
Send tftp_client packets.
Domain allowed access.
Do not audit attempts to send tftp_client packets.
Domain to not audit.
Receive tftp_client packets.
Domain allowed access.
Do not audit attempts to receive tftp_client packets.
Domain allowed access.
Send and receive tftp_client packets.
Domain allowed access.
Do not audit attempts to send and receive tftp_client packets.
Domain to not audit.
Relabel packets to tftp_client the packet type.
Domain allowed access.
Send tftp_server packets.
Domain allowed access.
Do not audit attempts to send tftp_server packets.
Domain to not audit.
Receive tftp_server packets.
Domain allowed access.
Do not audit attempts to receive tftp_server packets.
Domain allowed access.
Send and receive tftp_server packets.
Domain allowed access.
Do not audit attempts to send and receive tftp_server packets.
Domain to not audit.
Relabel packets to tftp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tor port.
Domain allowed access.
Send UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tor port.
Domain to not audit.
Receive UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tor port.
Domain to not audit.
Send and receive UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tor port.
Domain to not audit.
Bind TCP sockets to the tor port.
Domain allowed access.
Bind UDP sockets to the tor port.
Domain allowed access.
Make a TCP connection to the tor port.
Domain allowed access.
Send tor_client packets.
Domain allowed access.
Do not audit attempts to send tor_client packets.
Domain to not audit.
Receive tor_client packets.
Domain allowed access.
Do not audit attempts to receive tor_client packets.
Domain allowed access.
Send and receive tor_client packets.
Domain allowed access.
Do not audit attempts to send and receive tor_client packets.
Domain to not audit.
Relabel packets to tor_client the packet type.
Domain allowed access.
Send tor_server packets.
Domain allowed access.
Do not audit attempts to send tor_server packets.
Domain to not audit.
Receive tor_server packets.
Domain allowed access.
Do not audit attempts to receive tor_server packets.
Domain allowed access.
Send and receive tor_server packets.
Domain allowed access.
Do not audit attempts to send and receive tor_server packets.
Domain to not audit.
Relabel packets to tor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tor_socks port.
Domain allowed access.
Send UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tor_socks port.
Domain to not audit.
Receive UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tor_socks port.
Domain to not audit.
Send and receive UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tor_socks port.
Domain to not audit.
Bind TCP sockets to the tor_socks port.
Domain allowed access.
Bind UDP sockets to the tor_socks port.
Domain allowed access.
Make a TCP connection to the tor_socks port.
Domain allowed access.
Send tor_socks_client packets.
Domain allowed access.
Do not audit attempts to send tor_socks_client packets.
Domain to not audit.
Receive tor_socks_client packets.
Domain allowed access.
Do not audit attempts to receive tor_socks_client packets.
Domain allowed access.
Send and receive tor_socks_client packets.
Domain allowed access.
Do not audit attempts to send and receive tor_socks_client packets.
Domain to not audit.
Relabel packets to tor_socks_client the packet type.
Domain allowed access.
Send tor_socks_server packets.
Domain allowed access.
Do not audit attempts to send tor_socks_server packets.
Domain to not audit.
Receive tor_socks_server packets.
Domain allowed access.
Do not audit attempts to receive tor_socks_server packets.
Domain allowed access.
Send and receive tor_socks_server packets.
Domain allowed access.
Do not audit attempts to send and receive tor_socks_server packets.
Domain to not audit.
Relabel packets to tor_socks_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the traceroute port.
Domain allowed access.
Send UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the traceroute port.
Domain to not audit.
Receive UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the traceroute port.
Domain to not audit.
Send and receive UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
Domain to not audit.
Bind TCP sockets to the traceroute port.
Domain allowed access.
Bind UDP sockets to the traceroute port.
Domain allowed access.
Make a TCP connection to the traceroute port.
Domain allowed access.
Send traceroute_client packets.
Domain allowed access.
Do not audit attempts to send traceroute_client packets.
Domain to not audit.
Receive traceroute_client packets.
Domain allowed access.
Do not audit attempts to receive traceroute_client packets.
Domain allowed access.
Send and receive traceroute_client packets.
Domain allowed access.
Do not audit attempts to send and receive traceroute_client packets.
Domain to not audit.
Relabel packets to traceroute_client the packet type.
Domain allowed access.
Send traceroute_server packets.
Domain allowed access.
Do not audit attempts to send traceroute_server packets.
Domain to not audit.
Receive traceroute_server packets.
Domain allowed access.
Do not audit attempts to receive traceroute_server packets.
Domain allowed access.
Send and receive traceroute_server packets.
Domain allowed access.
Do not audit attempts to send and receive traceroute_server packets.
Domain to not audit.
Relabel packets to traceroute_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the transproxy port.
Domain allowed access.
Send UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the transproxy port.
Domain to not audit.
Receive UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the transproxy port.
Domain to not audit.
Send and receive UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
Domain to not audit.
Bind TCP sockets to the transproxy port.
Domain allowed access.
Bind UDP sockets to the transproxy port.
Domain allowed access.
Make a TCP connection to the transproxy port.
Domain allowed access.
Send transproxy_client packets.
Domain allowed access.
Do not audit attempts to send transproxy_client packets.
Domain to not audit.
Receive transproxy_client packets.
Domain allowed access.
Do not audit attempts to receive transproxy_client packets.
Domain allowed access.
Send and receive transproxy_client packets.
Domain allowed access.
Do not audit attempts to send and receive transproxy_client packets.
Domain to not audit.
Relabel packets to transproxy_client the packet type.
Domain allowed access.
Send transproxy_server packets.
Domain allowed access.
Do not audit attempts to send transproxy_server packets.
Domain to not audit.
Receive transproxy_server packets.
Domain allowed access.
Do not audit attempts to receive transproxy_server packets.
Domain allowed access.
Send and receive transproxy_server packets.
Domain allowed access.
Do not audit attempts to send and receive transproxy_server packets.
Domain to not audit.
Relabel packets to transproxy_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ups port.
Domain allowed access.
Send UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ups port.
Domain to not audit.
Receive UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ups port.
Domain to not audit.
Send and receive UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ups port.
Domain to not audit.
Bind TCP sockets to the ups port.
Domain allowed access.
Bind UDP sockets to the ups port.
Domain allowed access.
Make a TCP connection to the ups port.
Domain allowed access.
Send ups_client packets.
Domain allowed access.
Do not audit attempts to send ups_client packets.
Domain to not audit.
Receive ups_client packets.
Domain allowed access.
Do not audit attempts to receive ups_client packets.
Domain allowed access.
Send and receive ups_client packets.
Domain allowed access.
Do not audit attempts to send and receive ups_client packets.
Domain to not audit.
Relabel packets to ups_client the packet type.
Domain allowed access.
Send ups_server packets.
Domain allowed access.
Do not audit attempts to send ups_server packets.
Domain to not audit.
Receive ups_server packets.
Domain allowed access.
Do not audit attempts to receive ups_server packets.
Domain allowed access.
Send and receive ups_server packets.
Domain allowed access.
Do not audit attempts to send and receive ups_server packets.
Domain to not audit.
Relabel packets to ups_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the uucpd port.
Domain allowed access.
Send UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the uucpd port.
Domain to not audit.
Receive UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the uucpd port.
Domain to not audit.
Send and receive UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
Domain to not audit.
Bind TCP sockets to the uucpd port.
Domain allowed access.
Bind UDP sockets to the uucpd port.
Domain allowed access.
Make a TCP connection to the uucpd port.
Domain allowed access.
Send uucpd_client packets.
Domain allowed access.
Do not audit attempts to send uucpd_client packets.
Domain to not audit.
Receive uucpd_client packets.
Domain allowed access.
Do not audit attempts to receive uucpd_client packets.
Domain allowed access.
Send and receive uucpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive uucpd_client packets.
Domain to not audit.
Relabel packets to uucpd_client the packet type.
Domain allowed access.
Send uucpd_server packets.
Domain allowed access.
Do not audit attempts to send uucpd_server packets.
Domain to not audit.
Receive uucpd_server packets.
Domain allowed access.
Do not audit attempts to receive uucpd_server packets.
Domain allowed access.
Send and receive uucpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive uucpd_server packets.
Domain to not audit.
Relabel packets to uucpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the varnishd port.
Domain allowed access.
Send UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the varnishd port.
Domain to not audit.
Receive UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the varnishd port.
Domain to not audit.
Send and receive UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
Domain to not audit.
Bind TCP sockets to the varnishd port.
Domain allowed access.
Bind UDP sockets to the varnishd port.
Domain allowed access.
Make a TCP connection to the varnishd port.
Domain allowed access.
Send varnishd_client packets.
Domain allowed access.
Do not audit attempts to send varnishd_client packets.
Domain to not audit.
Receive varnishd_client packets.
Domain allowed access.
Do not audit attempts to receive varnishd_client packets.
Domain allowed access.
Send and receive varnishd_client packets.
Domain allowed access.
Do not audit attempts to send and receive varnishd_client packets.
Domain to not audit.
Relabel packets to varnishd_client the packet type.
Domain allowed access.
Send varnishd_server packets.
Domain allowed access.
Do not audit attempts to send varnishd_server packets.
Domain to not audit.
Receive varnishd_server packets.
Domain allowed access.
Do not audit attempts to receive varnishd_server packets.
Domain allowed access.
Send and receive varnishd_server packets.
Domain allowed access.
Do not audit attempts to send and receive varnishd_server packets.
Domain to not audit.
Relabel packets to varnishd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the virt port.
Domain allowed access.
Send UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the virt port.
Domain to not audit.
Receive UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the virt port.
Domain to not audit.
Send and receive UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the virt port.
Domain to not audit.
Bind TCP sockets to the virt port.
Domain allowed access.
Bind UDP sockets to the virt port.
Domain allowed access.
Make a TCP connection to the virt port.
Domain allowed access.
Send virt_client packets.
Domain allowed access.
Do not audit attempts to send virt_client packets.
Domain to not audit.
Receive virt_client packets.
Domain allowed access.
Do not audit attempts to receive virt_client packets.
Domain allowed access.
Send and receive virt_client packets.
Domain allowed access.
Do not audit attempts to send and receive virt_client packets.
Domain to not audit.
Relabel packets to virt_client the packet type.
Domain allowed access.
Send virt_server packets.
Domain allowed access.
Do not audit attempts to send virt_server packets.
Domain to not audit.
Receive virt_server packets.
Domain allowed access.
Do not audit attempts to receive virt_server packets.
Domain allowed access.
Send and receive virt_server packets.
Domain allowed access.
Do not audit attempts to send and receive virt_server packets.
Domain to not audit.
Relabel packets to virt_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the virt_migration port.
Domain allowed access.
Send UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the virt_migration port.
Domain to not audit.
Receive UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the virt_migration port.
Domain to not audit.
Send and receive UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
Domain to not audit.
Bind TCP sockets to the virt_migration port.
Domain allowed access.
Bind UDP sockets to the virt_migration port.
Domain allowed access.
Make a TCP connection to the virt_migration port.
Domain allowed access.
Send virt_migration_client packets.
Domain allowed access.
Do not audit attempts to send virt_migration_client packets.
Domain to not audit.
Receive virt_migration_client packets.
Domain allowed access.
Do not audit attempts to receive virt_migration_client packets.
Domain allowed access.
Send and receive virt_migration_client packets.
Domain allowed access.
Do not audit attempts to send and receive virt_migration_client packets.
Domain to not audit.
Relabel packets to virt_migration_client the packet type.
Domain allowed access.
Send virt_migration_server packets.
Domain allowed access.
Do not audit attempts to send virt_migration_server packets.
Domain to not audit.
Receive virt_migration_server packets.
Domain allowed access.
Do not audit attempts to receive virt_migration_server packets.
Domain allowed access.
Send and receive virt_migration_server packets.
Domain allowed access.
Do not audit attempts to send and receive virt_migration_server packets.
Domain to not audit.
Relabel packets to virt_migration_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the vnc port.
Domain allowed access.
Send UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the vnc port.
Domain to not audit.
Receive UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the vnc port.
Domain to not audit.
Send and receive UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the vnc port.
Domain to not audit.
Bind TCP sockets to the vnc port.
Domain allowed access.
Bind UDP sockets to the vnc port.
Domain allowed access.
Make a TCP connection to the vnc port.
Domain allowed access.
Send vnc_client packets.
Domain allowed access.
Do not audit attempts to send vnc_client packets.
Domain to not audit.
Receive vnc_client packets.
Domain allowed access.
Do not audit attempts to receive vnc_client packets.
Domain allowed access.
Send and receive vnc_client packets.
Domain allowed access.
Do not audit attempts to send and receive vnc_client packets.
Domain to not audit.
Relabel packets to vnc_client the packet type.
Domain allowed access.
Send vnc_server packets.
Domain allowed access.
Do not audit attempts to send vnc_server packets.
Domain to not audit.
Receive vnc_server packets.
Domain allowed access.
Do not audit attempts to receive vnc_server packets.
Domain allowed access.
Send and receive vnc_server packets.
Domain allowed access.
Do not audit attempts to send and receive vnc_server packets.
Domain to not audit.
Relabel packets to vnc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the wccp port.
Domain allowed access.
Send UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the wccp port.
Domain to not audit.
Receive UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the wccp port.
Domain to not audit.
Send and receive UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the wccp port.
Domain to not audit.
Bind TCP sockets to the wccp port.
Domain allowed access.
Bind UDP sockets to the wccp port.
Domain allowed access.
Make a TCP connection to the wccp port.
Domain allowed access.
Send wccp_client packets.
Domain allowed access.
Do not audit attempts to send wccp_client packets.
Domain to not audit.
Receive wccp_client packets.
Domain allowed access.
Do not audit attempts to receive wccp_client packets.
Domain allowed access.
Send and receive wccp_client packets.
Domain allowed access.
Do not audit attempts to send and receive wccp_client packets.
Domain to not audit.
Relabel packets to wccp_client the packet type.
Domain allowed access.
Send wccp_server packets.
Domain allowed access.
Do not audit attempts to send wccp_server packets.
Domain to not audit.
Receive wccp_server packets.
Domain allowed access.
Do not audit attempts to receive wccp_server packets.
Domain allowed access.
Send and receive wccp_server packets.
Domain allowed access.
Do not audit attempts to send and receive wccp_server packets.
Domain to not audit.
Relabel packets to wccp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the websm port.
Domain allowed access.
Send UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the websm port.
Domain to not audit.
Receive UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the websm port.
Domain to not audit.
Send and receive UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the websm port.
Domain to not audit.
Bind TCP sockets to the websm port.
Domain allowed access.
Bind UDP sockets to the websm port.
Domain allowed access.
Make a TCP connection to the websm port.
Domain allowed access.
Send websm_client packets.
Domain allowed access.
Do not audit attempts to send websm_client packets.
Domain to not audit.
Receive websm_client packets.
Domain allowed access.
Do not audit attempts to receive websm_client packets.
Domain allowed access.
Send and receive websm_client packets.
Domain allowed access.
Do not audit attempts to send and receive websm_client packets.
Domain to not audit.
Relabel packets to websm_client the packet type.
Domain allowed access.
Send websm_server packets.
Domain allowed access.
Do not audit attempts to send websm_server packets.
Domain to not audit.
Receive websm_server packets.
Domain allowed access.
Do not audit attempts to receive websm_server packets.
Domain allowed access.
Send and receive websm_server packets.
Domain allowed access.
Do not audit attempts to send and receive websm_server packets.
Domain to not audit.
Relabel packets to websm_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the whois port.
Domain allowed access.
Send UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the whois port.
Domain to not audit.
Receive UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the whois port.
Domain to not audit.
Send and receive UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the whois port.
Domain to not audit.
Bind TCP sockets to the whois port.
Domain allowed access.
Bind UDP sockets to the whois port.
Domain allowed access.
Make a TCP connection to the whois port.
Domain allowed access.
Send whois_client packets.
Domain allowed access.
Do not audit attempts to send whois_client packets.
Domain to not audit.
Receive whois_client packets.
Domain allowed access.
Do not audit attempts to receive whois_client packets.
Domain allowed access.
Send and receive whois_client packets.
Domain allowed access.
Do not audit attempts to send and receive whois_client packets.
Domain to not audit.
Relabel packets to whois_client the packet type.
Domain allowed access.
Send whois_server packets.
Domain allowed access.
Do not audit attempts to send whois_server packets.
Domain to not audit.
Receive whois_server packets.
Domain allowed access.
Do not audit attempts to receive whois_server packets.
Domain allowed access.
Send and receive whois_server packets.
Domain allowed access.
Do not audit attempts to send and receive whois_server packets.
Domain to not audit.
Relabel packets to whois_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the winshadow port.
Domain allowed access.
Send UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the winshadow port.
Domain to not audit.
Receive UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the winshadow port.
Domain to not audit.
Send and receive UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
Domain to not audit.
Bind TCP sockets to the winshadow port.
Domain allowed access.
Bind UDP sockets to the winshadow port.
Domain allowed access.
Make a TCP connection to the winshadow port.
Domain allowed access.
Send winshadow_client packets.
Domain allowed access.
Do not audit attempts to send winshadow_client packets.
Domain to not audit.
Receive winshadow_client packets.
Domain allowed access.
Do not audit attempts to receive winshadow_client packets.
Domain allowed access.
Send and receive winshadow_client packets.
Domain allowed access.
Do not audit attempts to send and receive winshadow_client packets.
Domain to not audit.
Relabel packets to winshadow_client the packet type.
Domain allowed access.
Send winshadow_server packets.
Domain allowed access.
Do not audit attempts to send winshadow_server packets.
Domain to not audit.
Receive winshadow_server packets.
Domain allowed access.
Do not audit attempts to receive winshadow_server packets.
Domain allowed access.
Send and receive winshadow_server packets.
Domain allowed access.
Do not audit attempts to send and receive winshadow_server packets.
Domain to not audit.
Relabel packets to winshadow_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xdmcp port.
Domain allowed access.
Send UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xdmcp port.
Domain to not audit.
Receive UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xdmcp port.
Domain to not audit.
Send and receive UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
Domain to not audit.
Bind TCP sockets to the xdmcp port.
Domain allowed access.
Bind UDP sockets to the xdmcp port.
Domain allowed access.
Make a TCP connection to the xdmcp port.
Domain allowed access.
Send xdmcp_client packets.
Domain allowed access.
Do not audit attempts to send xdmcp_client packets.
Domain to not audit.
Receive xdmcp_client packets.
Domain allowed access.
Do not audit attempts to receive xdmcp_client packets.
Domain allowed access.
Send and receive xdmcp_client packets.
Domain allowed access.
Do not audit attempts to send and receive xdmcp_client packets.
Domain to not audit.
Relabel packets to xdmcp_client the packet type.
Domain allowed access.
Send xdmcp_server packets.
Domain allowed access.
Do not audit attempts to send xdmcp_server packets.
Domain to not audit.
Receive xdmcp_server packets.
Domain allowed access.
Do not audit attempts to receive xdmcp_server packets.
Domain allowed access.
Send and receive xdmcp_server packets.
Domain allowed access.
Do not audit attempts to send and receive xdmcp_server packets.
Domain to not audit.
Relabel packets to xdmcp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xen port.
Domain allowed access.
Send UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xen port.
Domain to not audit.
Receive UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xen port.
Domain to not audit.
Send and receive UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xen port.
Domain to not audit.
Bind TCP sockets to the xen port.
Domain allowed access.
Bind UDP sockets to the xen port.
Domain allowed access.
Make a TCP connection to the xen port.
Domain allowed access.
Send xen_client packets.
Domain allowed access.
Do not audit attempts to send xen_client packets.
Domain to not audit.
Receive xen_client packets.
Domain allowed access.
Do not audit attempts to receive xen_client packets.
Domain allowed access.
Send and receive xen_client packets.
Domain allowed access.
Do not audit attempts to send and receive xen_client packets.
Domain to not audit.
Relabel packets to xen_client the packet type.
Domain allowed access.
Send xen_server packets.
Domain allowed access.
Do not audit attempts to send xen_server packets.
Domain to not audit.
Receive xen_server packets.
Domain allowed access.
Do not audit attempts to receive xen_server packets.
Domain allowed access.
Send and receive xen_server packets.
Domain allowed access.
Do not audit attempts to send and receive xen_server packets.
Domain to not audit.
Relabel packets to xen_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xfs port.
Domain allowed access.
Send UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xfs port.
Domain to not audit.
Receive UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xfs port.
Domain to not audit.
Send and receive UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xfs port.
Domain to not audit.
Bind TCP sockets to the xfs port.
Domain allowed access.
Bind UDP sockets to the xfs port.
Domain allowed access.
Make a TCP connection to the xfs port.
Domain allowed access.
Send xfs_client packets.
Domain allowed access.
Do not audit attempts to send xfs_client packets.
Domain to not audit.
Receive xfs_client packets.
Domain allowed access.
Do not audit attempts to receive xfs_client packets.
Domain allowed access.
Send and receive xfs_client packets.
Domain allowed access.
Do not audit attempts to send and receive xfs_client packets.
Domain to not audit.
Relabel packets to xfs_client the packet type.
Domain allowed access.
Send xfs_server packets.
Domain allowed access.
Do not audit attempts to send xfs_server packets.
Domain to not audit.
Receive xfs_server packets.
Domain allowed access.
Do not audit attempts to receive xfs_server packets.
Domain allowed access.
Send and receive xfs_server packets.
Domain allowed access.
Do not audit attempts to send and receive xfs_server packets.
Domain to not audit.
Relabel packets to xfs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xserver port.
Domain allowed access.
Send UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xserver port.
Domain to not audit.
Receive UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xserver port.
Domain to not audit.
Send and receive UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xserver port.
Domain to not audit.
Bind TCP sockets to the xserver port.
Domain allowed access.
Bind UDP sockets to the xserver port.
Domain allowed access.
Make a TCP connection to the xserver port.
Domain allowed access.
Send xserver_client packets.
Domain allowed access.
Do not audit attempts to send xserver_client packets.
Domain to not audit.
Receive xserver_client packets.
Domain allowed access.
Do not audit attempts to receive xserver_client packets.
Domain allowed access.
Send and receive xserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive xserver_client packets.
Domain to not audit.
Relabel packets to xserver_client the packet type.
Domain allowed access.
Send xserver_server packets.
Domain allowed access.
Do not audit attempts to send xserver_server packets.
Domain to not audit.
Receive xserver_server packets.
Domain allowed access.
Do not audit attempts to receive xserver_server packets.
Domain allowed access.
Send and receive xserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive xserver_server packets.
Domain to not audit.
Relabel packets to xserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zarafa port.
Domain allowed access.
Send UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zarafa port.
Domain to not audit.
Receive UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zarafa port.
Domain to not audit.
Send and receive UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
Domain to not audit.
Bind TCP sockets to the zarafa port.
Domain allowed access.
Bind UDP sockets to the zarafa port.
Domain allowed access.
Make a TCP connection to the zarafa port.
Domain allowed access.
Send zarafa_client packets.
Domain allowed access.
Do not audit attempts to send zarafa_client packets.
Domain to not audit.
Receive zarafa_client packets.
Domain allowed access.
Do not audit attempts to receive zarafa_client packets.
Domain allowed access.
Send and receive zarafa_client packets.
Domain allowed access.
Do not audit attempts to send and receive zarafa_client packets.
Domain to not audit.
Relabel packets to zarafa_client the packet type.
Domain allowed access.
Send zarafa_server packets.
Domain allowed access.
Do not audit attempts to send zarafa_server packets.
Domain to not audit.
Receive zarafa_server packets.
Domain allowed access.
Do not audit attempts to receive zarafa_server packets.
Domain allowed access.
Send and receive zarafa_server packets.
Domain allowed access.
Do not audit attempts to send and receive zarafa_server packets.
Domain to not audit.
Relabel packets to zarafa_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zabbix port.
Domain allowed access.
Send UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zabbix port.
Domain to not audit.
Receive UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zabbix port.
Domain to not audit.
Send and receive UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
Domain to not audit.
Bind TCP sockets to the zabbix port.
Domain allowed access.
Bind UDP sockets to the zabbix port.
Domain allowed access.
Make a TCP connection to the zabbix port.
Domain allowed access.
Send zabbix_client packets.
Domain allowed access.
Do not audit attempts to send zabbix_client packets.
Domain to not audit.
Receive zabbix_client packets.
Domain allowed access.
Do not audit attempts to receive zabbix_client packets.
Domain allowed access.
Send and receive zabbix_client packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_client packets.
Domain to not audit.
Relabel packets to zabbix_client the packet type.
Domain allowed access.
Send zabbix_server packets.
Domain allowed access.
Do not audit attempts to send zabbix_server packets.
Domain to not audit.
Receive zabbix_server packets.
Domain allowed access.
Do not audit attempts to receive zabbix_server packets.
Domain allowed access.
Send and receive zabbix_server packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_server packets.
Domain to not audit.
Relabel packets to zabbix_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zabbix_agent port.
Domain allowed access.
Send UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zabbix_agent port.
Domain to not audit.
Receive UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
Domain to not audit.
Send and receive UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
Domain to not audit.
Bind TCP sockets to the zabbix_agent port.
Domain allowed access.
Bind UDP sockets to the zabbix_agent port.
Domain allowed access.
Make a TCP connection to the zabbix_agent port.
Domain allowed access.
Send zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to send zabbix_agent_client packets.
Domain to not audit.
Receive zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to receive zabbix_agent_client packets.
Domain allowed access.
Send and receive zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_agent_client packets.
Domain to not audit.
Relabel packets to zabbix_agent_client the packet type.
Domain allowed access.
Send zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to send zabbix_agent_server packets.
Domain to not audit.
Receive zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to receive zabbix_agent_server packets.
Domain allowed access.
Send and receive zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_agent_server packets.
Domain to not audit.
Relabel packets to zabbix_agent_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zebra port.
Domain allowed access.
Send UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zebra port.
Domain to not audit.
Receive UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zebra port.
Domain to not audit.
Send and receive UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zebra port.
Domain to not audit.
Bind TCP sockets to the zebra port.
Domain allowed access.
Bind UDP sockets to the zebra port.
Domain allowed access.
Make a TCP connection to the zebra port.
Domain allowed access.
Send zebra_client packets.
Domain allowed access.
Do not audit attempts to send zebra_client packets.
Domain to not audit.
Receive zebra_client packets.
Domain allowed access.
Do not audit attempts to receive zebra_client packets.
Domain allowed access.
Send and receive zebra_client packets.
Domain allowed access.
Do not audit attempts to send and receive zebra_client packets.
Domain to not audit.
Relabel packets to zebra_client the packet type.
Domain allowed access.
Send zebra_server packets.
Domain allowed access.
Do not audit attempts to send zebra_server packets.
Domain to not audit.
Receive zebra_server packets.
Domain allowed access.
Do not audit attempts to receive zebra_server packets.
Domain allowed access.
Send and receive zebra_server packets.
Domain allowed access.
Do not audit attempts to send and receive zebra_server packets.
Domain to not audit.
Relabel packets to zebra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zented port.
Domain allowed access.
Send UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zented port.
Domain to not audit.
Receive UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zented port.
Domain to not audit.
Send and receive UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zented port.
Domain to not audit.
Bind TCP sockets to the zented port.
Domain allowed access.
Bind UDP sockets to the zented port.
Domain allowed access.
Make a TCP connection to the zented port.
Domain allowed access.
Send zented_client packets.
Domain allowed access.
Do not audit attempts to send zented_client packets.
Domain to not audit.
Receive zented_client packets.
Domain allowed access.
Do not audit attempts to receive zented_client packets.
Domain allowed access.
Send and receive zented_client packets.
Domain allowed access.
Do not audit attempts to send and receive zented_client packets.
Domain to not audit.
Relabel packets to zented_client the packet type.
Domain allowed access.
Send zented_server packets.
Domain allowed access.
Do not audit attempts to send zented_server packets.
Domain to not audit.
Receive zented_server packets.
Domain allowed access.
Do not audit attempts to receive zented_server packets.
Domain allowed access.
Send and receive zented_server packets.
Domain allowed access.
Do not audit attempts to send and receive zented_server packets.
Domain to not audit.
Relabel packets to zented_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zope port.
Domain allowed access.
Send UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zope port.
Domain to not audit.
Receive UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zope port.
Domain to not audit.
Send and receive UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zope port.
Domain to not audit.
Bind TCP sockets to the zope port.
Domain allowed access.
Bind UDP sockets to the zope port.
Domain allowed access.
Make a TCP connection to the zope port.
Domain allowed access.
Send zope_client packets.
Domain allowed access.
Do not audit attempts to send zope_client packets.
Domain to not audit.
Receive zope_client packets.
Domain allowed access.
Do not audit attempts to receive zope_client packets.
Domain allowed access.
Send and receive zope_client packets.
Domain allowed access.
Do not audit attempts to send and receive zope_client packets.
Domain to not audit.
Relabel packets to zope_client the packet type.
Domain allowed access.
Send zope_server packets.
Domain allowed access.
Do not audit attempts to send zope_server packets.
Domain to not audit.
Receive zope_server packets.
Domain allowed access.
Do not audit attempts to receive zope_server packets.
Domain allowed access.
Send and receive zope_server packets.
Domain allowed access.
Do not audit attempts to send and receive zope_server packets.
Domain to not audit.
Relabel packets to zope_server the packet type.
Domain allowed access.
Send and receive TCP network traffic on the lo interface.
Domain allowed access.
Send UDP network traffic on the lo interface.
Domain allowed access.
Receive UDP network traffic on the lo interface.
Domain allowed access.
Send and receive UDP network traffic on the lo interface.
Domain allowed access.
Send raw IP packets on the lo interface.
Domain allowed access.
Receive raw IP packets on the lo interface.
Domain allowed access.
Send and receive raw IP packets on the lo interface.
Domain allowed access.
Device nodes and interfaces for many basic system devices.
This module creates the device node concept and provides
the policy for many of the device files. Notable exceptions are
the mass storage and terminal devices that are covered by other
modules.
This module creates the concept of a device node. That is a
char or block device file, usually in /dev. All types that
are used to label device nodes should use the dev_node macro.
Additionally, this module controls access to three things:
- the device directories containing device nodes
- device nodes as a group
- individual access to specific device nodes covered by
this module.
Depended on by other required modules.
Make the specified type usable for device
nodes in a filesystem.
Make the specified type usable for device nodes
in a filesystem. Types used for device nodes that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running.
Example:
type mydev_t;
dev_node(mydev_t)
allow mydomain_t mydev_t:chr_file read_chr_file_perms;
Related interfaces:
Type to be used for device nodes.
Get attributes of device filesystems.
Domain allowed access.
Mount a filesystem on /dev
Domain allow access.
Allow full relabeling (to and from) of all device nodes.
Domain allowed to relabel.
List all of the device nodes in a device directory.
Domain allowed to list device nodes.
Set the attributes of /dev directories.
Domain allowed access.
Dontaudit attempts to list all device nodes.
Domain to dontaudit listing of device nodes.
Add entries to directories in /dev.
Domain allowed to add entries.
Add entries to directories in /dev.
Domain allowed to add entries.
Create a directory in the device directory.
Domain allowed to create the directory.
Delete a directory in the device directory.
Domain allowed to create the directory.
Manage of directories in /dev.
Domain allowed to relabel.
Allow full relabeling (to and from) of directories in /dev.
Domain allowed to relabel.
dontaudit getattr generic files in /dev.
Domain to not audit.
Read and write generic files in /dev.
Domain allowed access.
Delete generic files in /dev.
Domain allowed access.
Create a file in the device directory.
Domain allowed to create the files.
Dontaudit getattr on generic pipes.
Domain to dontaudit.
Allow getattr on generic block devices.
Domain allowed access.
Dontaudit getattr on generic block devices.
Domain to dontaudit access.
Dontaudit setattr on generic block devices.
Domain to dontaudit access.
Create generic block device files.
Domain allowed access.
Delete generic block device files.
Domain allowed access.
Allow getattr for generic character device files.
Domain allowed access.
Dontaudit getattr for generic character device files.
Domain to dontaudit access.
Dontaudit read for generic character device files.
Domain to dontaudit access.
Dontaudit read for generic character device files.
Domain to dontaudit access.
Dontaudit setattr for generic character device files.
Domain to dontaudit access.
Read and write generic character device files.
Domain allowed access.
Create generic character device files.
Domain allowed access.
Delete generic character device files.
Domain allowed access.
Do not audit attempts to set the attributes
of symbolic links in device directories (/dev).
Domain to not audit.
Read symbolic links in device directories.
Domain allowed access.
Create symbolic links in device directories.
Domain allowed access.
Delete symbolic links in device directories.
Domain allowed access.
Create, delete, read, and write symbolic links in device directories.
Domain allowed access.
Relabel symbolic links in device directories.
Domain allowed access.
Create, delete, read, and write device nodes in device directories.
Domain allowed access.
Dontaudit getattr for generic device files.
Domain to dontaudit access.
Dontaudit getattr for generic device files.
Domain to dontaudit access.
Create, delete, read, and write block device files.
Domain allowed access.
Create, delete, read, and write character device files.
Domain allowed access.
Create, read, and write device nodes. The node
will be transitioned to the type provided.
Domain allowed access.
Type to which the created node will be transitioned.
Object class(es) (single or set including {}) for which this
the transition will occur.
Create, read, and write device nodes. The node
will be transitioned to the type provided. This is
a temporary interface until devtmpfs functionality
fixed.
Domain allowed access.
Object class(es) (single or set including {}) for which this
the transition will occur.
Getattr on all block file device nodes.
Domain allowed access.
Dontaudit getattr on all block file device nodes.
Domain to dontaudit access.
Getattr on all character file device nodes.
Domain allowed access.
Dontaudit getattr on all character file device nodes.
Domain to dontaudit access.
Dontaudit getattr on all device nodes.
Domain to not audit.
Setattr on all block file device nodes.
Domain allowed access.
Setattr on all character file device nodes.
Domain allowed access.
Dontaudit read on all block file device nodes.
Domain to not audit.
Dontaudit write on all block file device nodes.
Domain to not audit.
Dontaudit read on all character file device nodes.
Domain to not audit.
Dontaudit write on all character file device nodes.
Domain to not audit.
Create all block device files.
Domain allowed access.
Create all character device files.
Domain allowed access.
rw all inherited character device files.
Domain allowed access.
rw all inherited blk device files.
Domain allowed access.
Delete all block device files.
Domain allowed access.
Delete all character device files.
Domain allowed access.
Rename all block device files.
Domain allowed access.
Rename all character device files.
Domain allowed access.
Read, write, create, and delete all block device files.
Domain allowed access.
Read, write, create, and delete all character device files.
Domain allowed access.
Getattr the agp devices.
Domain allowed access.
Read and write the agp devices.
Domain allowed access.
Get the attributes of the apm bios device node.
Domain allowed access.
Do not audit attempts to get the attributes of
the apm bios device node.
Domain to not audit.
Set the attributes of the apm bios device node.
Domain allowed access.
Do not audit attempts to set the attributes of
the apm bios device node.
Domain to not audit.
Read and write the apm bios.
Domain allowed access.
Get the attributes of the autofs device node.
Domain allowed access.
Do not audit attempts to get the attributes of
the autofs device node.
Domain to not audit.
Set the attributes of the autofs device node.
Domain allowed access.
Do not audit attempts to set the attributes of
the autofs device node.
Domain to not audit.
Read and write the autofs device.
Domain allowed access.
Read and write the PCMCIA card manager device.
Domain allowed access.
Do not audit attempts to read and
write the PCMCIA card manager device.
Domain to not audit.
Create, read, write, and delete
the PCMCIA card manager device
with the correct type.
Domain allowed access.
Create, read, write, and delete
the PCMCIA card manager device.
Domain allowed access.
Automatic type transition to the type
for PCMCIA card manager device nodes when
created in /dev.
Domain allowed access.
Get the attributes of the CPU
microcode and id interfaces.
Domain allowed access.
Set the attributes of the CPU
microcode and id interfaces.
Domain allowed access.
Read the CPU identity.
Domain allowed access.
Read and write the the CPU microcode device. This
is required to load CPU microcode.
Domain allowed access.
Read the the hardware SSL accelerator.
Domain allowed access.
Read the kernel crash device
Domain allowed access.
Read and write the the hardware SSL accelerator.
Domain allowed access.
Set the attributes of the dlm control devices.
Domain allowed access.
Read and write the the dlm control device
Domain allowed access.
getattr the dri devices.
Domain allowed access.
Setattr the dri devices.
Domain allowed access.
Read and write the dri devices.
Domain allowed access.
Dontaudit read and write on the dri devices.
Domain to dontaudit access.
Create, read, write, and delete the dri devices.
Domain allowed access.
Automatic type transition to the type
for DRI device nodes when created in /dev.
Domain allowed access.
Get the attributes of the event devices.
Domain allowed access.
Set the attributes of the event devices.
Domain allowed access.
Read input event devices (/dev/input).
Domain allowed access.
Read input event devices (/dev/input).
Domain allowed access.
Get the attributes of the framebuffer device node.
Domain allowed access.
Set the attributes of the framebuffer device node.
Domain allowed access.
Dot not audit attempts to set the attributes
of the framebuffer device node.
Domain to not audit.
Read the framebuffer.
Domain allowed access.
Do not audit attempts to read the framebuffer.
Domain allowed access.
Write the framebuffer.
Domain allowed access.
Read and write the framebuffer.
Domain allowed access.
Read the kernel messages
Domain allowed access.
Do not audit attempts to read the kernel messages
Domain to not audit.
Write to the kernel messages device
Domain allowed access.
Get the attributes of the ksm devices.
Domain allowed access.
Set the attributes of the ksm devices.
Domain allowed access.
Read the ksm devices.
Domain allowed access.
Read and write to ksm devices.
Domain allowed access.
Get the attributes of the kvm devices.
Domain allowed access.
Set the attributes of the kvm devices.
Domain allowed access.
Read the kvm devices.
Domain allowed access.
Read and write to kvm devices.
Domain allowed access.
Read the lirc device.
Domain allowed access.
Read and write the lirc device.
Domain allowed access.
Automatic type transition to the type
for lirc device nodes when created in /dev.
Domain allowed access.
Get the attributes of the lvm comtrol device.
Domain allowed access.
Read the lvm comtrol device.
Domain allowed access.
Read and write the lvm control device.
Domain allowed access.
Do not audit attempts to read and write lvm control device.
Domain allowed access.
Delete the lvm control device.
Domain allowed access.
dontaudit getattr raw memory devices (e.g. /dev/mem).
Domain allowed access.
Read raw memory devices (e.g. /dev/mem).
Domain allowed access.
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
Domain to not audit.
Write raw memory devices (e.g. /dev/mem).
Domain allowed access.
Read and execute raw memory devices (e.g. /dev/mem).
Domain allowed access.
Write and execute raw memory devices (e.g. /dev/mem).
Domain allowed access.
Get the attributes of miscellaneous devices.
Domain allowed access.
Do not audit attempts to get the attributes
of miscellaneous devices.
Domain allowed access.
Set the attributes of miscellaneous devices.
Domain allowed access.
Do not audit attempts to set the attributes
of miscellaneous devices.
Domain allowed access.
Read miscellaneous devices.
Domain allowed access.
Read and write ipmi devices.
Domain allowed access.
Write miscellaneous devices.
Domain allowed access.
Do not audit attempts to read and write miscellaneous devices.
Domain allowed access.
Get the attributes of the modem devices.
Domain allowed access.
Set the attributes of the modem devices.
Domain allowed access.
Read the modem devices.
Domain allowed access.
Read and write to modem devices.
Domain allowed access.
Get the attributes of the mouse devices.
Domain allowed access.
Set the attributes of the mouse devices.
Domain allowed access.
Read the mouse devices.
Domain allowed access.
Read and write to mouse devices.
Domain allowed access.
Get the attributes of the memory type range
registers (MTRR) device.
Domain allowed access.
Dontaudit get the attributes of the memory type range
registers (MTRR) device.
Domain allowed access.
Read the memory type range
registers (MTRR). (Deprecated)
Read the memory type range
registers (MTRR). This interface has
been deprecated, dev_rw_mtrr() should be
used instead.
The MTRR device ioctls can be used for
reading and writing; thus, read access to the
device cannot be separated from write access.
Domain allowed access.
Write the memory type range
registers (MTRR). (Deprecated)
Write the memory type range
registers (MTRR). This interface has
been deprecated, dev_rw_mtrr() should be
used instead.
The MTRR device ioctls can be used for
reading and writing; thus, write access to the
device cannot be separated from read access.
Domain allowed access.
Do not audit attempts to write the memory type
range registers (MTRR).
Domain to not audit.
Read and write the memory type range registers (MTRR).
Domain allowed access.
Get the attributes of the network control device
Domain allowed access.
Read the network control identity.
Domain allowed access.
Read and write the the network control device.
Domain allowed access.
Get the attributes of the null device nodes.
Domain allowed access.
Set the attributes of the null device nodes.
Domain allowed access.
Delete the null device (/dev/null).
Domain allowed access.
Read and write to the null device (/dev/null).
Domain allowed access.
Create the null device (/dev/null).
Domain allowed access.
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
Domain allowed access.
Read and write BIOS non-volatile RAM.
Domain allowed access.
Read Non-Volatile Memory Host Controller Interface.
Domain allowed access.
Get the attributes of the printer device nodes.
Domain allowed access.
Set the attributes of the printer device nodes.
Domain allowed access.
Append the printer device.
Domain allowed access.
Read and write the printer device.
Domain allowed access.
Get the attributes of the QEMU
microcode and id interfaces.
Domain allowed access.
Set the attributes of the QEMU
microcode and id interfaces.
Domain allowed access.
Read the QEMU device
Domain allowed access.
Read and write the the QEMU device.
Domain allowed access.
Read from random number generator
devices (e.g., /dev/random).
Allow the specified domain to read from random number
generator devices (e.g., /dev/random). Typically this is
used in situations when a cryptographically secure random
number is needed.
Related interface:
Domain allowed access.
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
Domain allowed access.
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
Domain allowed access.
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
random device.
Domain allowed access.
Read the realtime clock (/dev/rtc).
Domain allowed access.
Set the realtime clock (/dev/rtc).
Domain allowed access.
Read and set the realtime clock (/dev/rtc).
Domain allowed access.
Get the attributes of the scanner device.
Domain allowed access.
Do not audit attempts to get the attributes of
the scanner device.
Domain to not audit.
Set the attributes of the scanner device.
Domain allowed access.
Do not audit attempts to set the attributes of
the scanner device.
Domain to not audit.
Read and write the scanner device.
Domain allowed access.
Get the attributes of the sound devices.
Domain allowed access.
Set the attributes of the sound devices.
Domain allowed access.
Read the sound devices.
Domain allowed access.
Write the sound devices.
Domain allowed access.
Read the sound mixer devices.
Domain allowed access.
Write the sound mixer devices.
Domain allowed access.
Get the attributes of the the power management device.
Domain allowed access.
Set the attributes of the the power management device.
Domain allowed access.
Read and write the the power management device.
Domain allowed access.
Getattr on smartcard devices
Domain allowed access.
dontaudit getattr on smartcard devices
Domain allowed access.
Read and write smartcard devices.
Domain allowed access.
Create, read, write, and delete smartcard devices.
Domain allowed access.
Associate a file to a sysfs filesystem.
The type of the file to be associated to sysfs.
Get the attributes of sysfs directories.
The type of the process performing this action.
Mount a filesystem on /sys
Domain allow access.
Mount sysfs filesystems.
Domain allowed access.
Unmount sysfs filesystems.
Domain allowed access.
Search the sysfs directories.
The type of the process performing this action.
Do not audit attempts to search sysfs.
The type of the process performing this action.
List the contents of the sysfs directories.
The type of the process performing this action.
Write in a sysfs directories.
The type of the process performing this action.
Read hardware state information.
Allow the specified domain to read the contents of
the sysfs filesystem. This filesystem contains
information, parameters, and other settings on the
hardware installed on the system.
Domain allowed access.
Allow caller to modify hardware state information.
The process type modifying hardware state information.
Read from pseudo random number generator devices (e.g., /dev/urandom).
Allow the specified domain to read from pseudo random number
generator devices (e.g., /dev/urandom). Typically this is
used in situations when a cryptographically secure random
number is not necessarily needed. One example is the Stack
Smashing Protector (SSP, formerly known as ProPolice) support
that may be compiled into programs.
Related interface:
Related tunable:
Domain allowed access.
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
Domain to not audit.
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
Domain allowed access.
Do not audit attempts to write to pseudo
random devices (e.g., /dev/urandom)
Domain to not audit.
Getattr generic the USB devices.
Domain allowed access.
Setattr generic the USB devices.
Domain allowed access.
Read generic the USB devices.
Domain allowed access.
Read and write generic the USB devices.
Domain allowed access.
Allow relabeling (to and from) of generic usb device
Domain allowed to relabel.
Read USB monitor devices.
Domain allowed access.
Write USB monitor devices.
Domain allowed access.
Mount a usbfs filesystem.
The type of the process performing this action.
Associate a file to a usbfs filesystem.
The type of the file to be associated to usbfs.
Get the attributes of a directory in the usb filesystem.
Domain allowed access.
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
Domain to not audit.
Search the directory containing USB hardware information.
The type of the process performing this action.
Allow caller to get a list of usb hardware.
The process type getting the list.
Set the attributes of usbfs filesystem.
Domain allowed access.
Read USB hardware information using
the usbfs filesystem interface.
The type of the process performing this action.
Allow caller to modify usb hardware configuration files.
The process type modifying the options.
Allow read/write the vhost net device
Domain allowed access.
Get the attributes of video4linux devices.
Domain allowed access.
Read and write userio device.
Domain allowed access.
Do not audit attempts to get the attributes
of video4linux device nodes.
Domain to not audit.
Set the attributes of video4linux device nodes.
Domain allowed access.
Do not audit attempts to set the attributes
of video4linux device nodes.
Domain to not audit.
Read the video4linux devices.
Domain allowed access.
Write the video4linux devices.
Domain allowed access.
Read and write VMWare devices.
Domain allowed access.
Read, write, and mmap VMWare devices.
Domain allowed access.
Read to watchdog devices.
Domain allowed access.
Write to watchdog devices.
Domain allowed access.
Read and write the the wireless device.
Domain allowed access.
Read and write Xen devices.
Domain allowed access.
Create, read, write, and delete Xen devices.
Domain allowed access.
Automatic type transition to the type
for xen device nodes when created in /dev.
Domain allowed access.
Get the attributes of X server miscellaneous devices.
Domain allowed access.
Set the attributes of X server miscellaneous devices.
Domain allowed access.
Read and write X server miscellaneous devices.
Domain allowed access.
Read and write to the zero device (/dev/zero).
Domain allowed access.
Read, write, and execute the zero device (/dev/zero).
Domain allowed access.
Execmod the zero device (/dev/zero).
Domain allowed access.
Create the zero device (/dev/zero).
Domain allowed access.
Unconfined access to devices.
Domain allowed access.
Core policy for domains.
Contains the concept of a domain.
Make the specified type usable as a basic domain.
Make the specified type usable as a basic domain.
This is primarily used for kernel threads;
generally the domain_type() interface is
more appropriate for userland processes.
Type to be used as a basic domain type.
Make the specified type usable as a domain.
Make the specified type usable as a domain. This,
or an interface that calls this interface, must be
used on all types that are used as domains.
Related interfaces:
- application_domain()
- init_daemon_domain()
- init_domaion()
- init_ranged_daemon_domain()
- init_ranged_domain()
- init_ranged_system_domain()
- init_script_domain()
- init_system_domain()
Example:
type mydomain_t;
domain_type(mydomain_t)
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
Type to be used as a domain type.
Make the specified type usable as
an entry point for the domain.
Domain to be entered.
Type of program used for entering
the domain.
Make the file descriptors of the specified
domain for interactive use (widely inheritable)
Domain allowed access.
Allow the specified domain to perform
dynamic transitions.
Allow the specified domain to perform
dynamic transitions.
This violates process tranquility, and it
is strongly suggested that this not be used.
Domain allowed access.
Makes caller and execption to the constraint
preventing changing to the system user
identity and system role.
Domain allowed access.
Makes caller an exception to the constraint preventing
changing of user identity.
The process type to make an exception to the constraint.
Makes caller an exception to the constraint preventing
changing of role.
The process type to make an exception to the constraint.
Makes caller an exception to the constraint preventing
changing the user identity in object contexts.
The process type to make an exception to the constraint.
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the user domains from the base module.
It should not be used other than on
user domains.
Domain target for user exemption.
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
cron domains.
Domain target for user exemption.
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
user cron jobs.
Domain target for user exemption.
Inherit and use file descriptors from
domains with interactive programs.
Allow the specified domain to inherit and use file
descriptors from domains with interactive programs.
This does not allow access to the objects being referenced
by the file descriptors.
Domain allowed access.
Do not audit attempts to inherit file
descriptors from domains with interactive
programs.
Domain allowed access.
Send a SIGCHLD signal to domains whose file
discriptors are widely inheritable.
Domain allowed access.
Set the nice level of all domains.
Domain allowed access.
Send general signals to all domains.
Domain allowed access.
Send a null signal to all domains.
Domain allowed access.
Send a null signal to all domains.
Domain allowed access.
Send a stop signal to all domains.
Domain allowed access.
Send a child terminated signal to all domains.
Domain allowed access.
Send a kill signal to all domains.
Domain allowed access.
Search the process state directory (/proc/pid) of all domains.
Domain allowed access.
Do not audit attempts to search the process
state directory (/proc/pid) of all domains.
Domain to not audit.
Read the process state (/proc/pid) of all domains.
Domain allowed access.
Get the attributes of all domains.
Domain allowed access.
Dontaudit geting the attributes of all domains.
Domain allowed access.
Read the process state (/proc/pid) of all confined domains.
Domain allowed access.
Get the attributes of all confined domains.
Domain allowed access.
Ptrace all domains.
Domain allowed access.
Do not audit attempts to ptrace all domains.
Do not audit attempts to ptrace all domains.
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
Domain allowed access.
Do not audit attempts to ptrace confined domains.
Do not audit attempts to ptrace confined domains.
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
Domain allowed access.
Do not audit attempts to read the process
state (/proc/pid) of all domains.
Domain allowed access.
Do not audit attempts to read the process state
directories of all domains.
Domain allowed access.
Get the session ID of all domains.
Domain allowed access.
Do not audit attempts to get the
session ID of all domains.
Domain allowed access.
Get the process group ID of all domains.
Domain allowed access.
Get the scheduler information of all domains.
Domain allowed access.
Get the attributes of all domains
sockets, for all socket types.
Get the attributes of all domains
sockets, for all socket types.
This is commonly used for domains
that can use lsof on all domains.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
This interface was added for PCMCIA cardmgr
and is probably excessive.
Domain to not audit.
Do not audit attempts to get the attributes
of all domains TCP sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains UDP sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains UDP sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains IPSEC key management sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains packet sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains raw sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains key sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains key sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Get the attributes of all domains
unnamed pipes.
Get the attributes of all domains
unnamed pipes.
This is commonly used for domains
that can use lsof on all domains.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unnamed pipes.
Domain allowed access.
Allow specified type to set context of all
domains IPSEC associations.
Type of subject to be allowed this.
Get the attributes of entry point
files for all domains.
Domain allowed access.
Read the entry point files for all domains.
Domain allowed access.
Execute the entry point files for all
domains in the caller domain.
Domain allowed access.
dontaudit checking for execute on all entry point files
Domain to not audit.
Create, read, write, and delete all
entrypoint files.
Domain allowed access.
Relabel to and from all entry point
file types.
Domain allowed access.
Mmap all entry point files as executable.
Domain allowed access.
Execute an entry_type in the specified domain.
Domain allowed access.
The type of the new process.
Ability to mmap a low area of the address space,
as configured by /proc/sys/kernel/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
Domain allowed to mmap low memory.
Ability to mmap a low area of the address space,
as configured by /proc/sys/kernel/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
Domain allowed to mmap low memory.
Allow specified type to receive labeled
networking packets from all domains, over
all protocols (TCP, UDP, etc)
Domain allowed access.
Send generic signals to the unconfined domain.
Domain allowed access.
Unconfined access to domains.
Domain allowed access.
Do not audit attempts to read or write
all leaked sockets.
Domain allowed access.
Allow all domains to use other domains file descriptors
Allow all domains to have the kernel load modules
Allow all domains to execute in fips_mode
Basic filesystem types and interfaces.
This module contains basic filesystem types and interfaces. This
includes:
- The concept of different file types including basic
files, mount points, tmp files, etc.
- Access to groups of files and all files.
- Types and interfaces for the basic filesystem layout
(/, /etc, /tmp, /usr, etc.).
Contains the concept of a file.
Comains the file initial SID.
Make the specified type usable for files
in a filesystem.
Make the specified type usable for files
in a filesystem. Types used for files that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running. If the type is used
for device nodes (character or block files), then
the dev_node() interface is more appropriate.
Related interfaces:
- application_domain()
- application_executable_file()
- corecmd_executable_file()
- init_daemon_domain()
- init_domaion()
- init_ranged_daemon_domain()
- init_ranged_domain()
- init_ranged_system_domain()
- init_script_file()
- init_script_domain()
- init_system_domain()
- files_config_files()
- files_lock_file()
- files_mountpoint()
- files_pid_file()
- files_security_file()
- files_security_mountpoint()
- files_tmp_file()
- files_tmpfs_file()
- logging_log_file()
- userdom_user_home_content()
Example:
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
Type to be used for files.
Make the specified type a file that
should not be dontaudited from
browsing from user domains.
Type of the file to be used as a
member directory.
Make the specified type usable for
lock files.
Type to be used for lock files.
Make the specified type usable for
lock files.
Type to be used for lock files.
Make the specified type usable for
filesystem mount points.
Type to be used for mount points.
Make the specified type usable for
security file filesystem mount points.
Type to be used for mount points.
Make the specified type usable for
runtime process ID files.
Make the specified type usable for runtime process ID files,
typically found in /var/run.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a PID file type may result in problems with starting
or stopping services.
Related interfaces:
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
Type to be used for PID files.
Make the specified type a
configuration file.
Make the specified type usable for configuration files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
configuration management tools.
Example usage with a domain that can read
its configuration file /etc:
type myconffile_t;
files_config_file(myconffile_t)
allow mydomain_t myconffile_t:file read_file_perms;
files_search_etc(mydomain_t)
Type to be used as a configuration file.
Make the specified type a
base file.
Identify file type as base file type. Tools will use this attribute,
to help users diagnose problems.
Type to be used as a base files.
Make the specified type a
base read only file.
Make the specified type readable for all domains.
Type to be used as a base read only files.
Read all ro base files.
Domain allowed access.
Execute all base ro files.
Domain allowed access.
Make the specified type a
polyinstantiated directory.
Type of the file to be used as a
polyinstantiated directory.
Make the specified type a parent
of a polyinstantiated directory.
Type of the file to be used as a
parent directory.
Make the specified type a
polyinstantiation member directory.
Type of the file to be used as a
member directory.
Make the domain use the specified
type of polyinstantiated directory.
Domain using the polyinstantiated
directory.
Type of the file to be used as a
member directory.
Make the specified type a file
used for temporary files.
Make the specified type usable for temporary files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
purging temporary files.
Related interfaces:
Example usage with a domain that can create and
write its temporary file in the system temporary file
directories (/tmp or /var/tmp):
type mytmpfile_t;
files_tmp_file(mytmpfile_t)
allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms };
files_tmp_filetrans(mydomain_t, mytmpfile_t, file)
Type of the file to be used as a
temporary file.
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
The type to be transformed.
Get the attributes of all directories.
Domain allowed access.
Do not audit attempts to get the attributes
of all directories.
Domain to not audit.
List all non-security directories.
Domain allowed access.
Do not audit attempts to list all
non-security directories.
Domain to not audit.
Mount a filesystem on all non-security
directories and files.
Domain allowed access.
Allow attempts to modify any directory
Domain to allow
Allow attempts to manage non-security directories
Domain to allow
Manage all non-security files.
Domain allowed access.
Relabel all non-security files.
Domain allowed access.
Search all base file dirs.
Domain allowed access.
Relabel all base file types.
Domain allowed access.
Get the attributes of all files.
Domain allowed access.
Do not audit attempts to get the attributes
of all files.
Domain to not audit.
Do not audit attempts to get the attributes
of non security files.
Domain to not audit.
Do not audit attempts to set the attributes
of non security files.
Domain to not audit.
Do not audit attempts to set the attributes
of non security directories.
Domain to not audit.
Read all files.
Domain allowed access.
Allow shared library text relocations in all files.
Allow shared library text relocations in all files.
This is added to support WINE policy.
Domain allowed access.
Read all non-security files.
Domain allowed access.
Read all directories on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all symbolic links on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Get the attributes of all symbolic links.
Domain allowed access.
Do not audit attempts to get the attributes
of all symbolic links.
Domain to not audit.
Do not audit attempts to read all symbolic links.
Domain to not audit.
Do not audit attempts to get the attributes
of non security symbolic links.
Domain to not audit.
Do not audit attempts to get the attributes
of non security block devices.
Domain to not audit.
Do not audit attempts to get the attributes
of non security character devices.
Domain to not audit.
Read all symbolic links.
Domain allowed access.
Get the attributes of all named pipes.
Domain allowed access.
Do not audit attempts to get the attributes
of all named pipes.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named pipes.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named pipes.
Domain to not audit.
Get the attributes of all named sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all named sockets.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named sockets.
Domain to not audit.
Read all block nodes with file types.
Domain allowed access.
Read all character nodes with file types.
Domain allowed access.
Relabel all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
rw all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Manage all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Search the contents of all directories on
extended attribute filesystems.
Domain allowed access.
List the contents of all directories on
extended attribute filesystems.
Domain allowed access.
Do not audit attempts to search the
contents of any directories on extended
attribute filesystems.
Domain allowed access.
Get the attributes of all filesystems
with the type of a file.
Domain allowed access.
Relabel a filesystem to the type of a file.
Domain allowed access.
Relabel a filesystem to the type of a file.
Domain allowed access.
Mount all filesystems with the type of a file.
Domain allowed access.
Unmount all filesystems with the type of a file.
Domain allowed access.
Manage all configuration directories on filesystem
The type of domain performing this action
Relabel configuration directories
Type of domain performing this action
Read config files in /etc.
Domain allowed access.
Manage all configuration files on filesystem
The type of domain performing this action
Relabel configuration files
Type of domain performing this action
Mount a filesystem on all mount points.
Domain allowed access.
Get the attributes of all mount points.
Domain allowed access.
Read all mountpoint symbolic links.
Domain allowed access.
List the attributes of all mount points.
Domain allowed access.
Get the attributes of all mount points.
Domain allowed access.
Do not audit listing of all mount points.
Domain to not audit.
Search all mount points.
Domain allowed access.
Search all mount points.
Domain allowed access.
Write all mount points.
Domain allowed access.
Write all mount points.
Domain allowed access.
List the contents of the root directory.
Domain allowed access.
Do not audit attempts to write
files in the root directory.
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to read files in
the root directory.
Domain to not audit.
Do not audit attempts to read or write
files in the root directory.
Domain allowed access.
Do not audit attempts to read or write
character device nodes in the root directory.
Domain allowed access.
Remove file entries from the root directory.
Domain allowed access.
Remove entries from the root directory.
Domain allowed access.
Unmount a rootfs filesystem.
Domain allowed access.
Mount a filesystem on the root file system
Domain allowed access.
Get attributes of the /boot directory.
Domain allowed access.
Do not audit attempts to get attributes
of the /boot directory.
Domain to not audit.
Search the /boot directory.
Domain allowed access.
Do not audit attempts to search the /boot directory.
Domain allowed access.
List the /boot directory.
Domain allowed access.
Write directories in /boot
Domain allowed access.
Create directories in /boot
Domain allowed access.
manage directories in /boot
Domain allowed access.
Create a private type object in boot
with an automatic type transition
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
read files in the /boot directory.
Domain allowed access.
Create, read, write, and delete files
in the /boot directory.
Domain allowed access.
Create, read, write, and delete files
in the /boot directory.
Domain allowed access.
Relabel from files in the /boot directory.
Domain allowed access.
Read symbolic links
in the /boot directory.
Domain allowed access.
Read and write symbolic links
in the /boot directory.
Domain allowed access.
Create, read, write, and delete symbolic links
in the /boot directory.
Domain allowed access.
Read kernel files in the /boot directory.
Domain allowed access.
Install a kernel into the /boot directory.
Domain allowed access.
Delete a kernel from /boot.
Domain allowed access.
Getattr of directories with the default file type.
Domain allowed access.
Do not audit attempts to get the attributes of
directories with the default file type.
Domain to not audit.
Search the contents of directories with the default file type.
Domain allowed access.
List contents of directories with the default file type.
Domain allowed access.
Do not audit attempts to list contents of
directories with the default file type.
Domain to not audit.
Create, read, write, and delete directories with
the default file type.
Domain allowed access.
Mount a filesystem on a directory with the default file type.
Domain allowed access.
Do not audit attempts to get the attributes of
files with the default file type.
Domain to not audit.
Read files with the default file type.
Domain allowed access.
Do not audit attempts to read files
with the default file type.
Domain to not audit.
Create, read, write, and delete files with
the default file type.
Domain allowed access.
Read symbolic links with the default file type.
Domain allowed access.
Read sockets with the default file type.
Domain allowed access.
Read named pipes with the default file type.
Domain allowed access.
Search the contents of /etc directories.
Domain allowed access.
Set the attributes of the /etc directories.
Domain allowed access.
List the contents of /etc directories.
Domain allowed access.
Add and remove entries from /etc directories.
Domain allowed access.
Do not audit attempts to write to /etc dirs.
Domain allowed access.
Manage generic directories in /etc
Domain allowed access
Read generic files in /etc.
Allow the specified domain to read generic
files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
- /etc/fstab
- /etc/passwd
- /etc/services
- /etc/shells
This interface does not include access to /etc/shadow.
Generally, it is safe for many domains to have
this access. However, since this interface provides
access to the /etc/passwd file, caution must be
exercised, as user account names can be leaked
through this access.
Related interfaces:
- auth_read_shadow()
- files_read_etc_runtime_files()
- seutil_read_config()
Domain allowed access.
Do not audit attempts to write generic files in /etc.
Domain allowed access.
Read and write generic files in /etc.
Domain allowed access.
Create, read, write, and delete generic
files in /etc.
Domain allowed access.
Delete system configuration files in /etc.
Domain allowed access.
Delete system configuration lnk files in /etc.
Domain allowed access.
Remove entries from the etc directory.
Domain allowed access.
Execute generic files in /etc.
Domain allowed access.
Relabel from and to generic files in /etc.
Domain allowed access.
Read symbolic links in /etc.
Domain allowed access.
Create, read, write, and delete symbolic links in /etc.
Domain allowed access.
Create objects in /etc with a private
type using a type_transition.
Domain allowed access.
Private file type.
Object classes to be created.
Create a boot flag.
Create a boot flag, such as
/.autorelabel and /.autofsck.
Domain allowed access.
Read files in /etc that are dynamically
created on boot, such as mtab.
Allow the specified domain to read dynamically created
configuration files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
- /etc/motd
- /etc/mtab
- /etc/nologin
This interface does not include access to /etc/shadow.
Domain allowed access.
Do not audit attempts to read files
in /etc that are dynamically
created on boot, such as mtab.
Domain to not audit.
Read and write files in /etc that are dynamically
created on boot, such as mtab.
Domain allowed access.
Create, read, write, and delete files in
/etc that are dynamically created on boot,
such as mtab.
Domain allowed access.
Do not audit attempts to set the attributes of the etc_runtime files
Domain to not audit.
Create, etc runtime objects with an automatic
type transition.
Domain allowed access.
The class of the object being created.
Getattr of directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Do not audit attempts to search directories on new filesystems
that have not yet been labeled.
Domain allowed access.
List the contents of directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Read and write directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete directories
on new filesystems that have not yet been labeled.
Domain allowed access.
Mount a filesystem on a directory on new filesystems
that has not yet been labeled.
Domain allowed access.
Read files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete lnk_files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete fifo files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete sock files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete blk files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete chr files on new filesystems
that have not yet been labeled.
Domain allowed access.
Do not audit attempts to write to chr_files
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete files
on new filesystems that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete symbolic links
on new filesystems that have not yet been labeled.
Domain allowed access.
Read and write block device nodes on new filesystems
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete block device nodes
on new filesystems that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete character device nodes
on new filesystems that have not yet been labeled.
Domain allowed access.
Get the attributes of the home directories root
(/home).
Domain allowed access.
Do not audit attempts to get the
attributes of the home directories root
(/home).
Domain to not audit.
Search home directories root (/home).
Domain allowed access.
Do not audit attempts to search
home directories root (/home).
Domain to not audit.
Do not audit attempts to list
home directories root (/home).
Domain to not audit.
Get listing of home directories.
Domain allowed access.
Relabel to user home root (/home).
Domain allowed access.
Create objects in /home.
Domain allowed access.
The private type.
The class of the object being created.
Get the attributes of lost+found directories.
Domain allowed access.
Do not audit attempts to get the attributes of
lost+found directories.
Domain to not audit.
Create, read, write, and delete objects in
lost+found directories.
Domain allowed access.
Search the contents of /mnt.
Domain allowed access.
Do not audit attempts to search /mnt.
Domain to not audit.
List the contents of /mnt.
Domain allowed access.
dontaudit List the contents of /mnt.
Domain allowed access.
Mount a filesystem on /mnt.
Domain allowed access.
Create, read, write, and delete directories in /mnt.
Domain allowed access.
Create, read, write, and delete files in /mnt.
Domain allowed access.
read files in /mnt.
Domain allowed access.
Read symbolic links in /mnt.
Domain allowed access.
Create, read, write, and delete symbolic links in /mnt.
Domain allowed access.
Search the contents of the kernel module directories.
Domain allowed access.
List the contents of the kernel module directories.
Domain allowed access.
Get the attributes of kernel module files.
Domain allowed access.
Read kernel module files.
Domain allowed access.
Write kernel module files.
Domain allowed access.
Delete kernel module files.
Domain allowed access.
Create, read, write, and delete
kernel module files.
Domain allowed access.
Relabel from and to kernel module files.
Domain allowed access.
Create objects in the kernel module directories
with a private type via an automatic type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
List world-readable directories.
Domain allowed access.
Read world-readable files.
Domain allowed access.
Read world-readable symbolic links.
Domain allowed access.
Read world-readable named pipes.
Domain allowed access.
Read world-readable sockets.
Domain allowed access.
Read manageable system configuration files in /etc
Domain allowed access.
Manage manageable system configuration files in /etc.
Domain allowed access.
Relabel manageable system configuration files in /etc.
Domain allowed access.
Relabel manageable system configuration files in /etc.
Domain allowed access.
Create files in /etc with the type used for
the manageable system config files.
The type of the process performing this action.
Allow the specified type to associate
to a filesystem with the type of the
temporary directory (/tmp).
Type of the file to associate.
Get the attributes of the tmp directory (/tmp).
Domain allowed access.
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
Domain allowed access.
Search the tmp directory (/tmp).
Domain allowed access.
Do not audit attempts to search the tmp directory (/tmp).
Domain allowed access.
Read the tmp directory (/tmp).
Domain allowed access.
Do not audit listing of the tmp directory (/tmp).
Domain not to audit.
Dontaudit write to the tmp directory (/tmp).
Domain not to audit.
Allow read and write to the tmp directory (/tmp).
Domain not to audit.
Remove entries from the tmp directory.
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Manage temporary directories in /tmp.
The type of the process performing this action.
Allow shared library text relocations in tmp files.
Allow shared library text relocations in tmp files.
This is added to support java policy.
Domain allowed access.
Manage temporary files and directories in /tmp.
The type of the process performing this action.
Read symbolic links in the tmp directory (/tmp).
Domain allowed access.
Read and write generic named sockets in the tmp directory (/tmp).
Domain allowed access.
Relabel a dir from the type used in /tmp.
Domain allowed access.
Set the attributes of all tmp directories.
Domain allowed access.
Allow caller to read inherited tmp files.
Domain allowed access.
Allow caller to append inherited tmp files.
Domain allowed access.
Allow caller to read and write inherited tmp files.
Domain allowed access.
List all tmp directories.
Domain allowed access.
Do not audit attempts to get the attributes
of all tmp files.
Domain not to audit.
Allow attempts to get the attributes
of all tmp files.
Domain not to audit.
Do not audit attempts to get the attributes
of all tmp sock_file.
Domain not to audit.
Read all tmp files.
Domain allowed access.
Do not audit attempts to read or write
all leaked tmpfiles files.
Domain to not audit.
Create an object in the tmp directories, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Delete the contents of /tmp.
Domain allowed access.
Search the content of /etc.
Domain allowed access.
List the contents of generic
directories in /usr.
Domain allowed access.
Add and remove entries from /usr directories.
Domain allowed access.
dontaudit Add and remove entries from /usr directories.
Domain allowed access.
Delete generic directories in /usr in the caller domain.
Domain allowed access.
Set the attributes of the /usr directory.
Domain allowed access.
Delete generic files in /usr in the caller domain.
Domain allowed access.
Get the attributes of files in /usr.
Domain allowed access.
Read generic files in /usr.
Allow the specified domain to read generic
files in /usr. These files are various program
files that do not have more specific SELinux types.
Some examples of these files are:
- /usr/include/*
- /usr/share/doc/*
- /usr/share/info/*
Generally, it is safe for many domains to have
this access.
Domain allowed access.
Execute generic programs in /usr in the caller domain.
Domain allowed access.
dontaudit write of /usr dirs
Domain allowed access.
dontaudit write of /usr files
Domain allowed access.
Create, read, write, and delete files in the /usr directory.
Domain allowed access.
Relabel a file to the type used in /usr.
Domain allowed access.
Relabel a file from the type used in /usr.
Domain allowed access.
Read symbolic links in /usr.
Domain allowed access.
Create objects in the /usr directory
Domain allowed access.
The type of the object to be created
The object class.
Do not audit attempts to search /usr/src.
Domain to not audit.
Get the attributes of files in /usr/src.
Domain allowed access.
Read files in /usr/src.
Domain allowed access.
Execute programs in /usr/src in the caller domain.
Domain allowed access.
Install a system.map into the /boot directory.
Domain allowed access.
Read system.map in the /boot directory.
Domain allowed access.
Delete a system.map in the /boot directory.
Domain allowed access.
Search the contents of /var.
Domain allowed access.
Do not audit attempts to write to /var.
Domain to not audit.
Allow attempts to write to /var.dirs
Domain to not audit.
Do not audit attempts to search
the contents of /var.
Domain to not audit.
List the contents of /var.
Domain allowed access.
Do not audit listing of the var directory (/var).
Domain to not audit.
Create, read, write, and delete directories
in the /var directory.
Domain allowed access.
Read files in the /var directory.
Domain allowed access.
Read and write files in the /var directory.
Domain allowed access.
Do not audit attempts to read and write
files in the /var directory.
Domain allowed access.
Create, read, write, and delete files in the /var directory.
Domain allowed access.
Read symbolic links in the /var directory.
Domain allowed access.
Create, read, write, and delete symbolic
links in the /var directory.
Domain allowed access.
Create objects in the /var directory
Domain allowed access.
The type of the object to be created
The object class.
Get the attributes of the /var/lib directory.
Domain allowed access.
Search the /var/lib directory.
Search the /var/lib directory. This is
necessary to access files or directories under
/var/lib that have a private type. For example, a
domain accessing a private library file in the
/var/lib directory:
allow mydomain_t mylibfile_t:file read_file_perms;
files_search_var_lib(mydomain_t)
Domain allowed access.
List the contents of the /var/lib directory.
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Create objects in the /var/lib directory
Domain allowed access.
The type of the object to be created
The object class.
Read generic files in /var/lib.
Domain allowed access.
Read generic symbolic links in /var/lib
Domain allowed access.
Create, read, write, and delete the
pseudorandom number generator seed.
Domain allowed access.
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
Domain allowed access.
Search the locks directory (/var/lock).
Domain allowed access.
Do not audit attempts to search the
locks directory (/var/lock).
Domain to not audit.
Do not audit attempts to read/write inherited
locks (/var/lock).
Domain to not audit.
Do not audit attempts to read/write inherited
locks (/var/lock).
Domain to not audit.
Set the attributes of the /var/lock directory.
Domain allowed access.
Add and remove entries in the /var/lock
directories.
Domain allowed access.
Get the attributes of generic lock files.
Domain allowed access.
Create, read, write, and delete generic
lock files.
Domain allowed access.
Delete all lock files.
Domain allowed access.
Read all lock files.
Domain allowed access.
manage all lock files.
Domain allowed access.
Create an object in the locks directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to get the attributes
of the /var/run directory.
Domain to not audit.
Search the contents of runtime process
ID directories (/var/run).
Domain allowed access.
Do not audit attempts to search
the all /var/run directory.
Domain to not audit.
Add and remove entries from pid directories.
Domain allowed access.
Create generic pid directory.
Domain allowed access.
Do not audit attempts to search
the /var/run directory.
Domain to not audit.
List the contents of the runtime process
ID directories (/var/run).
Domain allowed access.
Read generic process ID files.
Domain allowed access.
Write named generic process ID pipes
Domain allowed access.
Create an object in the process ID directory, with a private type.
Create an object in the process ID directory (e.g., /var/run)
with a private type. Typically this is used for creating
private PID files in /var/run with the private type instead
of the general PID file type. To accomplish this goal,
either the program must be SELinux-aware, or use this interface.
Related interfaces:
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Read and write generic process ID files.
Domain allowed access.
Do not audit attempts to get the attributes of
daemon runtime data files.
Domain allowed access.
Do not audit attempts to write to daemon runtime data files.
Domain allowed access.
Do not audit attempts to ioctl daemon runtime data files.
Domain allowed access.
Read all process ID files.
Domain allowed access.
Mount filesystems on all polyinstantiation
member directories.
Domain allowed access.
Delete all process IDs.
Domain allowed access.
Delete all process ID directories.
Domain allowed access.
Set the attributes of the /var/run directory.
Domain allowed access.
Search the contents of generic spool
directories (/var/spool).
Domain allowed access.
Do not audit attempts to search generic
spool directories.
Domain to not audit.
List the contents of generic spool
(/var/spool) directories.
Domain allowed access.
Create, read, write, and delete generic
spool directories (/var/spool).
Domain allowed access.
Read generic spool files.
Domain allowed access.
Create, read, write, and delete generic
spool files.
Domain allowed access.
Create objects in the spool directory
with a private type with a type transition.
Domain allowed access.
Type to which the created node will be transitioned.
Object class(es) (single or set including {}) for which this
the transition will occur.
Allow access to manage all polyinstantiated
directories on the system.
Domain allowed access.
Unconfined access to files.
Domain allowed access.
Create a core files in /
Create a core file in /,
Domain allowed access.
Create a default directory
Create a default_t direcrory
Domain allowed access.
Create, default_t objects with an automatic
type transition.
Domain allowed access.
The class of the object being created.
manage generic symbolic links
in the /var/run directory.
Domain allowed access.
Do not audit attempts to getattr
all tmpfs files.
Domain to not audit.
Do not audit attempts to read security files
Domain to not audit.
rw any files inherited from another process
Domain allowed access.
Object type.
Allow any file point to be the entrypoint of this domain
Domain allowed access.
Do not audit attempts to rw inherited file perms
of non security files.
Domain to not audit.
Do not audit attempts to read or write
all leaked files.
Domain allowed access.
Allow domain to create_file_ass all types
Domain allowed access.
Policy for filesystems.
Contains the initial SID for the filesystems.
Transform specified type into a filesystem type.
Domain allowed access.
Transform specified type into a filesystem
type which does not have extended attribute
support.
Domain allowed access.
Associate the specified file type to persistent
filesystems with extended attributes. This
allows a file of this type to be created on
a filesystem such as ext3, JFS, and XFS.
The type of the to be associated.
Associate the specified file type to
filesystems which lack extended attributes
support. This allows a file of this type
to be created on a filesystem such as
FAT32, and NFS.
The type of the to be associated.
Execute files on a filesystem that does
not support extended attributes.
Domain allowed access.
Mount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
Domain allowed access.
Remount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS. This allows
some mount options to be changed.
Domain allowed access.
Unmount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
Domain allowed access.
Get the attributes of persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
Allow the specified domain to
get the attributes of a persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
Example attributes:
- Type of the file system (e.g., ext3)
- Size of the file system
- Available space on the file system
Domain allowed access.
Do not audit attempts to
get the attributes of a persistent
filesystem which has extended
attributes, such as ext3, JFS, or XFS.
Domain to not audit.
Allow changing of the label of a
filesystem with extended attributes
using the context= mount option.
Domain allowed access.
Get the filesystem quotas of a filesystem
with extended attributes.
Domain allowed access.
Set the filesystem quotas of a filesystem
with extended attributes.
Domain allowed access.
Read files on anon_inodefs file systems.
Domain allowed access.
Read and write files on anon_inodefs
file systems.
Domain allowed access.
Do not audit attempts to read or write files on
anon_inodefs file systems.
Domain allowed access.
Mount an automount pseudo filesystem.
Domain allowed access.
Remount an automount pseudo filesystem
This allows some mount options to be changed.
Domain allowed access.
Unmount an automount pseudo filesystem.
Domain allowed access.
Get the attributes of an automount
pseudo filesystem.
Domain allowed access.
Search automount filesystem to use automatically
mounted filesystems.
Allow the specified domain to search mount points
that have filesystems that are mounted by
the automount service. Generally this will
be required for any domain that accesses objects
on these filesystems.
Domain allowed access.
Read directories of automatically
mounted filesystems.
Domain allowed access.
Do not audit attempts to list directories of automatically
mounted filesystems.
Domain to not audit.
Create, read, write, and delete symbolic links
on an autofs filesystem.
Domain allowed access.
Get the attributes of directories on
binfmt_misc filesystems.
Domain allowed access.
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
A common use for this is to
register a JVM as an interpreter for
Java byte code. Registered binaries
can be directly executed on a command line
without specifying the interpreter.
Domain allowed access.
Delete directories on cgroup.
Domain allowed access.
Mount a cgroup filesystem.
Domain allowed access.
Remount a cgroup filesystem This allows
some mount options to be changed.
Domain allowed access.
Unmount a cgroup file system.
Domain allowed access.
Get the attributes of a cgroup filesystem.
Domain allowed access.
Get attributes of cgroup files.
Domain allowed access.
Search cgroup directories.
Domain allowed access.
list dirs on cgroup
file systems.
Domain allowed access.
Manage dirs on cgroup file systems.
Domain allowed access.
Set attributes of files on cgroup
file systems.
Domain allowed access.
Read files on cgroup
file systems.
Domain allowed access.
Write files on cgroup
file systems.
Domain allowed access.
Read and write files on cgroup
file systems.
Domain allowed access.
Do not audit attempts to getattr,
open, read and write files on cgroup
file systems.
Domain to not audit.
Manage cgroup files.
Domain allowed access.
Mount on cgroup directories.
Domain allowed access.
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
Domain to not audit.
Mount a CIFS or SMB network filesystem.
Domain allowed access.
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
Domain allowed access.
Unmount a CIFS or SMB network filesystem.
Domain allowed access.
Get the attributes of a CIFS or
SMB network filesystem.
Domain allowed access.
Search directories on a CIFS or SMB filesystem.
Domain allowed access.
List the contents of directories on a
CIFS or SMB filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
Domain to not audit.
Mounton a CIFS filesystem.
Domain allowed access.
Read files on a CIFS or SMB filesystem.
Domain allowed access.
Read files on a CIFS or SMB filesystem.
Domain allowed access.
Get the attributes of filesystems that
do not have extended attribute support.
Domain allowed access.
Read all noxattrfs directories.
Domain allowed access.
Create, read, write, and delete all noxattrfs directories.
Domain allowed access.
Read all noxattrfs files.
Domain allowed access.
Dont audit attempts to write to noxattrfs files.
Domain allowed access.
Read/Write all inherited noxattrfs files.
Domain allowed access.
Create noxattrfs files.
Domain allowed access.
Create, read, write, and delete all noxattrfs files.
Domain allowed access.
Read all noxattrfs symbolic links.
Domain allowed access.
Do not audit attempts to read
files on a CIFS or SMB filesystem.
Domain to not audit.
Append files
on a CIFS filesystem.
Domain allowed access.
dontaudit Append files
on a CIFS filesystem.
Domain allowed access.
Read inherited files on a CIFS or SMB filesystem.
Domain to not audit.
Read/Write inherited files on a CIFS or SMB filesystem.
Domain allowed access.
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
Domain to not audit.
Read symbolic links on a CIFS or SMB filesystem.
Domain allowed access.
Read named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Read named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Execute files on a CIFS or SMB
network filesystem, in the caller
domain.
Domain allowed access.
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete files
on a CIFS or SMB network filesystem.
Domain to not audit.
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
Domain allowed access.
Execute a file on a CIFS or SMB filesystem
in the specified domain.
Execute a file on a CIFS or SMB filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on CIFS/SMB filesystems,
in particular used by the ssh-agent policy.
Domain allowed access.
The type of the new process.
Make general progams in cifs an entrypoint for
the specified domain.
The domain for which cifs_t is an entrypoint.
Create, read, write, and delete dirs
on a configfs filesystem.
Domain allowed access.
Create, read, write, and delete dirs
on a configfs filesystem.
Domain allowed access.
Create, read, write, and delete files
on a configfs filesystem.
Domain allowed access.
Mount a DOS filesystem, such as
FAT32 or NTFS.
Domain allowed access.
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
some mount options to be changed.
Domain allowed access.
Unmount a DOS filesystem, such as
FAT32 or NTFS.
Domain allowed access.
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
Domain allowed access.
Allow changing of the label of a
DOS filesystem using the context= mount option.
Domain allowed access.
Search dosfs filesystem.
Domain allowed access.
List dirs DOS filesystem.
Domain allowed access.
Create, read, write, and delete dirs
on a DOS filesystem.
Domain allowed access.
Read files on a DOS filesystem.
Domain allowed access.
Create, read, write, and delete files
on a DOS filesystem.
Domain allowed access.
Read eventpollfs files.
Read eventpollfs files
This interface has been deprecated, and will
be removed in the future.
Domain allowed access.
Mount a FUSE filesystem.
Domain allowed access.
Unmount a FUSE filesystem.
Domain allowed access.
Mounton a FUSEFS filesystem.
Domain allowed access.
Execute a file on a FUSE filesystem
in the specified domain.
Execute a file on a FUSE filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on FUSE filesystems,
in particular used by the ssh-agent policy.
Domain allowed to transition.
The type of the new process.
Get the attributes of a FUSEFS filesystem.
Domain allowed access.
Search directories
on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
Domain to not audit.
Create, read, write, and delete directories
on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a FUSEFS filesystem.
Domain to not audit.
Read, a FUSEFS filesystem.
Domain allowed access.
Create, read, write, and delete files
on a FUSEFS filesystem.
Domain allowed access.
Execute files on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a FUSEFS filesystem.
Domain to not audit.
Read symbolic links on a FUSEFS filesystem.
Domain allowed access.
Manage symbolic links on a FUSEFS filesystem.
Domain allowed access.
Get the attributes of an hugetlbfs
filesystem;
Domain allowed access.
Read hugetlbfs files.
Domain allowed access.
Read and write hugetlbfs files.
Domain allowed access.
Manage hugetlbfs dirs.
Domain allowed access.
List hugetlbfs dirs
Domain allowed access.
Allow the type to associate to hugetlbfs filesystems.
The type of the object to be associated.
Search inotifyfs filesystem.
Domain allowed access.
List inotifyfs filesystem.
Domain allowed access.
Dontaudit List inotifyfs filesystem.
Domain allowed access.
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Mount an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
some mount options to be changed.
Domain allowed access.
Unmount an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
Domain allowed access.
Read files on an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Read files on an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Mount a NFS filesystem.
Domain allowed access.
Remount a NFS filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a NFS filesystem.
Domain allowed access.
Get the attributes of a NFS filesystem.
Domain allowed access.
Search directories on a NFS filesystem.
Domain allowed access.
List NFS filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a NFS filesystem.
Domain to not audit.
Mounton a NFS filesystem.
Domain allowed access.
Read files on a NFS filesystem.
Domain allowed access.
Do not audit attempts to read
files on a NFS filesystem.
Domain to not audit.
Read files on a NFS filesystem.
Domain allowed access.
Execute files on a NFS filesystem.
Domain allowed access.
Make general progams in nfs an entrypoint for
the specified domain.
The domain for which nfs_t is an entrypoint.
Append files
on a NFS filesystem.
Domain allowed access.
dontaudit Append files
on a NFS filesystem.
Domain allowed access.
Read inherited files on a NFS filesystem.
Domain to not audit.
Read/write inherited files on a NFS filesystem.
Domain allowed access.
Do not audit attempts to read or
write files on a NFS filesystem.
Domain to not audit.
Read symbolic links on a NFS filesystem.
Domain allowed access.
Dontaudit read symbolic links on a NFS filesystem.
Domain allowed access.
Read named sockets on a NFS filesystem.
Domain allowed access.
Read named pipes on a NFS network filesystem.
Domain allowed access.
Read directories of RPC file system pipes.
Domain allowed access.
Search directories of RPC file system pipes.
Domain allowed access.
Search removable storage directories.
Domain allowed access.
Do not audit attempts to list removable storage directories.
Domain not to audit.
Read removable storage files.
Domain allowed access.
Do not audit attempts to read removable storage files.
Domain not to audit.
Do not audit attempts to write removable storage files.
Domain not to audit.
Read removable storage symbolic links.
Domain allowed access.
Read and write block nodes on removable filesystems.
Domain allowed access.
Read directories of RPC file system pipes.
Domain allowed access.
Read files of RPC file system pipes.
Domain allowed access.
Read symbolic links of RPC file system pipes.
Domain allowed access.
Read sockets of RPC file system pipes.
Domain allowed access.
Read and write sockets of RPC file system pipes.
Domain allowed access.
Create, read, write, and delete directories
on a NFS filesystem.
Domain allowed access.
Set the attributes of nfs directories.
Domain allowed access.
Create, read, write, and delete directories
on a NFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a NFS filesystem.
Domain to not audit.
Create, read, write, and delete files
on a NFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a NFS filesystem.
Domain to not audit.
Create, read, write, and delete symbolic links
on a NFS network filesystem.
Domain allowed access.
Create, read, write, and delete named pipes
on a NFS filesystem.
Domain allowed access.
Create, read, write, and delete named sockets
on a NFS filesystem.
Domain allowed access.
Execute a file on a NFS filesystem
in the specified domain.
Execute a file on a NFS filesystem
in the specified domain. This allows
the specified domain to execute any file
on a NFS filesystem in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on NFS filesystems,
in particular used by the ssh-agent policy.
Domain allowed access.
The type of the new process.
Mount a NFS server pseudo filesystem.
Domain allowed access.
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
Domain allowed access.
Unmount a NFS server pseudo filesystem.
Domain allowed access.
Get the attributes of a NFS server
pseudo filesystem.
Domain allowed access.
Search NFS server directories.
Domain allowed access.
List NFS server directories.
Domain allowed access.
Getattr files on an nfsd filesystem
Domain allowed access.
read files on an nfsd filesystem
Domain allowed access.
Read and write NFS server files.
Domain allowed access.
Allow the type to associate to ramfs filesystems.
The type of the object to be associated.
Mount a RAM filesystem.
Domain allowed access.
Remount a RAM filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a RAM filesystem.
Domain allowed access.
Get the attributes of a RAM filesystem.
Domain allowed access.
Search directories on a ramfs
Domain allowed access.
Dontaudit Search directories on a ramfs
Domain allowed access.
Create, read, write, and delete
directories on a ramfs.
Domain allowed access.
Dontaudit read on a ramfs files.
Domain allowed access.
Dontaudit read on a ramfs fifo_files.
Domain allowed access.
Create, read, write, and delete
files on a ramfs filesystem.
Domain allowed access.
Write to named pipe on a ramfs filesystem.
Domain allowed access.
Do not audit attempts to write to named
pipes on a ramfs filesystem.
Domain allowed access.
Read and write a named pipe on a ramfs filesystem.
Domain allowed access.
Create, read, write, and delete
named pipes on a ramfs filesystem.
Domain allowed access.
Write to named socket on a ramfs filesystem.
Domain allowed access.
Create, read, write, and delete
named sockets on a ramfs filesystem.
Domain allowed access.
Mount a ROM filesystem.
Domain allowed access.
Remount a ROM filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a ROM filesystem.
Domain allowed access.
Get the attributes of a ROM
filesystem.
Domain allowed access.
Mount a RPC pipe filesystem.
Domain allowed access.
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
Domain allowed access.
Unmount a RPC pipe filesystem.
Domain allowed access.
Get the attributes of a RPC pipe
filesystem.
Domain allowed access.
Read and write RPC pipe filesystem named pipes.
Domain allowed access.
Mount a tmpfs filesystem.
Domain allowed access.
Remount a tmpfs filesystem.
Domain allowed access.
Unmount a tmpfs filesystem.
Domain allowed access.
Get the attributes of a tmpfs
filesystem.
Domain allowed access.
Allow the type to associate to tmpfs filesystems.
The type of the object to be associated.
Get the attributes of tmpfs directories.
Domain allowed access.
Do not audit attempts to get the attributes
of tmpfs directories.
Domain allowed access.
Set the attributes of tmpfs directories.
Domain allowed access.
Search tmpfs directories.
Domain allowed access.
List the contents of generic tmpfs directories.
Domain allowed access.
Do not audit attempts to list the
contents of generic tmpfs directories.
Domain to not audit.
Create, read, write, and delete
tmpfs directories
Domain allowed access.
Create an object in a tmpfs filesystem, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to getattr
generic tmpfs files.
Domain to not audit.
Do not audit attempts to read or write
generic tmpfs files.
Domain to not audit.
Read and write generic tmpfs files.
Domain allowed access.
Create, read, write, and delete
auto moutpoints.
Domain allowed access.
Read generic tmpfs files.
Domain allowed access.
Read and write generic tmpfs files.
Domain allowed access.
Delete generic tmpfs files.
Domain allowed access.
Read tmpfs link files.
Domain allowed access.
Read and write character nodes on tmpfs filesystems.
Domain allowed access.
dontaudit Read and write character nodes on tmpfs filesystems.
Domain allowed access.
dontaudit Read and write block nodes on tmpfs filesystems.
Domain allowed access.
Relabel character nodes on tmpfs filesystems.
Domain allowed access.
Read and write block nodes on tmpfs filesystems.
Domain allowed access.
Relabel block nodes on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete generic
files on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete symbolic
links on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete socket
files on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete character
nodes on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete block nodes
on tmpfs filesystems.
Domain allowed access.
Mount a XENFS filesystem.
Domain allowed access.
Search the XENFS filesystem.
Domain allowed access.
Create, read, write, and delete directories
on a XENFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a XENFS filesystem.
Domain to not audit.
Create, read, write, and delete files
on a XENFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a XENFS filesystem.
Domain to not audit.
Mount all filesystems.
Domain allowed access.
Remount all filesystems. This
allows some mount options to be changed.
Domain allowed access.
Unmount all filesystems.
Domain allowed access.
Get the attributes of all filesystems.
Allow the specified domain to
et the attributes of all filesystems.
Example attributes:
- Type of the file system (e.g., ext3)
- Size of the file system
- Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes
all filesystems.
Domain to not audit.
Get the quotas of all filesystems.
The type of the domain getting quotas.
Set the quotas of all filesystems.
The type of the domain setting quotas.
Relabelfrom all filesystems.
Domain allowed access.
Get the attributes of all directories
with a filesystem type.
Domain allowed access.
Search all directories with a filesystem type.
Domain allowed access.
List all directories with a filesystem type.
Domain allowed access.
Get the attributes of all files with
a filesystem type.
Domain allowed access.
Get the attributes of all symbolic links with
a filesystem type.
Domain allowed access.
Get the attributes of all named pipes with
a filesystem type.
Domain allowed access.
Get the attributes of all named sockets with
a filesystem type.
Domain allowed access.
Get the attributes of all blk files with
a filesystem type.
Domain allowed access.
Get the attributes of all chr files with
a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all files with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
Domain allowed access.
Unconfined access to filesystems
Domain allowed access.
Relabel all objets from filesystems that
do not support extended attributes.
Domain allowed access.
Do not audit attempts to read or write
all leaked filesystems files.
Domain allowed access.
Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
This module has initial SIDs.
Allows to start userland processes
by transitioning to the specified domain.
The process type entered by kernel.
The executable type for the entrypoint.
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
The process type entered by kernel.
The executable type for the entrypoint.
Range for the domain.
Allows the kernel to mount filesystems on
the specified directory type.
The type of the directory to use as a mountpoint.
Set the process group of kernel threads.
Domain allowed access.
Set the priority of kernel threads.
Domain allowed access.
Send a SIGCHLD signal to kernel threads.
The type of the process sending the signal.
Send a kill signal to kernel threads.
The type of the process sending the signal.
Send a generic signal to kernel threads.
The type of the process sending the signal.
Send signull to kernel threads.
Domain allowed access.
Allows the kernel to share state information with
the caller.
The type of the process with which to share state information.
Permits caller to use kernel file descriptors.
The type of the process using the descriptors.
Do not audit attempts to use
kernel file descriptors.
The type of process not to audit.
Read and write kernel unnamed pipes.
Domain allowed access.
Read and write kernel unix datagram sockets.
Domain allowed access.
Send messages to kernel unix datagram sockets.
Domain allowed access.
Receive messages from kernel TCP sockets. (Deprecated)
Domain allowed access.
Send UDP network traffic to the kernel. (Deprecated)
Domain allowed access.
Receive messages from kernel UDP sockets. (Deprecated)
Domain allowed access.
Allows caller to load kernel modules
The process type to allow to load kernel modules.
Allow search the kernel key ring.
Domain allowed access.
dontaudit search the kernel key ring.
Domain allowed access.
Allow link to the kernel key ring.
Domain allowed access.
dontaudit link to the kernel key ring.
Domain allowed access.
Allows caller to read the ring buffer.
The process type allowed to read the ring buffer.
Do not audit attempts to read the ring buffer.
The domain to not audit.
Change the level of kernel messages logged to the console.
Domain allowed access.
Allows the caller to clear the ring buffer.
The process type clearing the buffer.
Allows caller to request the kernel to load a module
Allow the specified domain to request that the kernel
load a kernel module. An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
Domain allowed access.
Dontaudit caller request the kernel to load a module
Allow the specified domain to request that the kernel
load a kernel module. An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
Domain allowed access.
Get information on all System V IPC objects.
Domain allowed access.
Get the attributes of a kernel debugging filesystem.
Domain allowed access.
Mount a kernel debugging filesystem.
The type of the domain mounting the filesystem.
Unmount a kernel debugging filesystem.
The type of the domain unmounting the filesystem.
Remount a kernel debugging filesystem.
The type of the domain remounting the filesystem.
Search the contents of a kernel debugging filesystem.
Domain allowed access.
Do not audit attempts to search the kernel debugging filesystem.
Domain allowed access.
Read information from the debugging filesystem.
Domain allowed access.
Mount a kernel VM filesystem.
The type of the domain mounting the filesystem.
Unmount the proc filesystem.
The type of the domain unmounting the filesystem.
Get the attributes of the proc filesystem.
Domain allowed access.
Search directories in /proc.
Domain allowed access.
List the contents of directories in /proc.
Domain allowed access.
Do not audit attempts to list the
contents of directories in /proc.
Domain to not audit.
Get the attributes of files in /proc.
Domain allowed access.
Read generic symbolic links in /proc.
Allow the specified domain to read (follow) generic
symbolic links (symlinks) in the proc filesystem (/proc).
This interface does not include access to the targets of
these links. An example symlink is /proc/self.
Domain allowed access.
Allows caller to read system state information in /proc.
Allow the specified domain to read general system
state information from the proc filesystem (/proc).
Generally it should be safe to allow this access. Some
example files that can be read based on this interface:
- /proc/cpuinfo
- /proc/meminfo
- /proc/uptime
This does not allow access to sysctl entries (/proc/sys/*)
nor process state information (/proc/pid).
Domain allowed access.
Write to generic proc entries.
Domain allowed access.
Do not audit attempts by caller to
read system state information in proc.
The process type not to audit.
Allow caller to search virtual memory overcommit sysctls.
Domain allowed access.
Allow caller to read virtual memory overcommit sysctls.
Domain allowed access.
Read and write virtual memory overcommit sysctls.
Domain allowed access.
Allow searching of numa state directory.
Domain allowed access.
Do not audit attempts to search the numa
state directory.
Domain to not audit.
Allow caller to read the numa state information.
Domain allowed access.
Allow caller to read the numa state symbolic links.
Domain allowed access.
Allow caller to write numa state information.
Domain allowed access.
Do not audit attempts by caller to
read system state information in proc.
The process type not to audit.
Allow caller to read and write state information for AFS.
Domain allowed access.
Allow caller to read the state information for software raid.
The process type reading software raid state.
Allow caller to read and set the state information for software raid.
The process type reading software raid state.
Allows caller to get attribues of core kernel interface.
The process type getting the attibutes.
Do not audit attempts to get the attributes of
core kernel interfaces.
The process type to not audit.
Allows caller to read the core kernel interface.
Domain allowed access.
Allow caller to read kernel messages
using the /proc/kmsg interface.
The process type reading the messages.
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
The process type getting the attributes.
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
The process type not to audit.
Do not audit attempts to search the network
state directory.
The process type reading the state.
Allow searching of network state directory.
The process type reading the state.
Read the network state information.
Allow the specified domain to read the networking
state information. This includes several pieces
of networking information, such as network interface
names, netfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
Domain allowed access.
Allow caller to read the network state symbolic links.
The process type reading the state.
Allow searching of xen state directory.
The process type reading the state.
Do not audit attempts to search the xen
state directory.
The process type reading the state.
Allow caller to read the xen state information.
The process type reading the state.
Allow caller to read the xen state symbolic links.
The process type reading the state.
Allow caller to write xen state information.
The process type writing the state.
Allow attempts to list all proc directories.
Domain to not audit.
Do not audit attempts to list all proc directories.
Domain to not audit.
Do not audit attempts by caller to search
the base directory of sysctls.
The process type not to audit.
Allow access to read sysctl directories.
The process type to allow to read sysctl directories.
Allow caller to read the device sysctls.
The process type to allow to read the device sysctls.
Read and write device sysctls.
Domain allowed access.
Allow caller to search virtual memory sysctls.
Domain allowed access.
Allow caller to read virtual memory sysctls.
Domain allowed access.
Read and write virtual memory sysctls.
Domain allowed access.
Search network sysctl directories.
Domain allowed access.
Do not audit attempts by caller to search network sysctl directories.
The process type not to audit.
Allow caller to read network sysctls.
Domain allowed access.
Allow caller to modiry contents of sysctl network files.
Domain allowed access.
Allow caller to read unix domain
socket sysctls.
Domain allowed access.
Read and write unix domain
socket sysctls.
Domain allowed access.
Read the hotplug sysctl.
Domain allowed access.
Read and write the hotplug sysctl.
Domain allowed access.
Read the modprobe sysctl.
Domain allowed access.
Read and write the modprobe sysctl.
Domain allowed access.
Do not audit attempts to search generic kernel sysctls.
Domain to not audit.
Read generic crypto sysctls.
Domain allowed access.
Read general kernel sysctls.
Allow the specified domain to read general
kernel sysctl settings. These settings are typically
read using the sysctl program. The settings
that are included by this interface are prefixed
with "kernel.", for example, kernel.sysrq.
This does not include access to the hotplug
handler setting (kernel.hotplug)
nor the module installer handler setting
(kernel.modprobe).
Related interfaces:
- kernel_rw_kernel_sysctl()
Domain allowed access.
Do not audit attempts to write generic kernel sysctls.
Domain to not audit.
Read and write generic kernel sysctls.
Domain allowed access.
Read filesystem sysctls.
Domain allowed access.
Read and write fileystem sysctls.
Domain allowed access.
Read IRQ sysctls.
Domain allowed access.
Read and write IRQ sysctls.
Domain allowed access.
Read RPC sysctls.
Domain allowed access.
Read and write RPC sysctls.
Domain allowed access.
Do not audit attempts to list all sysctl directories.
Domain to not audit.
Allow caller to read all sysctls.
Domain allowed access.
Read and write all sysctls.
Domain allowed access.
Send a kill signal to unlabeled processes.
Domain allowed access.
Mount a kernel unlabeled filesystem.
The type of the domain mounting the filesystem.
Unmount a kernel unlabeled filesystem.
Domain allowed access.
Send general signals to unlabeled processes.
Domain allowed access.
Send a null signal to unlabeled processes.
Domain allowed access.
Send a stop signal to unlabeled processes.
Domain allowed access.
Send a child terminated signal to unlabeled processes.
Domain allowed access.
List unlabeled directories.
Domain allowed access.
Read the process state (/proc/pid) of all unlabeled_t.
Domain allowed access.
Do not audit attempts to list unlabeled directories.
Domain allowed access.
Read and write unlabeled directories.
Domain allowed access.
Read and write unlabeled files.
Domain allowed access.
Do not audit attempts by caller to get the
attributes of an unlabeled file.
The process type not to audit.
Do not audit attempts by caller to
read an unlabeled file.
Domain to not audit.
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
The process type not to audit.
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
The process type not to audit.
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
The process type not to audit.
Do not audit attempts by caller to get attributes for
unlabeled block devices.
The process type not to audit.
Read and write unlabeled block device nodes.
Domain allowed access.
Read and write unlabeled sockets.
Domain allowed access.
Do not audit attempts by caller to get attributes for
unlabeled character devices.
The process type not to audit.
Allow caller to relabel unlabeled directories.
Domain allowed access.
Allow caller to relabel unlabeled filesystems.
Domain allowed access.
Allow caller to relabel unlabeled files.
Domain allowed access.
Allow caller to relabel unlabeled symbolic links.
Domain allowed access.
Allow caller to relabel unlabeled named pipes.
Domain allowed access.
Allow caller to relabel unlabeled named sockets.
Domain allowed access.
Send and receive messages from an
unlabeled IPSEC association.
Send and receive messages from an
unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
The corenetwork interface
corenet_non_ipsec_sendrecv() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
The corenetwork interface
corenet_dontaudit_non_ipsec_sendrecv() should
be used instead of this one.
Domain to not audit.
Receive TCP packets from an unlabeled connection.
Receive TCP packets from an unlabeled connection.
The corenetwork interface corenet_tcp_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Receive UDP packets from an unlabeled connection.
Receive UDP packets from an unlabeled connection.
The corenetwork interface corenet_udp_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Receive Raw IP packets from an unlabeled connection.
Receive Raw IP packets from an unlabeled connection.
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Read/Write Raw IP packets from an unlabeled connection.
Receive Raw IP packets from an unlabeled connection.
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Send and receive unlabeled packets.
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
The corenetwork interface
corenet_sendrecv_unlabeled_packets() should
be used instead of this one.
Domain allowed access.
Receive packets from an unlabeled peer.
Receive packets from an unlabeled peer, these packets do not have any
peer labeling information present.
The corenetwork interface corenet_recvfrom_unlabeled_peer() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive packets from an unlabeled peer.
Do not audit attempts to receive packets from an unlabeled peer,
these packets do not have any peer labeling information present.
The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
should be used instead of this one.
Domain to not audit.
Relabel from unlabeled database objects.
Domain allowed access.
Relabel to unlabeled context .
Domain allowed access.
Unconfined access to kernel module resources.
Domain allowed access.
Allow the specified domain to read/write on
the kernel with a unix socket.
Domain allowed access.
Allow the specified domain to connect to
the kernel with a unix socket.
Domain allowed access.
Make the specified type usable for regular entries in proc
Type to be used for /proc entries.
Multicategory security policy
Contains attributes used in MCS policy.
This domain is allowed to read files and directories
regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to write files and directories
regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to sigkill and sigstop
all domains regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to ptrace
all domains regardless of their MCS
category set.
Domain target for user exemption.
Make specified domain MCS trusted
for setting any category set for
the processes it executes.
Domain target for user exemption.
Make specified process type MCS untrusted.
Make specified process type MCS untrusted. This
prevents this process from sending signals to other processes
with different mcs labels
object.
The type of the process.
Make specified domain MCS trusted
for writing to sockets at any level.
Domain allowed access.
Multilevel security policy
This module contains interfaces for handling multilevel
security. The interfaces allow the specified subjects
and objects to be allowed certain privileges in the
MLS rules.
Contains attributes used in MLS policy.
Make specified domain MLS trusted
for reading from files up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from files at all levels. (Deprecated)
Make specified domain MLS trusted
for reading from files at all levels.
This interface has been deprecated, please use
mls_file_read_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for reading from files at all levels.
Domain allowed access.
Make specified domain MLS trusted
for write to files up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to files at all levels. (Deprecated)
Make specified domain MLS trusted
for writing to files at all levels.
This interface has been deprecated, please use
mls_file_write_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for writing to files at all levels.
Domain allowed access.
Make specified domain MLS trusted
for raising the level of files.
Domain allowed access.
Make specified domain MLS trusted
for lowering the level of files.
Domain allowed access.
Make specified domain trusted to
be written to within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
Domain allowed access.
Make specified domain MLS trusted
for reading from sockets at any level.
Domain allowed access.
Make specified domain MLS trusted
for reading from sockets at any level
that is dominated by the process clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to sockets up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to sockets at any level.
Domain allowed access.
Make specified domain MLS trusted
for receiving network data from
network interfaces or hosts at any level.
Domain allowed access.
Make specified domain trusted to
write to network objects within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
Domain allowed access.
Make specified domain trusted to
write inbound packets regardless of the
network's or node's MLS range.
Domain allowed access.
Make specified domain trusted to
write outbound packets regardless of the
network's or node's MLS range.
Domain allowed access.
Make specified domain MLS trusted
for reading from System V IPC objects
up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from System V IPC objects
at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to System V IPC objects
up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to System V IPC objects
at any level.
Domain allowed access.
Allow the specified domain to do a MLS
range transition that changes
the current level.
Domain allowed access.
Make specified domain a target domain
for MLS range transitions that change
the current level.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes at all levels. (Deprecated)
Make specified domain MLS trusted
for reading from processes at all levels.
This interface has been deprecated, please use
mls_process_read_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes at all levels.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes at all levels. (Deprecated)
Make specified domain MLS trusted
for writing to processes at all levels.
This interface has been deprecated, please use
mls_process_write_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes at all levels.
Domain allowed access.
Make specified domain MLS trusted
for setting the level of processes
it executes.
Domain allowed access.
Make specified domain MLS trusted
for reading from X objects up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from X objects at any level.
Domain allowed access.
Make specified domain MLS trusted
for write to X objects up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to X objects at any level.
Domain allowed access.
Make specified domain MLS trusted
for reading from X colormaps at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to X colormaps at any level.
Domain allowed access.
Make specified object MLS trusted.
Make specified object MLS trusted. This
allows all levels to read and write the
object.
This currently only applies to filesystem
objects, for example, files and directories.
The type of the object.
Make the specified domain trusted
to inherit and use file descriptors
from all levels.
Domain allowed access.
Make the file descriptors from the
specifed domain inheritable by
all levels.
Domain allowed access.
Make specified domain MLS trusted
for translating contexts at all levels.
Domain allowed access.
Make specified domain MLS trusted
for reading from databases at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to databases at any level.
Domain allowed access.
Make specified domain MLS trusted
for raising the level of databases.
Domain allowed access.
Make specified domain MLS trusted
for lowering the level of databases.
Domain allowed access.
Make specified domain MLS trusted
for sending dbus messages to
all levels.
Domain allowed access.
Make specified domain MLS trusted
for receiving dbus messages from
all levels.
Domain allowed access.
Policy for kernel security interface, in particular, selinuxfs.
Contains the policy for the kernel SELinux security interface.
Make the specified type used for labeling SELinux Booleans.
This interface is only usable in the base module.
Make the specified type used for labeling SELinux Booleans.
This makes use of genfscon statements, which are only
available in the base module. Thus any module which calls this
interface must be included in the base module.
Type used for labeling a Boolean.
Name of the Boolean.
Get the mountpoint of the selinuxfs filesystem.
Domain allowed access.
Do not audit attempts to get the mountpoint
of the selinuxfs filesystem.
Domain to not audit.
Get the attributes of the selinuxfs filesystem
Domain allowed access.
Do not audit attempts to get the
attributes of the selinuxfs filesystem
Domain to not audit.
Do not audit attempts to get the
attributes of the selinuxfs directory.
Domain to not audit.
Search selinuxfs.
Domain allowed access.
Do not audit attempts to search selinuxfs.
Domain to not audit.
Do not audit attempts to read
generic selinuxfs entries
Domain to not audit.
Allows the caller to get the mode of policy enforcement
(enforcing or permissive mode).
The process type to allow to get the enforcing mode.
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
Since this is a security event, this action is
always audited.
The process type to allow to set the enforcement mode.
Allow caller to load the policy into the kernel.
The process type that will load the policy.
Allow caller to read the policy from the kernel.
Domain allowed access.
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy. (Deprecated)
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
This interface has been deprecated. Please use
selinux_set_generic_booleans() or selinux_set_all_booleans()
instead.
The process type allowed to set the Boolean.
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
The process type allowed to set the Boolean.
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
The process type allowed to set the Boolean.
Allow caller to set SELinux access vector cache parameters.
Allow caller to set SELinux access vector cache parameters.
The allows the domain to set performance related parameters
of the AVC, such as cache threshold.
Since this is a security event, this action is
always audited.
The process type to allow to set security parameters.
Allows caller to validate security contexts.
The process type permitted to validate contexts.
Do not audit attempts to validate security contexts.
Domain to not audit.
Allows caller to compute an access vector.
The process type allowed to compute an access vector.
Calculate the default type for object creation.
Domain allowed access.
Allows caller to compute polyinstatntiated
directory members.
Domain allowed access.
Calculate the context for relabeling objects.
Calculate the context for relabeling objects.
This is determined by using the type_change
rules in the policy, and is generally used
for determining the context for relabeling
a terminal when a user logs in.
Domain allowed access.
Allows caller to compute possible contexts for a user.
The process type allowed to compute user contexts.
Unconfined access to the SELinux kernel security server.
Domain allowed access.
Generate a file context for a boolean type
Domain allowed access.
Policy controlling access to storage devices
Allow the caller to get the attributes of fixed disk
device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to get
the attributes of fixed disk device nodes.
The type of the process to not audit.
Allow the caller to set the attributes of fixed disk
device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to set
the attributes of fixed disk device nodes.
The type of the process to not audit.
Allow the caller to directly read from a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts made by the caller to read
fixed disk device nodes.
The type of the process to not audit.
Allow the caller to directly write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts made by the caller to write
fixed disk device nodes.
Domain to not audit.
Allow the caller to directly read and write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
Domain allowed access.
Allow the caller to create fixed disk device nodes.
Domain allowed access.
Allow the caller to create fixed disk device nodes.
Domain allowed access.
Create, read, write, and delete fixed disk device nodes.
The type of the process performing this action.
Create block devices in /dev with the fixed disk type
via an automatic type transition.
The type of the process performing this action.
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
The type of the process performing this action.
Relabel fixed disk device nodes.
The type of the process performing this action.
Enable a fixed disk device as swap space
The type of the process performing this action.
Allow the caller to get the attributes
of device nodes of fuse devices.
The type of the process performing this action.
read or write fuse device interfaces.
Domain to not audit.
Do not audit attempts to read or write
fuse device interfaces.
Domain to not audit.
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
The type of the process performing this action.
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
The type of the process performing this action.
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Set attributes of the device nodes
for the SCSI generic inerface.
The type of the process performing this action.
Do not audit attempts to read or write
SCSI generic device interfaces.
Domain to not audit.
Allow the caller to get the attributes of removable
devices device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
The type of the process to not audit.
Do not audit attempts made by the caller to read
removable devices device nodes.
The type of the process to not audit.
Do not audit attempts made by the caller to write
removable devices device nodes.
The type of the process to not audit.
Allow the caller to set the attributes of removable
devices device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
The type of the process to not audit.
Allow the caller to directly read from
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts to directly read removable devices.
Domain to not audit.
Allow the caller to directly write to
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts to directly write removable devices.
Domain to not audit.
Allow the caller to directly read
a tape device.
The type of the process performing this action.
Allow the caller to directly read
a tape device.
The type of the process performing this action.
Allow the caller to get the attributes
of device nodes of tape devices.
The type of the process performing this action.
Allow the caller to set the attributes
of device nodes of tape devices.
The type of the process performing this action.
Unconfined access to storage devices.
Domain allowed access.
Policy for terminals.
Depended on by other required modules.
Transform specified type into a pty type.
An object type that will applied to a pty.
Transform specified type into an user
pty type. This allows it to be relabeled via
type change by login programs such as ssh.
The type of the user domain associated with
this pty.
An object type that will applied to a pty.
Transform specified type into a pty type
used by login programs, such as sshd.
An object type that will applied to a pty.
Transform specified type into a tty type.
An object type that will applied to a tty.
Transform specified type into a user tty type.
User domain that is related to this tty.
An object type that will applied to a tty.
Create a pty in the /dev/pts directory.
The type of the process creating the pty.
The type of the pty.
Write the console, all
ttys and all ptys.
Domain allowed access.
Read and write the console, all
ttys and all ptys.
Domain allowed access.
Write to the console.
Domain allowed access.
Read from the console.
Domain allowed access.
Do not audit attempts to read from the console.
Domain allowed access.
Read from and write to the console.
Domain allowed access.
Do not audit attemtps to read from
or write to the console.
Domain allowed access.
Set the attributes of the console
device node.
Domain allowed access.
Relabel from and to the console type.
Domain allowed access.
Relabel from and to the console type.
Domain allowed access.
Create the console device (/dev/console).
Domain allowed access.
Get the attributes of a pty filesystem
Domain allowed access.
Do not audit attempts to get the
attributes of the /dev/pts directory.
The type of the process to not audit.
Search the contents of the /dev/pts directory.
Domain allowed access.
Do not audit attempts to search the
contents of the /dev/pts directory.
Domain allowed access.
Read the /dev/pts directory to
list all ptys.
Domain allowed access.
Do not audit attempts to read the
/dev/pts directory.
The type of the process to not audit.
Do not audit attempts to create, read,
write, or delete the /dev/pts directory.
The type of the process to not audit.
Do not audit attempts to get the attributes
of generic pty devices.
The type of the process to not audit.
ioctl of generic pty devices.
Domain allowed access.
Allow setting the attributes of
generic pty devices.
Domain allowed access.
Dontaudit setting the attributes of
generic pty devices.
Domain allowed access.
Read and write the generic pty
type. This is generally only used in
the targeted policy.
Domain allowed access.
Dot not audit attempts to read and
write the generic pty type. This is
generally only used in the targeted policy.
The type of the process to not audit.
Set the attributes of the tty device
Domain allowed access.
Read and write the controlling
terminal (/dev/tty).
Domain allowed access.
Read and write the pty multiplexor (/dev/ptmx).
The type of the process to allow access.
Do not audit attempts to get attributes
on the pty multiplexor (/dev/ptmx).
The type of the process to not audit.
Do not audit attempts to read and
write the pty multiplexor (/dev/ptmx).
The type of the process to not audit.
Get the attributes of all
pty device nodes.
Domain allowed access.
Do not audit attempts to get the
attributes of any pty
device nodes.
Domain allowed access.
Set the attributes of all
pty device nodes.
Domain allowed access.
Relabel to all ptys.
Domain allowed access.
Write to all ptys.
Domain allowed access.
Read and write all ptys.
Domain allowed access.
Do not audit attempts to read or write any ptys.
Domain to not audit.
Relabel from and to all pty device nodes.
Domain allowed access.
Get the attributes of all user
pty device nodes. (Deprecated)
Domain allowed access.
Do not audit attempts to get the
attributes of any user pty
device nodes. (Deprecated)
Domain allowed access.
Set the attributes of all user
pty device nodes. (Deprecated)
Domain allowed access.
Relabel to all user ptys. (Deprecated)
Domain allowed access.
Write to all user ptys. (Deprecated)
Domain allowed access.
Read and write all user ptys. (Deprecated)
Domain allowed access.
Do not audit attempts to read any
user ptys. (Deprecated)
The type of the process to not audit.
Relabel from and to all user
user pty device nodes. (Deprecated)
Domain allowed access.
Get the attributes of all unallocated
tty device nodes.
Domain allowed access.
Do not audit attempts to get the attributes
of all unallocated tty device nodes.
Domain allowed access.
Set the attributes of all unallocated
tty device nodes.
Domain allowed access.
Do not audit attempts to set the attributes
of unallocated tty device nodes.
Domain allowed access.
Do not audit attempts to ioctl
unallocated tty device nodes.
Domain allowed access.
Relabel from and to the unallocated
tty type.
Domain allowed access.
Relabel from all user tty types to
the unallocated tty type.
Domain allowed access.
Append to unallocated ttys.
Domain allowed access.
Write to unallocated ttys.
Domain allowed access.
Read and write unallocated ttys.
Domain allowed access.
Do not audit attempts to read or
write unallocated ttys.
The type of the process to not audit.
Get the attributes of all tty device nodes.
Domain allowed access.
Do not audit attempts to get the
attributes of any tty device nodes.
Domain allowed access.
Set the attributes of all tty device nodes.
Domain allowed access.
Relabel from and to all tty device nodes.
Domain allowed access.
Write to all ttys.
Domain allowed access.
Read and write all ttys.
Domain allowed access.
Do not audit attempts to read or write
any ttys.
Domain allowed access.
Get the attributes of all user tty
device nodes. (Deprecated)
Domain allowed access.
Do not audit attempts to get the
attributes of any user tty
device nodes. (Deprecated)
Domain allowed access.
Set the attributes of all user tty
device nodes. (Deprecated)
Domain allowed access.
Relabel from and to all user
user tty device nodes. (Deprecated)
Domain allowed access.
Write to all user ttys. (Deprecated)
Domain allowed access.
Read and write all user to all user ttys. (Deprecated)
Domain allowed access.
Do not audit attempts to read or write
any user ttys. (Deprecated)
Domain allowed access.
Getattr on the virtio console.
Domain allowed access.
Read from and write to the virtio console.
Domain allowed access.
User-based access control policy
Contains attributes used in UBAC policy.
Constrain by user-based access control (UBAC).
Constrain the specified type by user-based
access control (UBAC). Typically, these are
user processes or user files that need to be
differentiated by SELinux user. Normally this
does not include administrative or privileged
programs. For the UBAC rules to be enforced,
both the subject (source) type and the object
(target) types must be UBAC constrained.
Type to be constrained by UBAC.
Exempt user-based access control for files.
Domain to be exempted.
Exempt user-based access control for processes.
Domain to be exempted.
Exempt user-based access control for file descriptors.
Domain to be exempted.
Exempt user-based access control for sockets.
Domain to be exempted.
Exempt user-based access control for SysV IPC.
Domain to be exempted.
Exempt user-based access control for X Windows.
Domain to be exempted.
Exempt user-based access control for dbus.
Domain to be exempted.
Exempt user-based access control for keys.
Domain to be exempted.
Exempt user-based access control for databases.
Domain to be exempted.
Policy for allowing confined domains to use unlabeled_t packets
Policy modules for user roles.
Audit administrator role
Change to the audit administrator role.
Role allowed access.
Change from the audit administrator role.
Change from the audit administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Database administrator role
Change to the database administrator role.
Role allowed access.
Change from the database administrator role.
Change from the web administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Least privledge terminal user
Change to the guest role.
Role allowed access.
Change from the guest role.
Change from the guest role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Log administrator role
Change to the log administrator role.
Role allowed access.
Change from the log administrator role.
Change from the log administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Security administrator role
Change to the security administrator role.
Role allowed access.
Change from the security administrator role.
Change from the security administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Administrator's unprivileged user
Change to the staff role.
Role allowed access.
Change from the staff role.
Change from the staff role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
General system administration role
Change to the system administrator role.
Role allowed access.
Change from the system administrator role.
Change from the system administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Execute a shell in the sysadm domain.
Domain allowed access.
Execute a generic bin program in the sysadm domain.
Domain allowed access.
Execute all entrypoint files in the sysadm domain. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Allow sysadm to execute all entrypoint files in
a specified domain. This is an explicit transition,
requiring the caller to use setexeccon().
Allow sysadm to execute all entrypoint files in
a specified domain. This is an explicit transition,
requiring the caller to use setexeccon().
This is a interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain allowed access.
Allow sysadm to execute a generic bin program in
a specified domain. This is an explicit transition,
requiring the caller to use setexeccon().
Allow sysadm to execute a generic bin program in
a specified domain.
This is a interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain to execute in.
Send a SIGCHLD signal to sysadm users.
Domain allowed access.
Inherit and use sysadm file descriptors
Domain allowed access.
Read and write sysadm user unnamed pipes.
Domain allowed access.
Allow sysadm to debug or ptrace all processes.
No Interfaces
Unconfiend user role
Change from the unconfineduser role.
Change from the unconfineduser role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Transition to the unconfined domain.
Domain allowed access.
Execute specified programs in the unconfined domain.
The type of the process performing this action.
The role to allow the unconfined domain.
Transition to the unconfined domain by executing a shell.
Domain allowed access.
Allow unconfined to execute the specified program in
the specified domain.
Allow unconfined to execute the specified program in
the specified domain.
This is a interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain to execute in.
Domain entry point file.
Allow unconfined to execute the specified program in
the specified domain. Allow the specified domain the
unconfined role and use of unconfined user terminals.
Allow unconfined to execute the specified program in
the specified domain. Allow the specified domain the
unconfined role and use of unconfined user terminals.
This is a interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain to execute in.
Domain entry point file.
Inherit file descriptors from the unconfined domain.
Domain allowed access.
Send a SIGCHLD signal to the unconfined domain.
Domain allowed access.
Send a SIGNULL signal to the unconfined domain.
Domain allowed access.
Send a SIGNULL signal to the unconfined execmem domain.
Domain allowed access.
Send a signal to the unconfined execmem domain.
Domain allowed access.
Send generic signals to the unconfined domain.
Domain allowed access.
Read unconfined domain unnamed pipes.
Domain allowed access.
Do not audit attempts to read unconfined domain unnamed pipes.
Domain allowed access.
Read and write unconfined domain unnamed pipes.
Domain allowed access.
Do not audit attempts to read and write
unconfined domain unnamed pipes.
Domain to not audit.
Do not audit attempts to read and write
unconfined domain netlink_route_socket.
Domain to not audit.
Do not audit attempts to read and write
unconfined domain stream.
Domain to not audit.
Allow attempts to read and write
unconfined domain stream.
Domain to not audit.
Connect to the unconfined domain using
a unix domain stream socket.
Domain allowed access.
Do not audit attempts to read or write
unconfined domain tcp sockets.
Do not audit attempts to read or write
unconfined domain tcp sockets.
This interface was added due to a broken
symptom in ldconfig.
Domain to not audit.
Do not audit attempts to read or write
unconfined domain packet sockets.
Do not audit attempts to read or write
unconfined domain packet sockets.
This interface was added due to a broken
symptom.
Domain to not audit.
Create keys for the unconfined domain.
Domain allowed access.
Send messages to the unconfined domain over dbus.
Domain allowed access.
Send and receive messages from
unconfined_t over dbus.
Domain allowed access.
Connect to the the unconfined DBUS
for service (acquire_svc).
Domain allowed access.
Connect to the the unconfined DBUS
Domain allowed access.
Allow ptrace of unconfined domain
Domain allowed access.
Read and write to unconfined shared memory.
The type of the process performing this action.
Read and write to unconfined execmem shared memory.
The type of the process performing this action.
Transition to the unconfined_execmem domain.
Domain allowed access.
execute the execmem applications
Domain allowed access.
Allow apps to set rlimits on userdomain
Domain allowed access.
Get the process group of unconfined.
Domain allowed access.
Change to the unconfined role.
Role allowed access.
Allow domain to attach to TUN devices created by unconfined_t users.
Domain allowed access.
Transition to confined nsplugin domains from unconfined user
Allow a user to login as an unconfined domain
Ignore unconfined mmap_zero errors
Allow unconfined users to transition to the Mozilla plugin domain when running xulrunner plugin-container.
Generic unprivileged user
Change to the generic user role.
Role allowed access.
Change from the generic user role.
Change from the generic user role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Web administrator role
Change to the web administrator role.
Role allowed access.
Change from the web administrator role.
Change from the web administrator role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Allow webadm to manage files in users home directories
Allow webadm to read files in users home directories
Least priviledged X user
Change to the xguest role.
Role allowed access.
Change from the xguest role.
Change from the xguest role to
the specified role.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Role allowed access.
Allow xguest users to mount removable media
Allow xguest to configure Network Manager and connect to apache ports
Allow xguest to use blue tooth devices
Policy modules for system services, like cron, and network services,
like sshd.
ABRT - automated bug-reporting tool
Execute abrt in the abrt domain.
Domain allowed to transition.
Execute abrt in the caller domain.
Domain allowed access.
Send a null signal to abrt.
Domain allowed access.
Allow the domain to read abrt state files in /proc.
Domain allowed access.
Connect to abrt over an unix stream socket.
Domain allowed access.
Send and receive messages from
abrt over dbus.
Domain allowed access.
Execute abrt-helper in the abrt-helper domain.
Domain allowed to transition.
Execute abrt helper in the abrt_helper domain, and
allow the specified role the abrt_helper domain.
Domain allowed to transition.
Role allowed access.
Read abrt cache
Domain allowed access.
Append abrt cache
Domain allowed access.
Manage abrt cache
Domain allowed access.
Read abrt configuration file.
Domain allowed access.
Read abrt logs.
Domain allowed access.
Read abrt PID files.
Domain allowed access.
Create, read, write, and delete abrt PID files.
Domain allowed access.
Read and write abrt fifo files.
Domain allowed access.
All of the rules required to administrate
an abrt environment
Domain allowed access.
The role to be allowed to manage the abrt domain.
Execute abrt-retrace in the abrt-retrace domain.
Domain allowed to transition.
Manage abrt retrace server cache
Domain allowed access.
Read abrt retrace server cache
Domain allowed access.
Read abrt retrace server cache
Domain allowed access.
Allow ABRT to modify public files
used for public file transfer services.
Allow ABRT to run in abrt_handle_event_t domain
to handle ABRT event scripts
Andrew Filesystem server
Execute a domain transition to run the
afs client.
Domain allowed to transition.
Read and write afs client UDP sockets.
Domain allowed access.
read/write afs cache files
Domain allowed to transition.
Execute afs server in the afs domain.
The type of the process performing this action.
All of the rules required to administrate
an afs environment
Domain allowed access.
The role to be allowed to manage the afs domain.
Automatic IPv6 Connectivity Client Utility.
Execute a domain transition to run aiccu.
Domain allowed to transition.
Execute aiccu server in the aiccu domain.
Domain allowed to transition.
Read aiccu PID files.
Domain allowed access.
Manage aiccu PID files.
Domain allowed access.
All of the rules required to administrate
an aiccu environment
Domain allowed access.
Role allowed access.
Aide filesystem integrity checker
Execute aide in the aide domain
Domain allowed access.
Execute aide programs in the AIDE domain.
Domain allowed access.
The role to allow the AIDE domain.
All of the rules required to administrate
an aide environment
Domain allowed access.
SELinux policy for Aisexec Cluster Engine
Execute a domain transition to run aisexec.
Domain allowed to transition.
Connect to aisexec over a unix domain
stream socket.
Domain allowed access.
Allow the specified domain to read aisexec's log files.
Domain allowed access.
All of the rules required to administrate
an aisexec environment
Domain allowed access.
The role to be allowed to manage the aisexecd domain.
Daemon that interfaces mail transfer agents and content
checkers, such as virus scanners.
Execute a domain transition to run amavis.
Domain allowed to transition.
Execute amavis server in the amavis domain.
Domain allowed access.
Read amavis spool files.
Domain allowed access.
Manage amavis spool files.
Domain allowed access.
Create objects in the amavis spool directories
with a private type.
Domain allowed access.
Private file type.
Class of the object being created.
Search amavis lib directories.
Domain allowed access.
Read amavis lib files.
Domain allowed access.
Create, read, write, and delete
amavis lib files.
Domain allowed access.
Set the attributes of amavis pid files.
Domain allowed access.
Create of amavis pid files.
Domain allowed access.
Write of amavis pid files.
Domain allowed access.
Write of amavis pid files.
Domain allowed access.
All of the rules required to administrate
an amavis environment
Domain allowed access.
Role allowed access.
Allow amavis to use JIT compiler
SELinux policy for antivirus programs - amavis, clamd, freshclam and clamscan
Creates types and rules for a basic
antivirus domain.
Domain type.
Execute a domain transition to run antivirus program.
Domain allowed to transition.
Execute antivirus program without a transition.
Domain allowed access.
Connect to run antivirus program.
Domain allowed access.
Allow the specified domain to append
to antivirus log files.
Domain allowed access.
Read antivirus configuration files.
Domain allowed access.
Search antivirus db content directories.
Domain allowed access.
Read antivirus db content directories.
Domain allowed access.
Read and write antivirus db content directories.
Domain allowed access.
Manage antivirus db content directories.
Domain allowed access.
Manage antivirus pid content.
Domain allowed access.
Read antivirus state files.
Domain allowed access.
All of the rules required to administrate
an antivirus programs environment
Domain allowed access.
The role to be allowed to manage the clamav domain.
Allow antivirus programs to read non security files on a system
Determine whether can antivirus programs use JIT compiler.
Apache web server
Create a set of derived types for apache
web content.
The prefix to be used for deriving type names.
Role access for apache
Role allowed access
User domain for the role
Read httpd user scripts executables.
Domain allowed access.
Read user web content.
Domain allowed access.
Read user web content.
Domain allowed access.
Transition to apache.
Domain allowed access.
Allow the specified domain to execute apache
in the caller domain.
Domain allowed access.
Send a generic signal to apache.
Domain allowed access.
Send a null signal to apache.
Domain allowed access.
Send a SIGCHLD signal to apache.
Domain allowed access.
Inherit and use file descriptors from Apache.
Domain allowed access.
Do not audit attempts to read and write Apache
unnamed pipes.
Domain allowed access.
Do not audit attempts to read and write Apache
unix domain stream sockets.
Domain allowed access.
Do not audit attempts to read and write Apache
TCP sockets.
Domain allowed access.
Create, read, write, and delete all web content.
Domain allowed access.
Allow domain to set the attributes
of the APACHE cache directory.
Domain allowed access.
Allow the specified domain to list
Apache cache.
Domain allowed access.
Allow the specified domain to read
and write Apache cache files.
Domain allowed access.
Allow the specified domain to delete
Apache cache dirs.
Domain allowed access.
Allow the specified domain to delete
Apache cache.
Domain allowed access.
Allow the specified domain to search
apache configuration dirs.
Domain allowed access.
Allow the specified domain to read
apache configuration files.
Domain allowed access.
Allow the specified domain to manage
apache configuration files.
Domain allowed access.
Execute the Apache helper program with
a domain transition.
Domain allowed access.
Execute the Apache helper program with
a domain transition, and allow the
specified role the Apache helper domain.
Domain allowed access.
Role allowed access.
dontaudit attempts to read
apache log files.
Domain allowed access.
Allow the specified domain to read
apache log files.
Domain allowed access.
Allow the specified domain to append
to apache log files.
Domain allowed access.
Do not audit attempts to append to the
Apache logs.
Domain to not audit.
Allow the specified domain to write
to apache log files.
Domain allowed access.
Allow the specified domain to manage
to apache log files.
Domain allowed access.
Do not audit attempts to search Apache
module directories.
Domain to not audit.
Allow the specified domain to list
the contents of the apache modules
directory.
Domain allowed access.
Allow the specified domain to read
the apache modules files.
directory.
Domain allowed access.
Allow the specified domain to execute
apache modules.
Domain allowed access.
Execute a domain transition to run httpd_rotatelogs.
Domain allowed access.
Execute httpd_rotatelogs in the caller domain.
Domain allowed to transition.
Execute httpd system scripts in the caller domain.
Domain allowed to transition.
Allow the specified domain to list
apache system content files.
Domain allowed access.
Allow the specified domain to manage
apache system content files.
Domain allowed access.
Allow the specified domain to manage
apache system content rw files.
Domain allowed access.
Allow the specified domain to delete
apache system content rw files.
Domain allowed access.
Execute all web scripts in the system
script domain.
Domain allowed access.
Do not audit attempts to read and write Apache
system script unix domain stream sockets.
Domain allowed access.
Execute all user scripts in the user
script domain.
Domain allowed access.
Execute all user scripts in the user
script domain. Add user script domains
to the specified role.
Domain allowed access.
The role to be allowed the script domains.
Allow the specified domain to read
apache squirrelmail data.
Domain allowed access.
Allow the specified domain to append
apache squirrelmail data.
Domain allowed access.
Search apache system content.
Domain allowed access.
Getattr apache system content.
Domain to not audit.
Read apache system content.
Domain to not audit.
Search apache system CGI directories.
Domain allowed access.
Create, read, write, and delete all user web content.
Domain allowed access.
Search system script state directory.
Domain to not audit.
Allow the specified domain to read
apache tmp files.
Domain allowed access.
Dontaudit attempts to read and write
apache tmp files.
Domain allowed access.
Dontaudit attempts to write
apache tmp files.
Domain allowed access.
Execute CGI in the specified domain.
Execute CGI in the specified domain.
This is an interface to support third party modules
and its use is not allowed in upstream reference
policy.
Domain run the cgi script in.
Type of the executable to enter the cgi domain.
All of the rules required to administrate an apache environment
Domain allowed access.
Role allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Allow getattr of suexec
The type of the process performing this action.
Read and write of httpd unix stream socket.
Domain allowed access.
Allow any httpd_exec_t to be an entrypoint of this domain
Domain allowed access.
Allow Apache to modify public files
used for public file transfer services. Directories/Files must
be labeled public_rw_content_t.
Allow Apache to use mod_auth_pam
Allow httpd scripts and modules execmem/execstack
Allow httpd processes to manage IPA content
Allow httpd to use built in scripting (usually php)
Allow HTTPD scripts and modules to connect to the network using TCP.
Allow HTTPD scripts and modules to connect to cobbler over the network.
Allow HTTPD scripts and modules to server cobbler files.
Allow HTTPD scripts and modules to connect to databases over the network.
Allow httpd to connect to memcache server
Allow httpd to act as a relay
Allow http daemon to send mail
Allow http daemon to check spam
Allow Apache to communicate with avahi service via dbus
Allow Apache to communicate with sssd service via dbus
Allow httpd cgi support
Allow httpd to act as a FTP server by
listening on the ftp port.
Allow httpd to read home directories
Allow httpd to read user content
Allow httpd daemon to change system limits
Allow HTTPD to run SSI executables in the same domain as system CGI scripts.
Allow Apache to execute tmp content.
Unify HTTPD to communicate with the terminal.
Needed for entering the passphrase for certificates at
the terminal.
Unify HTTPD handling of all content files.
Allow httpd to access openstack ports
Allow httpd to access cifs file systems
Allow httpd to access FUSE file systems
Allow httpd to run gpg in gpg-web domain
Allow httpd to access nfs file systems
Allow apache scripts to write to public content. Directories/Files must be labeled public_rw_content_t.
Allow Apache to run in stickshift mode, not transition to passenger
Allow Apache to run preupgrade
Allow Apache to query NS records
Allow Apache to use mod_auth_ntlm_winbind
APC UPS monitoring daemon
Execute a domain transition to run apcupsd.
Domain allowed to transition.
Execute apcupsd server in the apcupsd domain.
Domain allowed access.
Read apcupsd PID files.
Domain allowed access.
Allow the specified domain to read apcupsd's log files.
Domain allowed access.
Allow the specified domain to append
apcupsd log files.
Domain allowed to transition.
Execute a domain transition to run httpd_apcupsd_cgi_script.
Domain allowed to transition.
All of the rules required to administrate
an apcupsd environment
Domain allowed access.
The role to be allowed to manage the apcupsd domain.
Advanced power management daemon
Execute APM in the apm domain.
Domain allowed access.
Use file descriptors for apmd.
The type of the process performing this action.
Write to apmd unnamed pipes.
The type of the process performing this action.
Read and write to an apm unix stream socket.
Domain allowed access.
Append to apm's log file.
Domain allowed access.
Connect to apmd over an unix stream socket.
Domain allowed access.
Ethernet activity monitor.
Execute arpwatch server in the arpwatch domain.
Domain allowed access.
Search arpwatch's data file directories.
Domain allowed access.
Create arpwatch data files.
Domain allowed access.
Read and write arpwatch temporary files.
Domain allowed access.
Read and write arpwatch temporary files.
Domain allowed access.
Do not audit attempts to read and write
arpwatch packet sockets.
Domain to not audit.
All of the rules required to administrate
an arpwatch environment
Domain allowed access.
The role to be allowed to manage the arpwatch domain.
Asterisk IP telephony server
Execute asterisk in the asterisk domain.
The type of the process performing this action.
Connect to asterisk over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an asterisk environment
Domain allowed access.
The role to be allowed to manage the asterisk domain.
Generate entropy from audio input
Filesystem automounter service.
Execute automount in the automount domain.
Domain allowed access.
Send automount a signal
The type of the process performing this action.
Execute automount in the caller domain.
Domain allowed access.
Allow the domain to read state files in /proc.
Domain to allow access.
Do not audit attempts to file descriptors for automount.
Domain to not audit.
Do not audit attempts to write automount daemon unnamed pipes.
Domain allowed access.
Allow domain to search of automount temporary
directories.
Domain to not audit.
Do not audit attempts to get the attributes
of automount temporary directories.
Domain to not audit.
All of the rules required to administrate
an automount environment
Domain allowed access.
The role to be allowed to manage the automount domain.
mDNS/DNS-SD daemon implementing Apple ZeroConf architecture
Execute avahi server in the avahi domain.
The type of the process performing this action.
Send avahi a signal
The type of the process performing this action.
Send avahi a kill signal.
Domain allowed access.
Send avahi a signull
Domain allowed access.
Send and receive messages from
avahi over dbus.
Domain allowed access.
Connect to avahi using a unix domain stream socket.
Domain allowed access.
Do not audit attempts to search the avahi pid directory.
Domain allowed access.
All of the rules required to administrate
an avahi environment
Domain allowed access.
The role to be allowed to manage the avahi domain.
Cross platform network backup.
Execute bacula admin bacula
admin domain.
Domain allowed to transition.
Execute user interfaces in the
bacula admin domain, and allow the
specified role the bacula admin domain.
Domain allowed to transition.
Role allowed access.
Allow the domain to read bacula store data..
Domain allowed access.
All of the rules required to
administrate an bacula environment.
Domain allowed access.
Role allowed access.
Allow bacula to manage nfs files
Allow bacula to manage cifs files
bcfg2-server daemon which serves configurations to clients based on the data in its repository
Execute bcfg2 in the bcfg2 domain..
Domain allowed to transition.
Execute bcfg2 server in the bcfg2 domain.
Domain allowed access.
Search bcfg2 lib directories.
Domain allowed access.
Read bcfg2 lib files.
Domain allowed access.
Manage bcfg2 lib files.
Domain allowed access.
Manage bcfg2 lib directories.
Domain allowed access.
All of the rules required to administrate
an bcfg2 environment
Domain allowed access.
Role allowed access.
Berkeley internet name domain DNS server.
Execute bind server in the bind domain.
Domain allowed access.
Execute ndc in the ndc domain.
Domain allowed access.
Send generic signals to BIND.
Domain allowed access.
Send null sigals to BIND.
Domain allowed access.
Send BIND the kill signal
Domain allowed access.
Execute ndc in the ndc domain, and
allow the specified role the ndc domain.
Domain allowed access.
The role to be allowed the bind domain.
Execute bind in the named domain.
Domain allowed access.
Read DNSSEC keys.
Domain allowed access.
Read BIND named configuration files.
Domain allowed access.
Write BIND named configuration files.
Domain allowed access.
Create, read, write, and delete
BIND configuration directories.
Domain allowed access.
Search the BIND cache directory.
Domain allowed access.
Create, read, write, and delete
BIND cache files.
Domain allowed access.
Set the attributes of the BIND pid directory.
Domain allowed access.
Read BIND log files.
Domain allowed access.
Set the attributes of the BIND zone directory.
Domain allowed access.
Read BIND zone files.
Domain allowed access.
Manage BIND zone files.
Domain allowed access.
Send and receive datagrams to and from named. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an bind environment
Domain allowed access.
The role to be allowed to manage the bind domain.
Allow BIND to bind apache port.
Allow BIND to write the master zone files.
Generally this is used for dynamic DNS or zone transfers.
Bitlbee service
Read bitlbee configuration files
Domain allowed accesss.
All of the rules required to administrate
an bitlbee environment
Domain allowed access.
The role to be allowed to manage the bitlbee domain.
Bluetooth tools and system services.
Role access for bluetooth
Role allowed access
User domain for the role
Connect to bluetooth over a unix domain
stream socket.
Domain allowed access.
Execute bluetooth in the bluetooth domain.
The type of the process performing this action.
Read bluetooth daemon configuration.
Domain allowed access.
Send and receive messages from
bluetooth over dbus.
Domain allowed access.
dontaudit Send and receive messages from
bluetooth over dbus.
Domain allowed access.
Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated)
The type of the process performing this action.
Execute bluetooth_helper in the bluetooth_helper domain, and
allow the specified role the bluetooth_helper domain. (Deprecated)
The type of the process performing this action.
The role to be allowed the bluetooth_helper domain.
The type of the terminal allow the bluetooth_helper domain to use.
Read bluetooth helper state files.
Domain allowed access.
All of the rules required to administrate
an bluetooth environment
Domain allowed access.
The role to be allowed to manage the bluetooth domain.
policy for boinc
Execute a domain transition to run boinc.
Domain allowed to transition.
Execute boinc server in the boinc domain.
The type of the process performing this action.
Search boinc lib directories.
Domain allowed access.
Read boinc lib files.
Domain allowed access.
Create, read, write, and delete
boinc lib files.
Domain allowed access.
Manage boinc var_lib files.
Domain allowed access.
All of the rules required to administrate
an boinc environment.
Domain allowed access.
Role allowed access.
Bugzilla server
Allow the specified domain to search
bugzilla directories.
Domain allowed access.
Do not audit attempts to read and write
bugzilla script unix domain stream sockets.
Domain allowed access.
policy for cachefilesd
Execute a domain transition to run cachefilesd.
Domain allowed to transition.
Canna - kana-kanji conversion server
Connect to Canna using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an canna environment
Domain allowed access.
The role to be allowed to manage the canna domain.
Cluster Configuration System
Execute a domain transition to run ccs.
Domain allowed to transition.
Connect to ccs over an unix stream socket.
Domain allowed access.
Read cluster configuration files.
Domain allowed access.
Manage cluster configuration files.
Domain allowed access.
Certmaster SSL certificate distribution service
Execute a domain transition to run certmaster.
Domain allowed to transition.
Execute certmaster in the caller domain.
Domain allowed access.
read certmaster logs.
Domain allowed access.
Append to certmaster logs.
Domain allowed access.
Create, read, write, and delete
certmaster logs.
Domain allowed access.
All of the rules required to administrate
an snort environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Certificate status monitor and PKI enrollment client
Execute a domain transition to run certmonger.
Domain allowed to transition.
Execute certmonger server in the certmonger domain.
The type of the process performing this action.
Read certmonger PID files.
Domain allowed access.
Manage certmonger var_run files.
Domain allowed access.
Search certmonger lib directories.
Domain allowed access.
Read certmonger lib files.
Domain allowed access.
Create, read, write, and delete
certmonger lib files.
Domain allowed access.
Manage certmonger var_lib files.
Domain allowed access.
Dontaudit certmonger leaked files descriptors.
Domain allowed access.
Send and receive messages from
certmonger over dbus.
Domain allowed access.
All of the rules required to administrate
an certmonger environment
Domain allowed access.
Role allowed access.
policy for cfengine
Creates types and rules for a basic
cfengine init daemon domain.
Prefix for the domain.
Transition to cfengine.
Domain allowed to transition.
Search cfengine lib files.
Domain allowed access.
Read cfengine lib files.
Domain allowed access.
Allow the specified domain to read cfengine's log files.
Domain allowed access.
Allow the specified domain to append cfengine's log files.
Domain allowed access.
Dontaudit the specified domain to write cfengine's log files.
Domain allowed access.
policy for cgdcbxd
Execute cgdcbxd in the cgdcbxd domin.
Domain allowed to transition.
Read cgdcbxd PID files.
Domain allowed access.
All of the rules required to administrate
an cgdcbxd environment
Domain allowed access.
libcg is a library that abstracts the control group file system in Linux.
Execute a domain transition to run
CG config parser.
Domain allowed to transition.
Execute a domain transition to run
CG config parser.
Domain allowed to transition.
Execute a domain transition to run
CG rules engine daemon.
Domain allowed to transition.
Execute a domain transition to run
CG rules engine daemon.
domain.
Domain allowed to transition.
Connect to CG rules engine daemon
over unix stream sockets.
Domain allowed access.
All of the rules required to administrate
an cgroup environment.
Domain allowed access.
Role allowed access.
Chrony NTP background daemon
Execute chronyd in the chronyd domain.
Domain allowed access.
Execute chronyd server in the chronyd domain.
Domain allowed access.
Execute chronyd
Domain allowed access.
Read chronyd logs.
Domain allowed access.
Read and write chronyd shared memory.
Domain allowed access.
Read chronyd keys files.
Domain allowed access.
Append chronyd keys files.
Domain allowed access.
All of the rules required to administrate
an chronyd environment
Domain allowed access.
The role to be allowed to manage the chronyd domain.
openstack-cinder
Manage cinder lib files.
Domain allowed access.
Creates types and rules for a basic
openstack-cinder systemd daemon domain.
Prefix for the domain.
Encrypted tunnel daemon
ClamAV Virus Scanner
Execute a domain transition to run clamd.
Domain allowed to transition.
Connect to run clamd.
Domain allowed to connect.
Allow the specified domain to append
to clamav log files.
Domain allowed access.
Read clamav configuration files.
Domain allowed access.
Search clamav libraries directories.
Domain allowed access.
Read clamd state files.
Domain allowed access.
Execute a domain transition to run clamscan.
Domain allowed access.
Execute clamscan without a transition.
Domain allowed access.
All of the rules required to administrate
an clamav environment
Domain allowed access.
The role to be allowed to manage the clamav domain.
Allow clamscan to non security files on a system
Allow clamd to use JIT compiler
Clockspeed simple network time protocol client
Execute clockspeed utilities in the clockspeed_cli domain.
Domain allowed access.
Allow the specified role the clockspeed_cli domain.
Domain allowed access.
The role to be allowed the clockspeed_cli domain.
clogd - clustered mirror log server
Execute a domain transition to run clogd.
Domain allowed to transition.
Connect to clogd over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to clogd semaphores.
Domain allowed access.
Read and write to group shared memory.
The type of the process performing this action.
cloudform policy
Creates types and rules for a basic
cloudform daemon domain.
Prefix for the domain.
Execute mongod in the caller domain.
Domain allowed access.
policy for cmirrord
Execute a domain transition to run cmirrord.
Domain allowed to transition.
Execute cmirrord server in the cmirrord domain.
The type of the process performing this action.
Read cmirrord PID files.
Domain allowed access.
Read and write to cmirrord shared memory.
The type of the process performing this action.
All of the rules required to administrate
an cmirrord environment
Domain allowed access.
Role allowed access.
Cobbler installation server.
Cobbler is a Linux installation server that allows for
rapid setup of network installation environments. It
glues together and automates many associated Linux
tasks so you do not have to hop between lots of various
commands and applications when rolling out new systems,
and, in some cases, changing existing ones.
Execute a domain transition to run cobblerd.
Domain allowed to transition.
Execute cobblerd server in the cobblerd domain.
Domain allowed to transition.
List Cobbler configuration.
Domain allowed access.
Read Cobbler configuration files.
Domain to not audit.
Search cobbler dirs in /var/lib
Domain allowed access.
Read cobbler files in /var/lib
Domain allowed access.
Manage cobbler files in /var/lib
Domain allowed access.
Do not audit attempts to read and write
Cobbler log files (leaked fd).
Domain to not audit.
All of the rules required to administrate
an cobblerd environment
Domain allowed access.
Role allowed access.
Allow Cobbler to modify public files
used for public file transfer services.
Allow Cobbler to connect to the
network using TCP.
Allow Cobbler to access cifs file systems.
Allow Cobbler to access nfs file systems.
Statistics collection daemon for filling RRD files.
Transition to collectd.
Domain allowed to transition.
Execute collectd server in the collectd domain.
Domain allowed access.
Search collectd lib directories.
Domain allowed access.
Read collectd lib files.
Domain allowed access.
Manage collectd lib files.
Domain allowed access.
Manage collectd lib directories.
Domain allowed access.
All of the rules required to administrate
an collectd environment
Domain allowed access.
Role allowed access.
Determine whether collectd can connect
to the network using TCP.
Comsat, a biff server.
policy for condor
Creates types and rules for a basic
condor init daemon domain.
Prefix for the domain.
Transition to condor.
Domain allowed to transition.
Read condor's log files.
Domain allowed access.
Append to condor log files.
Domain allowed access.
Manage condor log files
Domain allowed access.
Search condor lib directories.
Domain allowed access.
Read condor lib files.
Domain allowed access.
Read condor lib files.
Domain allowed access.
Manage condor lib files.
Domain allowed access.
Manage condor lib directories.
Domain allowed access.
Read condor PID files.
Domain allowed access.
Read and write condor_startd server TCP sockets.
Domain allowed access.
Read and write condor_schedd server TCP sockets.
Domain allowed access.
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
The process type entered by condor_startd.
The executable type for the entrypoint.
Range for the domain.
Allows to start userlandprocesses
by transitioning to the specified domain.
The process type entered by condor_startd.
The executable type for the entrypoint.
All of the rules required to administrate
an condor environment
Domain allowed access.
Allow codnor domain to connect to the network using TCP.
Conman is a program for connecting to remote consoles being managed by conmand
Execute conman in the conman domin.
Domain allowed to transition.
Read conman's log files.
Domain allowed access.
Append to conman log files.
Domain allowed access.
Manage conman log files
Domain allowed access.
Framework for facilitating multiple user sessions on desktops.
Execute a domain transition to run consolekit.
Domain allowed to transition.
Send and receive messages from
consolekit over dbus.
Domain allowed access.
Read consolekit log files.
Domain allowed access.
Dontaudit attempts to read consolekit log files.
Domain to not audit.
Manage consolekit log files.
Domain allowed access.
Read consolekit PID files.
Domain allowed access.
Dontaudit attempts to connect to consolekit
over an unix stream socket.
Domain allowed access.
SELinux policy for Corosync Cluster Engine
Execute a domain transition to run corosync.
Domain allowed to transition.
Execute a domain transition to run corosync.
Domain allowed to transition.
Execute corosync in the caller domain.
Domain allowed to transition.
Connect to corosync over a unix domain
stream socket.
Domain allowed access.
Allow the specified domain to read corosync's log files.
Domain allowed access.
Allow the specified domain to read/write corosync's tmpfs files.
Domain allowed access.
All of the rules required to administrate
an corosync environment
Domain allowed access.
The role to be allowed to manage the corosyncd domain.
Courier IMAP and POP3 email servers
Template for creating courier server processes.
Prefix name of the server process.
Execute the courier authentication daemon with
a domain transition.
Domain allowed access.
Connect to courier-authdaemon over an unix stream socket.
Domain allowed access.
Execute the courier POP3 and IMAP server with
a domain transition.
Domain allowed access.
Read courier config files
Domain allowed access.
Create, read, write, and delete courier
spool directories.
Domain allowed access.
Create, read, write, and delete courier
spool files.
Domain allowed access.
Read courier spool files.
Domain allowed access.
Read and write to courier spool pipes.
Domain to not audit.
Services for loading CPU microcode and CPU frequency scaling.
CPUcontrol stub interface. No access allowed.
Domain allowed access.
Periodic execution of scheduled commands.
The common rules for a crontab domain.
The prefix of the user domain (e.g., user
is the prefix for user_t).
Role access for cron
Role allowed access
User domain for the role
Role access for unconfined cronjobs
Role allowed access
User domain for the role
Role access for cron
Role allowed access
User domain for the role
Make the specified program domain accessable
from the system cron jobs.
The type of the process to transition to.
The type of the file used as an entrypoint to this domain.
Execute cron in the cron system domain.
Domain allowed access.
Execute crond_exec_t
Domain allowed access.
Execute crond server in the nscd domain.
The type of the process performing this action.
Inherit and use a file descriptor
from the cron daemon.
Domain allowed access.
Send a SIGCHLD signal to the cron daemon.
Domain allowed access.
Read a cron daemon unnamed pipe.
Domain allowed access.
Do not audit attempts to write cron daemon unnamed pipes.
Domain allowed access.
Read and write a cron daemon unnamed pipe.
Domain allowed access.
Read and write inherited user spool files.
Domain allowed access.
Read and write inherited spool files.
Domain allowed access.
Read, and write cron daemon TCP sockets.
Domain allowed access.
Dontaudit Read, and write cron daemon TCP sockets.
Domain allowed access.
Search the directory containing user cron tables.
The type of the process to performing this action.
Manage pid files used by cron
Domain allowed access.
Execute anacron in the cron system domain.
Domain allowed access.
Inherit and use a file descriptor
from system cron jobs.
Domain allowed access.
Write a system cron job unnamed pipe.
Domain allowed access.
Read and write a system cron job unnamed pipe.
Domain allowed access.
Allow read/write unix stream sockets from the system cron jobs.
Domain allowed access.
Read temporary files from the system cron jobs.
Domain allowed access.
Do not audit attempts to append temporary
files from the system cron jobs.
Domain to not audit.
Do not audit attempts to write temporary
files from the system cron jobs.
Domain to not audit.
Read temporary files from the system cron jobs.
Domain allowed access.
Manage files from the system cron jobs.
Domain allowed access.
Allow system cron jobs to relabel filesystem
for restoring file contexts.
Enable extra rules in the cron domain
to support fcron.
policy for ctdbd
Transition to ctdbd.
Domain allowed to transition.
Execute ctdbd server in the ctdbd domain.
Domain allowed access.
Read ctdbd's log files.
Domain allowed access.
Append to ctdbd log files.
Domain allowed to transition.
Manage ctdbd log files
Domain to not audit.
Search ctdbd lib directories.
Domain allowed access.
Read ctdbd lib files.
Domain allowed access.
Manage ctdbd lib files.
Domain allowed access.
Manage ctdbd lib directories.
Domain allowed access.
Read ctdbd PID files.
Domain allowed access.
Connect to ctdbd over an unix stream socket.
Domain allowed access.
Allow domain to signal ctdbd.
Domain to not audit.
Allow domain to send SIGCHLD to ctdbd.
Domain to not audit.
All of the rules required to administrate
an ctdbd environment
Domain allowed access.
Role allowed access.
Common UNIX printing system
Setup cups to transtion to the cups backend domain
Domain allowed access.
Domain allowed access.
Execute cups in the cups domain.
The type of the process performing this action.
Connect to cupsd over an unix domain stream socket.
Domain allowed access.
Connect to cups over TCP. (Deprecated)
Domain allowed access.
Send and receive messages from
cups over dbus.
Domain allowed access.
Read cups PID files.
Domain allowed access.
Execute cups_config in the cups_config domain.
The type of the process performing this action.
Send generic signals to the cups
configuration daemon.
Domain allowed access.
Send and receive messages from
cupsd_config over dbus.
Domain allowed access.
Read cups configuration files.
Domain allowed access.
Read cups-writable configuration files.
Domain allowed access.
Read cups log files.
Domain allowed access.
Append cups log files.
Domain allowed access.
Write cups log files.
Domain allowed access.
Connect to ptal over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an cups environment
Domain allowed access.
The role to be allowed to manage the cups domain.
Concurrent versions system
Read the CVS data and metadata.
Domain allowed access.
Allow the specified domain to execute cvs
in the caller domain.
Domain allowed access.
Dontaudit Attempts to list the CVS data and metadata.
Domain to not audit.
All of the rules required to administrate
an cvs environment
Domain allowed access.
The role to be allowed to manage the cvs domain.
Allow cvs daemon to read shadow
Cyphesis WorldForge game server
Execute a domain transition to run cyphesis.
Domain allowed to transition.
Cyrus is an IMAP service intended to be run on sealed servers
Allow caller to create, read, write,
and delete cyrus data files.
Domain allowed access.
Allow write cyrus data files.
Domain allowed access.
Connect to Cyrus using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an cyrus environment
Domain allowed access.
The role to be allowed to manage the cyrus domain.
Dante msproxy and socks4/5 proxy server
Dictionary server for the SKK Japanese input method system.
Desktop messaging bus
DBUS stub interface. No access allowed.
Domain allowed access
Role access for dbus
The prefix of the user role (e.g., user
is the prefix for user_r).
Role allowed access
User domain for the role
Template for creating connections to
the system DBUS.
The type of the domain.
Template for creating connections to
a user DBUS.
The type of the domain.
Send a message the session DBUS.
Domain allowed access.
Read dbus configuration.
Domain allowed access.
Connect to the system DBUS
for service (acquire_svc).
Domain allowed access.
Connect to the system DBUS
for service (acquire_svc).
Domain allowed access.
Send a message on the system DBUS.
Domain allowed access.
Allow unconfined access to the system DBUS.
Domain allowed access.
Allow a application domain to be started
by the session dbus.
Type to be used as a domain.
Type of the program to be used as an
entry point to this domain.
Create a domain for processes
which can be started by the system dbus
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Do not audit attempts to send dbus
messages to system bus types.
Domain to not audit.
Allow attempts to send dbus
messages to system bus types.
Domain to not audit.
Dontaudit Read, and write system dbus TCP sockets.
Domain allowed access.
Allow unconfined access to the system DBUS.
Domain allowed access.
Create, read, write, and delete
system dbus lib files.
Domain allowed access.
Read system dbus lib files.
Domain allowed access.
Distributed checksum clearinghouse spam filtering
Execute cdcc in the cdcc domain.
Domain allowed access.
Execute cdcc in the cdcc domain, and
allow the specified role the cdcc domain.
Domain allowed access.
The role to be allowed the cdcc domain.
Execute dcc_client in the dcc_client domain.
Domain allowed access.
Send a signal to the dcc_client.
Domain allowed access.
Execute dcc_client in the dcc_client domain, and
allow the specified role the dcc_client domain.
Domain allowed access.
The role to be allowed the dcc_client domain.
Execute dbclean in the dcc_dbclean domain.
Domain allowed access.
Execute dbclean in the dcc_dbclean domain, and
allow the specified role the dcc_dbclean domain.
Domain allowed access.
The role to be allowed the dcc_dbclean domain.
Connect to dccifd over a unix domain stream socket.
Domain allowed access.
Update dynamic IP address at DynDNS.org.
Execute ddclient in the ddclient domain.
Domain allowed to transition.
Execute ddclient in the ddclient
domain, and allow the specified
role the ddclient domain.
Domain allowed to transition.
Role allowed access.
All of the rules required to
administrate an ddclient environment.
Domain allowed access.
Role allowed access.
Deny Hosts.
DenyHosts is a script intended to be run by Linux
system administrators to help thwart SSH server attacks
(also known as dictionary based attacks and brute force
attacks).
Execute a domain transition to run denyhosts.
Domain allowed to transition.
Execute denyhost server in the denyhost domain.
The type of the process performing this action.
All of the rules required to administrate
an denyhosts environment.
Domain allowed access.
Role allowed access.
Devicekit modular hardware abstraction layer
Execute a domain transition to run devicekit.
Domain allowed to transition.
Send to devicekit over a unix domain
datagram socket.
Domain allowed access.
Send and receive messages from
devicekit over dbus.
Domain allowed access.
Send and receive messages from
devicekit disk over dbus.
Domain allowed access.
Send signal devicekit power
Domain allowed access.
Send and receive messages from
devicekit power over dbus.
Domain allowed access.
Read devicekit PID files.
Domain allowed access.
Manage devicekit var_run files.
Domain allowed access.
Dontaudit Send and receive messages from
devicekit disk over dbus.
Domain to not audit.
Manage devicekit PID files.
Domain allowed access.
All of the rules required to administrate
an devicekit environment
Domain allowed access.
Dynamic host configuration protocol (DHCP) server
Transition to dhcpd.
Domain allowed access.
Set the attributes of the DCHP
server state files.
Domain allowed access.
Execute dhcp server in the dhcp domain.
The type of the process performing this action.
All of the rules required to administrate
an dhcp environment
Domain allowed access.
The role to be allowed to manage the dhcp domain.
Dictionary daemon
Use dictionary services by connecting
over TCP. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an dictd environment
Domain allowed access.
The role to be allowed to manage the dictd domain.
Administration Server for Directory Server, dirsrv-admin.
Exec dirsrv-admin programs.
Domain allowed access.
Exec cgi programs.
Domain allowed access.
Manage dirsrv-adminserver configuration files.
Domain allowed access.
Manage dirsrv-adminserver configuration files.
Domain allowed access.
Read dirsrv-adminserver tmp files.
Domain allowed access.
Write dirsrv-adminserver tmp files.
Domain allowed access.
Manage dirsrv-adminserver tmp files.
Domain allowed access.
Execute admin cgi programs in caller domain.
Domain allowed access.
policy for dirsrv
Execute a domain transition to run dirsrv.
Domain allowed to transition.
Allow caller to signal dirsrv.
Domain allowed access.
Send a null signal to dirsrv.
Domain allowed access.
Allow a domain to manage dirsrv logs.
Domain allowed access.
Allow a domain to manage dirsrv lock.
Domain allowed access.
Allow a domain to manage dirsrv logs.
Domain allowed access.
Allow a domain to manage dirsrv /var/lib files.
Domain allowed access.
Allow a domain to manage dirsrv /var/run files.
Domain allowed access.
Allow a domain to create dirsrv pid directories.
Domain allowed access.
Allow a domain to read dirsrv /var/run files.
Domain allowed access.
Manage dirsrv configuration files.
Domain allowed access.
Read dirsrv share files.
Domain allowed access.
Connect to dirsrv over an unix stream socket.
Domain allowed access.
Distributed compiler daemon
small and secure DNS daemon
Create a set of derived types for djbdns
components that are directly supervised by daemontools.
The prefix to be used for deriving type names.
Allow search the djbdns-tinydns key ring.
Domain allowed access.
Allow link to the djbdns-tinydns key ring.
Domain allowed access.
DomainKeys Identified Mail milter.
dnsmasq DNS forwarder and DHCP server
Execute dnsmasq server in the dnsmasq domain.
The type of the process performing this action.
Execute dnsmasq server in the caller domain.
Domain allowed to transition.
Execute the dnsmasq init script in the init script domain.
Domain allowed access.
Send dnsmasq a signal
The type of the process performing this action.
Send dnsmasq a signull
Domain allowed access.
Send dnsmasq a kill signal.
Domain allowed access.
Read dnsmasq config files.
Domain allowed.
Write to dnsmasq config files.
Domain allowed.
Delete dnsmasq pid files
Domain allowed access.
Read dnsmasq pid files
Domain allowed access.
Manage dnsmasq pid files
Domain allowed access.
Create dnsmasq pid dirs
Domain allowed access.
All of the rules required to administrate
an dnsmasq environment
Domain allowed access.
The role to be allowed to manage the dnsmasq domain.
Dovecot POP and IMAP mail server
Connect to dovecot unix domain stream socket.
Domain allowed access.
Connect to dovecot auth unix domain stream socket.
Domain allowed access.
Execute dovecot_deliver in the dovecot_deliver domain.
Domain allowed access.
Create, read, write, and delete the dovecot spool files.
Domain allowed access.
Do not audit attempts to delete dovecot lib files.
Domain to not audit.
Dontaudit attempts to read and write
dovecot tmp files.
Domain to not audit.
Allow attempts to write inherited
dovecot tmp files.
Domain to not audit.
Allow attempts to read and write to
sendmail unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an dovecot environment
Domain allowed access.
The role to be allowed to manage the dovecot domain.
policy for drbd
Execute a domain transition to run drbd.
Domain allowed access.
Search drbd lib directories.
Domain allowed access.
Read drbd lib files.
Domain allowed access.
Create, read, write, and delete
drbd lib files.
Domain allowed access.
Manage drbd lib dirs files.
Domain allowed access.
All of the rules required to administrate
an drbd environment
Domain allowed access.
policy for dspam
Execute a domain transition to run dspam.
Domain allowed access.
Execute dspam server in the dspam domain.
The type of the process performing this action.
Allow the specified domain to read dspam's log files.
Domain allowed access.
Allow the specified domain to append
dspam log files.
Domain allowed to transition.
Allow domain to manage dspam log files
Domain to not audit.
Search dspam lib directories.
Domain allowed access.
Read dspam lib files.
Domain allowed access.
Create, read, write, and delete
dspam lib files.
Domain allowed access.
Manage dspam lib dirs files.
Domain allowed access.
Read dspam PID files.
Domain allowed access.
Connect to DSPAM using a unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an dspam environment
Domain allowed access.
Role allowed access.
Exim mail transfer agent
Execute a domain transition to run exim.
Domain allowed to transition.
Execute exim in the exim domain.
The type of the process performing this action.
Do not audit attempts to read,
exim tmp files
Domain to not audit.
Allow domain to read, exim tmp files
Domain to not audit.
Read exim PID files.
Domain allowed access.
Allow the specified domain to read exim's log files.
Domain allowed access.
Allow the specified domain to append
exim log files.
Domain allowed to transition.
Allow the specified domain to manage exim's log files.
Domain allowed access.
Create, read, write, and delete
exim spool dirs.
Domain allowed access.
Read exim spool files.
Domain allowed access.
Create, read, write, and delete
exim spool files.
Domain allowed access.
All of the rules required to administrate
an exim environment.
Domain allowed access.
Role allowed access.
Allow exim to connect to databases (postgres, mysql)
Allow exim to read unprivileged user files.
Allow exim to create, read, write, and delete
unprivileged user files.
Update firewall filtering to ban IP addresses with too many password failures.
Execute a domain transition to run fail2ban.
Domain allowed to transition.
Connect to fail2ban over a unix domain
stream socket.
Domain allowed access.
Read and write to an fail2ban unix stream socket.
Domain allowed access.
Read fail2ban lib files.
Domain allowed access.
Allow the specified domain to read fail2ban's log files.
Domain allowed access.
Allow the specified domain to append
fail2ban log files.
Domain allowed to transition.
Read fail2ban PID files.
Domain allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
All of the rules required to administrate
an fail2ban environment
Domain allowed access.
The role to be allowed to manage the fail2ban domain.
Read and write inherited temporary files.
Domain allowed access.
policy for fcoemon
Transition to fcoemon.
Domain allowed to transition.
Read fcoemon PID files.
Domain allowed access.
Send to a fcoemon unix dgram socket.
Domain allowed access.
All of the rules required to administrate
an fcoemon environment
Domain allowed access.
Remote-mail retrieval and forwarding utility
All of the rules required to administrate
an fetchmail environment
Domain allowed access.
Finger user information service.
Execute fingerd in the fingerd domain.
The type of the process performing this action.
Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated)
Domain allowed access.
DBus fingerprint reader service
Execute a domain transition to run fprintd.
Domain allowed to transition.
Send and receive messages from
fprintd over dbus.
Domain allowed access.
Remote-Console (out-of-band) and System Management Software (in-band) based on Intelligent Platform Management Interface specification
Creates types and rules for a basic
freeipmi init daemon domain.
Prefix for the domain.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
File transfer protocol service
Execute a domain transition to run ftpd.
Domain allowed to transition.
Execute ftpd server in the ftpd domain.
The type of the process performing this action.
Use ftp by connecting over TCP. (Deprecated)
Domain allowed access.
Read ftpd etc files
Domain allowed access.
Execute FTP daemon entry point programs.
Domain allowed access.
Read FTP transfer logs
Domain allowed access.
Execute the ftpdctl program in the ftpdctl domain.
Domain allowed access.
Execute the ftpdctl program in the ftpdctl domain.
Domain allowed access.
The role to allow the ftpdctl domain.
Allow domain dyntransition to chroot_user_t domain.
Domain allowed access.
All of the rules required to administrate
an ftp environment
Domain allowed access.
The role to be allowed to manage the ftp domain.
Allow ftp servers to upload files, used for public file
transfer services. Directories must be labeled
public_content_rw_t.
Allow ftp servers to login to local users and
read/write all files on the system, governed by DAC.
Allow ftp servers to use cifs
used for public file transfer services.
Allow ftpd to use ntfs/fusefs volumes.
Allow ftp servers to use nfs
used for public file transfer services.
Allow ftp servers to use connect to mysql database
Allow ftp to read and write files in the user home directories
Determine whether ftpd can bind to all unreserved ports for passive mode.
OpenH.323 Voice-Over-IP Gatekeeper
GIT revision control system.
Role access for Git session.
Role allowed access.
User domain for the role.
Read generic system content files.
Domain allowed access.
Determine whether Git CGI
can search home directories.
Determine whether Git CGI
can access cifs file systems.
Determine whether Git CGI
can access nfs file systems.
Determine whether Git session daemon
can bind TCP sockets to all
unreserved ports.
Determine whether calling user domains
can execute Git daemon in the
git_session_t domain.
Determine whether Git system daemon
can search home directories.
Determine whether Git system daemon
can access cifs file systems.
Determine whether Git system daemon
can access nfs file systems.
policy for glance
Transition to glance registry.
Domain allowed to transition.
Transition to glance api.
Domain allowed to transition.
Read glance's log files.
Domain allowed access.
Append to glance log files.
Domain allowed access.
Manage glance log files
Domain allowed access.
Search glance lib directories.
Domain allowed access.
Read glance lib files.
Domain allowed access.
Manage glance lib files.
Domain allowed access.
Manage glance lib directories.
Domain allowed access.
Read glance PID files.
Domain allowed access.
Manage glance PID files.
Domain allowed access.
All of the rules required to administrate
an glance environment
Domain allowed access.
Role allowed access.
policy for glusterd
Transition to glusterd.
Domain allowed to transition.
Execute glusterd server in the glusterd domain.
Domain allowed access.
Read glusterd's log files.
Domain allowed access.
Append to glusterd log files.
Domain allowed access.
Manage glusterd log files
Domain allowed access.
Read glusterd's config files.
Domain allowed access.
Read and write /var/lib/glusterd files.
Domain allowed access.
Read and write /var/lib/glusterd files.
Domain allowed access.
All of the rules required to administrate
an glusterd environment
Domain allowed access.
Role allowed access.
Manage glusterd PID files.
Domain allowed access.
Allow glusterfsd to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Allow glusterfsd to share any file/directory read only.
Allow glusterfsd to share any file/directory read/write.
Gnome clock handler for setting the time.
Execute a domain transition to run gnomeclock.
Domain allowed to transition.
Execute gnomeclock in the gnomeclock domain, and
allow the specified role the gnomeclock domain.
Domain allowed access
The role to be allowed the gnomeclock domain.
Send and receive messages from
gnomeclock over dbus.
Domain allowed access.
Do not audit send and receive messages from
gnomeclock over dbus.
Domain allowed access.
General Purpose Mouse driver
Connect to GPM over a unix domain
stream socket.
Domain allowed access.
Get the attributes of the GPM
control channel named socket.
Domain allowed access.
Do not audit attempts to get the
attributes of the GPM control channel
named socket.
Domain allowed access.
Set the attributes of the GPM
control channel named socket.
Domain allowed access.
gpsd monitor daemon
Execute a domain transition to run gpsd.
Domain allowed to transition.
Execute gpsd in the gpsd domain, and
allow the specified role the gpsd domain.
Domain allowed access
The role to be allowed the gpsd domain.
Read and write gpsd shared memory.
Domain allowed access.
Hardware abstraction layer
Execute hal in the hal domain.
Domain allowed access.
Get the attributes of a hal process.
Domain allowed access.
Read hal system state
Domain to not audit.
Allow ptrace of hal domain
Domain allowed access.
Allow domain to use file descriptors from hal.
Domain to not audit.
Do not audit attempts to use file descriptors from hal.
Domain to not audit.
Allow attempts to read and write to
hald unnamed pipes.
Domain to not audit.
Do not audit attempts to read and write to
hald unnamed pipes.
Domain to not audit.
Send to hal over a unix domain
datagram socket.
Domain allowed access.
Send to hal over a unix domain
stream socket.
Domain allowed access.
Dontaudit read/write to a hal unix datagram socket.
Domain allowed access.
Send a dbus message to hal.
Domain allowed access.
Send and receive messages from
hal over dbus.
Domain allowed access.
Execute hal mac in the hal mac domain.
Domain allowed access.
Allow attempts to write the hal
log files.
Domain allowed access.
Do not audit attempts to write the hal
log files.
Domain to not audit
Manage hald log files.
Domain allowed access.
Manage hald log files.
Domain allowed access.
Read hald tmp files.
Domain allowed access.
Do not audit attempts to read or write
HAL libraries files
Domain allowed access.
Read hald PID files.
Domain allowed access.
Do not audit attempts to read
hald PID files.
Domain to not audit.
Read/Write hald PID files.
Domain allowed access.
Manage hald PID dirs.
Domain allowed access.
Manage hald PID files.
Domain allowed access.
hddtemp hard disk temperature tool running as a daemon
Execute hddtemp in the hddtemp domain.
Domain allowed access.
Execute hddtemp
Domain allowed access.
Port of Apple Rendezvous multicast DNS
Send generic signals to howl.
Domain allowed access.
policy for hypervkvp
Execute hypervkvpd in the hypervkvp domin.
Domain allowed to transition.
Search hypervkvp lib directories.
Domain allowed access.
Read hypervkvp lib files.
Domain allowed access.
Create, read, write, and delete
hypervkvp lib files.
Domain allowed access.
IIIMF htt server
Use i18n_input over a TCP connection. (Deprecated)
Domain allowed access.
ShoutCast compatible streaming media server
Execute a domain transition to run icecast.
Domain allowed to transition.
Allow domain signal icecast
Domain allowed access.
Execute icecast server in the icecast domain.
Domain allowed access.
Read icecast PID files.
Domain allowed access.
Manage icecast pid files.
Domain allowed access.
Allow the specified domain to read icecast's log files.
Domain allowed access.
Allow the specified domain to append
icecast log files.
Domain allowed access.
Allow domain to manage icecast log files
Domain allow access.
All of the rules required to administrate
an icecast environment
Domain allowed access.
Role allowed access.
Determine whether icecast can listen
on and connect to any TCP port.
Bring up/down ethernet interfaces based on cable detection.
Execute a domain transition to run ifplugd.
Domain allowed to transition.
Send a generic signal to ifplugd
Domain allowed access.
Read ifplugd etc configuration files.
Domain allowed access.
Manage ifplugd etc configuration files.
Domain allowed access.
Read ifplugd PID files.
Domain allowed access.
All of the rules required to administrate
an ifplugd environment
Domain allowed access.
The role to be allowed to manage the ifplugd domain.
iMaze game server
Internet services daemon.
Define the specified domain as a inetd service.
Define the specified domain as a inetd service. The
inetd_service_domain(), inetd_tcp_service_domain(),
or inetd_udp_service_domain() interfaces should be used
instead of this interface, as this interface only provides
the common rules to these three interfaces.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a TCP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a UDP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Define the specified domain as a TCP and UDP inetd service.
The type associated with the inetd service process.
The type associated with the process program.
Inherit and use file descriptors from inetd.
Domain allowed access.
Connect to the inetd service using a TCP connection. (Deprecated)
Domain allowed access.
Run inetd child process in the inet child domain
Domain allowed access.
Send UDP network traffic to inetd. (Deprecated)
The type of the process performing this action.
Read and write inetd TCP sockets.
The type of the process performing this action.
Internet News NNTP server
Allow the specified domain to execute innd
in the caller domain.
Domain allowed access.
Allow the specified domain to execute
inn configuration files in /etc.
Domain allowed access.
Create, read, write, and delete the innd log.
Domain allowed access.
Create, read, write, and delete the innd pid files.
Domain allowed access.
Read innd configuration files.
Domain allowed access.
Read innd news library files.
Domain allowed access.
Read innd news library files.
Domain allowed access.
Send to a innd unix dgram socket.
Domain allowed access.
Execute inn in the inn domain.
Domain allowed access.
All of the rules required to administrate
an inn environment
Domain allowed access.
The role to be allowed to manage the inn domain.
policy for ipmievd
Transition to ipmievd.
Domain allowed to transition.
Execute ipmievd server in the ipmievd domain.
Domain allowed access.
Read ipmievd PID files.
Domain allowed access.
All of the rules required to administrate
an ipmievd environment
Domain allowed access.
Role allowed access.
IRC server
IRQ balancing daemon
Internet Storage Name Service.
All of the rules required to
administrate an isnsd environment.
Domain allowed access.
Role allowed access.
Jabber instant messaging server
Execute a domain transition to run jabberd services
Domain allowed to transition.
Execute a domain transition to run jabberd router service
Domain allowed to transition.
Read jabberd lib files.
Domain allowed access.
Dontaudit inherited read jabberd lib files.
Domain to not audit.
Create, read, write, and delete
jabberd lib files.
Domain allowed access.
All of the rules required to administrate
an jabber environment
Domain allowed access.
The role to be allowed to manage the jabber domain.
keepalived - load-balancing and high-availability service
Execute keepalived in the keepalived domin.
Domain allowed to transition.
MIT Kerberos admin and KDC
This policy supports:
Servers:
Clients:
- kinit
- kdestroy
- klist
- ksu (incomplete)
Execute kadmind in the current domain
Domain allowed access.
Execute a domain transition to run kpropd.
Domain allowed to transition.
Use kerberos services
Domain allowed access.
Read the kerberos configuration file (/etc/krb5.conf).
Domain allowed access.
Do not audit attempts to write the kerberos
configuration file (/etc/krb5.conf).
Domain to not audit.
Read and write the kerberos configuration file (/etc/krb5.conf).
Domain allowed access.
Read the kerberos key table.
Domain allowed access.
Read/Write the kerberos key table.
Domain allowed access.
Create keytab file in /etc
Domain allowed access.
Create a derived type for kerberos keytab
The prefix to be used for deriving type names.
Domain allowed access.
Read the kerberos kdc configuration file (/etc/krb5kdc.conf).
Domain allowed access.
Read the kerberos kdc configuration file (/etc/krb5kdc.conf).
Domain allowed access.
Connect to krb524 service
Domain allowed access.
All of the rules required to administrate
an kerberos environment
Domain allowed access.
The role to be allowed to manage the kerberos domain.
Type transition files created in /tmp
to the krb5_host_rcache type.
Domain allowed access.
read kerberos homedir content (.k5login)
Domain allowed access.
Allow confined applications to run with kerberos.
Service for reporting kernel oopses to kerneloops.org
Execute a domain transition to run kerneloops.
Domain allowed to transition.
Send and receive messages from
kerneloops over dbus.
Domain allowed access.
dontaudit attempts to Send and receive messages from
kerneloops over dbus.
Domain allowed access.
Allow domain to manage kerneloops tmp files
Domain to not audit.
All of the rules required to administrate
an kerneloops environment
Domain allowed access.
The role to be allowed to manage the kerneloops domain.
policy for keystone
Transition to keystone.
Domain allowed to transition.
Read keystone's log files.
Domain allowed access.
Append to keystone log files.
Domain allowed access.
Manage keystone log files
Domain allowed access.
Search keystone lib directories.
Domain allowed access.
Read keystone lib files.
Domain allowed access.
Manage keystone lib files.
Domain allowed access.
Manage keystone lib directories.
Domain allowed access.
All of the rules required to administrate
an keystone environment
Domain allowed access.
Role allowed access.
Kernel Samepage Merging (KSM) Tuning Daemon
Execute a domain transition to run ksmtuned.
Domain allowed to transition.
Execute ksmtuned server in the ksmtuned domain.
Domain allowed access.
All of the rules required to administrate
an ksmtuned environment
Domain allowed access.
Role allowed access.
KDE Talk daemon
Layer 2 Tunneling Protocol daemons.
Transition to l2tpd.
Domain allowed to transition.
Execute l2tpd server in the l2tpd domain.
Domain allowed access.
Send to l2tpd via a unix dgram socket.
Domain allowed access.
Read and write l2tpd sockets.
Domain allowed access.
Read l2tpd PID files.
Domain allowed access.
Connect to l2tpd over a unix domain
stream socket.
Domain allowed access.
Read and write l2tpd unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an l2tpd environment
Domain allowed access.
Role allowed access.
OpenLDAP directory server
Execute OpenLDAP in the ldap domain.
The type of the process performing this action.
Execute OpenLDAP server in the ldap domain.
The type of the process performing this action.
Read the contents of the OpenLDAP
database directories.
Domain allowed access.
Read the contents of the OpenLDAP
database files.
Domain allowed access.
Read the OpenLDAP configuration files.
Domain allowed access.
Use LDAP over TCP connection. (Deprecated)
Domain allowed access.
Connect to slapd over an unix stream socket.
Domain allowed access.
Connect to dirsrv over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an ldap environment
Domain allowed access.
The role to be allowed to manage the ldap domain.
Likewise Active Directory support for UNIX.
Likewise Open is a free, open source application that joins Linux, Unix,
and Mac machines to Microsoft Active Directory to securely authenticate
users with their domain credentials.
The template to define a likewise domain.
This template creates a domain to be used for
a new likewise daemon.
The type of daemon to be used.
Connect to lsassd.
Domain allowed access.
implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux.
Execute domain in the phc2sys domain.
Domain allowed to transition.
Execute domain in the phc2sys domain.
Domain allowed to transition.
Connect to timemaster using a unix
domain stream socket.
Domain allowed access.
Read timemaster conf files.
Domain allowed access.
Read and write timemaster shared memory.
Domain allowed access.
Read and write ptp4l_t shared memory.
Domain allowed access.
Linux infared remote control daemon
Execute a domain transition to run lircd.
Domain allowed to transition.
Connect to lircd over a unix domain
stream socket.
Domain allowed access.
Read lircd etc file
The type of the process performing this action.
All of the rules required to administrate
a lircd environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Intel LLDP Agent.
Transition to lldpad.
Domain allowed to transition.
Send to lldpad with a unix dgram socket.
Domain allowed access.
Recv to lldpad with a unix dgram socket.
Domain allowed access.
All of the rules required to
administrate an lldpad environment.
Domain allowed access.
Role allowed access.
Line printer daemon
Role access for lpd
Role allowed access
User domain for the role
Execute lpd in the lpd domain.
Domain allowed access.
Execute amrecover in the lpd domain, and
allow the specified role the lpd domain.
Domain allowed access.
The role to be allowed the lpd domain.
List the contents of the printer spool directories.
Domain allowed access.
Read the printer spool files.
Domain allowed access.
Create, read, write, and delete printer spool files.
Domain allowed access.
Relabel from and to the spool files.
Domain allowed access.
List the contents of the printer spool directories.
Domain allowed access.
Transition to a user lpr domain.
Domain allowed access.
Allow the specified domain to execute lpr
in the caller domain.
Domain allowed access.
Use lpd server instead of cups
libStorageMgmt plug-in daemon
Execute TEMPLATE in the lsmd domin.
Domain allowed to transition.
Read lsmd PID files.
Domain allowed access.
Determine whether lsmd_plugin can
connect to all TCP ports.
Mailman is for managing electronic mail discussion and e-newsletter lists
The template to define a mailmain domain.
This template creates a domain to be used for
a new mailman daemon.
The type of daemon to be used eg, cgi would give mailman_cgi_
Execute mailman in the mailman domain.
Domain allowed access.
Execute the mailman program in the mailman domain.
Domain allowed to transition.
The role to allow the mailman domain.
Execute mailman CGI scripts in the
mailman CGI domain.
Domain allowed to transition.
Execute mailman in the caller domain.
Domain allowd access.
Send generic signals to the mailman cgi domain.
Domain allowed access.
Allow domain to search data directories.
Domain allowed access.
Allow domain to to read mailman data files.
Domain allowed access.
Allow domain to to create mailman data files
and write the directory.
Domain allowed access.
List the contents of mailman data directories.
Domain allowed access.
Allow read acces to mailman data symbolic links.
Domain allowed access.
Read mailman logs.
Domain allowed access.
Append to mailman logs.
Domain allowed access.
Create, read, write, and delete
mailman logs.
Domain allowed access.
Allow domain to read mailman archive files.
Domain allowed access.
Execute mailman_queue in the mailman_queue domain.
Domain allowed access.
policy for matahari
Creates types and rules for a basic
matahari init daemon domain.
Prefix for the domain.
Search matahari lib directories.
Domain allowed access.
Read matahari lib files.
Domain allowed access.
Create, read, write, and delete
matahari lib files.
Domain allowed access.
Manage matahari lib dirs files.
Domain allowed access.
Read matahari PID files.
Domain allowed access.
Read matahari PID files.
Domain allowed access.
Execute a domain transition to run matahari_hostd.
Domain allowed access.
Execute a domain transition to run matahari_netd.
Domain allowed access.
Execute a domain transition to run matahari_serviced.
Domain allowed access.
All of the rules required to administrate
an matahari environment
Domain allowed access.
Role allowed access.
high-performance memory object caching system
Execute a domain transition to run memcached.
Domain allowed to transition.
Read memcached PID files.
Domain allowed access.
All of the rules required to administrate
an memcached environment
Domain allowed access.
The role to be allowed to manage the memcached domain.
Manage memcached PID files
Domain allowed access.
Connect to memcached over a unix stream socket.
Domain allowed access.
Milter mail filters
Create a set of derived types for various
mail filter applications using the milter interface.
The name to be used for deriving type names.
MTA communication with milter sockets
Domain allowed access.
Allow getattr of milter sockets
Domain allowed access.
Allow setattr of milter dirs
Domain allowed access.
Manage spamassassin milter state
Domain allowed access.
Delete dkim-milter PID files.
Domain allowed access.
Mobile IPv6 and NEMO Basic Support implementation
Execute TEMPLATE in the mip6d domin.
Domain allowed to transition.
policy for mirrormanager
Execute mirrormanager in the mirrormanager domin.
Domain allowed to transition.
Read mirrormanager's log files.
Domain allowed access.
Append to mirrormanager log files.
Domain allowed access.
Manage mirrormanager log files
Domain allowed access.
Search mirrormanager lib directories.
Domain allowed access.
Read mirrormanager lib files.
Domain allowed access.
Manage mirrormanager lib files.
Domain allowed access.
Manage mirrormanager lib directories.
Domain allowed access.
Read mirrormanager PID files.
Domain allowed access.
Manage mirrormanager PID files.
Domain allowed access.
Manage mirrormanager PID sock files.
Domain allowed access.
All of the rules required to administrate
an mirrormanager environment
Domain allowed access.
Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards.
Execute a domain transition to run modemmanager.
Domain allowed to transition.
Send and receive messages from
modemmanager over dbus.
Domain allowed access.
Monopoly daemon
policy for daemon for playing music
Execute a domain transition to run mpd.
Domain allowed to transition.
Execute mpd server in the mpd domain.
Domain allowed access.
Read mpd data files.
Domain allowed access.
Read mpd tmpfs files.
Domain allowed access.
Manage mpd tmpfs files.
The type of the process performing this action.
Manage mpd data files.
Domain allowed access.
Search mpd lib directories.
Domain allowed access.
Read mpd lib files.
Domain allowed access.
Create, read, write, and delete
mpd lib files.
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Manage mpd lib dirs files.
Domain allowed access.
Send and receive messages from
mpd over dbus.
Domain allowed access.
All of the rules required to administrate
an mpd environment
Domain allowed access.
Role allowed access.
Policy common to all email tranfer agents.
MTA stub interface. No access allowed.
Domain allowed access.
Basic mail transfer agent domain template.
This template creates a derived domain which is
a email transfer agent, which sends mail on
behalf of the user.
This is the basic types and rules, common
to the system agent and user agents.
The prefix of the domain (e.g., user
is the prefix for user_t).
Type transition files created in calling dir
to the mail address aliases type.
Domain allowed access.
Directory to transition on.
Role access for mta
Role allowed access
User domain for the role
ALlow domain to read mail content in the homedir
Domain allowed access.
Allow domain to manage mail content in the homedir
Domain allowed access.
Make the specified domain usable for a mail server.
Type to be used as a mail server domain.
Type of the program to be used as an entry point to this domain.
Make the specified type a MTA executable file.
Type to be used as a mail client.
Dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Make the specified type by a system MTA.
Type to be used as a mail client.
Modified mailserver interface for
sendmail daemon use.
A modified MTA mail server interface for
the sendmail program. It's design does
not fit well with policy, and using the
regular interface causes a type_transition
conflict if direct running of init scripts
is enabled.
This interface should most likely only be used
by the sendmail policy.
The type to be used for the mail server.
Make a type a mailserver type used
for sending mail.
Mail server domain type used for sending mail.
Make a type a mailserver type used
for delivering mail to local users.
Mail server domain type used for delivering mail.
Make a type a mailserver type used
for sending mail on behalf of local
users to the local mail spool.
Mail server domain type used for sending local mail.
Send mail from the system.
Domain allowed access.
Send mail client a signal
The type of the process performing this action.
Execute send mail in a specified domain.
Execute send mail in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Send system mail client a signal
Domain allowed access.
Send system mail client a kill signal
Domain allowed access.
Execute sendmail in the caller domain.
Domain allowed access.
Read mail server configuration.
Domain allowed access.
write mail server configuration.
Domain allowed access.
Read mail address aliases.
Domain allowed access.
Create, read, write, and delete mail address aliases.
Domain allowed access.
Type transition files created in /etc
to the mail address aliases type.
Domain allowed access.
Read and write mail aliases.
Domain allowed access.
Do not audit attempts to read and write TCP
sockets of mail delivery domains.
Mail server domain.
Connect to all mail servers over TCP. (Deprecated)
Mail server domain.
Do not audit attempts to read a symlink
in the mail spool.
Domain allowed access.
Get the attributes of mail spool files.
Domain allowed access.
Do not audit attempts to get the attributes
of mail spool files.
Domain to not audit.
Create private objects in the
mail spool directory.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Read and write the mail spool.
Domain allowed access.
Create, read, and write the mail spool.
Domain allowed access.
Delete from the mail spool.
Domain allowed access.
Create, read, write, and delete mail spool files.
Domain allowed access.
Search mail queue dirs.
Domain allowed access.
List the mail queue.
Domain allowed access.
Read the mail queue.
Domain allowed access.
Do not audit attempts to read and
write the mail queue.
Domain to not audit.
Create, read, write, and delete
mail queue files.
Domain allowed access.
Type transition files created in calling dir
to the mail address aliases type.
Domain allowed access.
Directory to transition on.
The object class of the object being created.
Read sendmail binary.
Domain allowed access.
Read and write unix domain stream sockets
of user mail domains.
Domain allowed access.
Send all user mail client a signal
Domain allowed access.
Munin network-wide load graphing (formerly LRRD)
Connect to munin over a unix domain
stream socket.
Domain allowed access.
Read munin configuration files.
Domain allowed access.
dontaudit read and write an leaked file descriptors
The type of the process performing this action.
Append to the munin log.
Domain allowed access.
Search munin library directories.
Domain allowed access.
Do not audit attempts to search
munin library directories.
Domain allowed access.
Create a set of derived types for various
munin plugins,
The name to be used for deriving type names.
All of the rules required to administrate
an munin environment
Domain allowed access.
The role to be allowed to manage the munin domain.
Policy for MySQL
Execute MySQL in the mysql domain.
Domain allowed access.
Execute MySQL in the coller domain.
Domain allowed access.
Execute MySQL_safe in the coller domain.
Domain allowed access.
Send a generic signal to MySQL.
Domain allowed access.
Allow the specified domain to connect to postgresql with a tcp socket.
Domain allowed access.
Connect to MySQL using a unix domain stream socket.
Domain allowed access.
Read MySQL configuration files.
Domain allowed access.
Search the directories that contain MySQL
database storage.
Domain allowed access.
List the directories that contain MySQL
database storage.
Domain allowed access.
Read and write to the MySQL database directory.
Domain allowed access.
Create, read, write, and delete MySQL database directories.
Domain allowed access.
Append to the MySQL database directory.
Domain allowed access.
Read and write to the MySQL database directory.
Domain allowed access.
Create, read, write, and delete MySQL database files.
Domain allowed access.
Read and write to the MySQL database
named socket.
Domain allowed access.
Write to the MySQL log.
Domain allowed access.
Execute MySQL server in the mysql domain.
Domain allowed access.
Read MySQL PID files.
Domain allowed access.
Search MySQL PID files.
Domain allowed access.
All of the rules required to administrate an mysql environment
Domain allowed access.
The role to be allowed to manage the mysql domain.
Read and write to the MySQL database directory.
Domain allowed access.
Allow mysqld to connect to all ports
Net Saint / NAGIOS - network monitoring server
Do not audit attempts to read or write nagios
unnamed pipes.
Domain to not audit.
Allow the specified domain to read
nagios configuration files.
Domain allowed access.
Allow the specified domain to read
nagios temporary files.
Domain allowed access.
Allow the specified domain to read
nagios temporary files.
Domain allowed access.
Execute the nagios NRPE with
a domain transition.
Domain allowed access.
Search nagios spool directories.
Domain allowed access.
Read nagios lib files.
Domain allowed access.
Read nagios logs.
Domain allowed access.
dontaudit Read and write nagios logs.
Domain allowed access.
Execute the nagios unconfined plugins with
a domain transition.
Domain allowed access.
Create a set of derived types for various
nagios plugins,
The name to be used for deriving type names.
Do not audit attempts to write nrpe daemon unnamed pipes.
Domain allowed access.
All of the rules required to administrate
an nagios environment
Domain allowed access.
The role to be allowed to manage the nagios domain.
Read nagios lib files.
Domain allowed access.
Execute nagios log in the caller domain.
Domain allowed access.
Allow nagios/nrpe to call sudo from NRPE utils scripts.
Nessus network scanning daemon
Connect to nessus over a TCP socket (Deprecated)
Domain allowed access.
Manager for dynamically switching between networks.
Read and write NetworkManager UDP sockets.
Domain allowed access.
Read and write NetworkManager packet sockets.
Domain allowed access.
Read and write NetworkManager netlink
routing sockets.
Domain allowed access.
Execute NetworkManager with a domain transition.
Domain allowed access.
Send and receive messages from
NetworkManager over dbus.
Domain allowed access.
Send and receive messages from
NetworkManager over dbus.
Domain allowed access.
Send a generic signal to NetworkManager
Domain allowed access.
Execute NetworkManager scripts with an automatic domain transition to initrc.
Domain allowed access.
Read NetworkManager PID files.
Domain allowed access.
Read NetworkManager PID files.
Domain allowed access.
Execute NetworkManager in the NetworkManager domain, and
allow the specified role the NetworkManager domain.
Domain allowed access.
The role to be allowed the NetworkManager domain.
Allow caller to relabel tun_socket
Domain allowed access.
Allow the specified domain to append
to Network Manager log files.
Domain allowed access.
Policy for NIS (YP) servers and clients
Use the ypbind service to access NIS services
unconditionally.
Use the ypbind service to access NIS services
unconditionally.
This interface was added because of apache and
spamassassin, to fix a nested conditionals problem.
When that support is added, this should be removed,
and the regular interface should be used.
The type of the process performing this action.
Use the ypbind service to access NIS services.
Allow the specified domain to use the ypbind service
to access Network Information Service (NIS) services.
Information that can be retreived from NIS includes
usernames, passwords, home directories, and groups.
If the network is configured to have a single sign-on
using NIS, it is likely that any program that does
authentication will need this access.
Domain allowed access.
Use the nis to authenticate passwords
Domain allowed access.
Execute ypbind in the ypbind domain.
Domain allowed access.
Execute ypbind in the ypbind domain, and
allow the specified role the ypbind domain.
Domain allowed access.
The role to be allowed the ypbind domain.
Send generic signals to ypbind.
Domain allowed access.
List the contents of the NIS data directory.
Domain allowed access.
Send UDP network traffic to NIS clients. (Deprecated)
Domain allowed access.
Connect to ypbind over TCP. (Deprecated)
Domain allowed access.
Read ypbind pid files.
Domain allowed access.
Delete ypbind pid files.
Domain allowed access.
Read ypserv configuration files.
Domain allowed access.
Execute ypxfr in the ypxfr domain.
Domain allowed access.
Execute nis server in the nis domain.
Domain allowed access.
Execute nis server in the nis domain.
Domain allowed access.
All of the rules required to administrate
an nis environment
Domain allowed access.
Role allowed access.
openstack-nova
Manage nova lib files.
Domain allowed access.
Creates types and rules for a basic
openstack-nova systemd daemon domain.
Prefix for the domain.
Name service cache daemon
Send generic signals to NSCD.
Domain allowed access.
Send NSCD the kill signal.
Domain allowed access.
Send signulls to NSCD.
Domain allowed access.
Execute NSCD in the nscd domain.
The type of the process performing this action.
Allow the specified domain to execute nscd
in the caller domain.
Domain allowed access.
Use NSCD services by connecting using
a unix stream socket.
Domain allowed access.
Use nscd services
Domain allowed access.
Use NSCD services by mapping the database from
an inherited NSCD file descriptor.
Domain allowed access.
Do not audit attempts to search the NSCD pid directory.
Domain allowed access.
Read NSCD pid file.
Domain allowed access.
Unconfined access to NSCD services.
Domain allowed access.
Execute nscd in the nscd domain, and
allow the specified role the nscd domain.
Domain allowed access
The role to be allowed the nscd domain.
Execute the nscd server init script.
Domain allowed access.
All of the rules required to administrate
an nscd environment
Domain allowed access.
The role to be allowed to manage the nscd domain.
Allow confined applications to use nscd shared memory.
Authoritative only name server
Send and receive datagrams from NSD. (Deprecated)
Domain allowed access.
Connect to NSD over a TCP socket (Deprecated)
Domain allowed access.
nslcd - local LDAP name service daemon.
Execute a domain transition to run nslcd.
Domain allowed to transition.
Execute nslcd server in the nslcd domain.
The type of the process performing this action.
Read nslcd PID files.
Domain allowed access.
Connect to nslcd over an unix stream socket.
Domain allowed to connect.
All of the rules required to administrate
an nslcd environment
Domain allowed access.
Role allowed access.
Network Top
Execute a domain transition to run ntop.
Domain allowed to transition.
Execute ntop server in the ntop domain.
The type of the process performing this action.
Read ntop content in /etc
Domain allowed access.
Search ntop dirs in /var/lib
Domain allowed access.
Read ntop files in /var/lib
Domain allowed access.
Manage ntop files in /var/lib
Domain allowed access.
All of the rules required to administrate
an ntop environment
Domain allowed access.
Role allowed access.
Network time protocol daemon
NTP stub interface. No access allowed.
Domain allowed access.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Execute ntp in the ntp domain, and
allow the specified role the ntp domain.
Domain allowed access.
Role allowed access.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Execute ntp server in the ntpd domain.
The type of the process performing this action.
Send a generic signal to ntpd
Domain allowed access.
Read and write ntpd shared memory.
The type of the process performing this action.
All of the rules required to administrate
an ntp environment
Domain allowed access.
The role to be allowed to manage the ntp domain.
policy for numad
Transition to numad.
Domain allowed to transition.
All of the rules required to administrate
an numad environment
Domain allowed access.
nut - Network UPS Tools
NX remote desktop
Transition to NX server.
Domain allowed access.
Read nx home directory content
Domain allowed access.
Read nx home directory content
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Open AntiVirus scannerdaemon and signature update
Execute oav_update in the oav_update domain.
Domain allowed access.
Execute oav_update in the oav_update domain, and
allow the specified role the oav_update domain.
Domain allowed access.
The role to be allowed the oav_update domain.
Oddjob provides a mechanism by which unprivileged applications can
request that specified privileged operations be performed on their
behalf.
Execute a domain transition to run oddjob.
Domain allowed to transition.
Do not audit attempts to read and write
oddjob fifo file.
Domain to not audit.
Make the specified program domain accessable
from the oddjob.
The type of the process to transition to.
The type of the file used as an entrypoint to this domain.
Send and receive messages from
oddjob over dbus.
Domain allowed access.
Send a SIGCHLD signal to oddjob.
Domain allowed access.
Execute a domain transition to run oddjob_mkhomedir.
Domain allowed to transition.
Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain.
Domain allowed access.
Role allowed access.
Create a domain which can be started by init,
with a range transition.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
SELinux policy for Oident daemon.
Oident daemon is a server that implements the TCP/IP
standard IDENT user identification protocol as
specified in the RFC 1413 document.
Allow the specified domain to read
Oidentd personal configuration files.
Domain allowed access.
Allow the specified domain to create, read, write, and delete
Oidentd personal configuration files.
Domain allowed access.
Allow the specified domain to relabel
Oidentd personal configuration files.
Domain allowed access.
OpenCA - Open Certificate Authority
Execute the OpenCA program with
a domain transition.
Domain allowed access.
Send OpenCA generic signals.
Domain allowed access.
Send OpenCA stop signals.
Domain allowed access.
Kill OpenCA.
Domain allowed access.
Service for handling smart card readers.
Send openct a null signal.
Domain allowed access.
Execute openct in the caller domain.
Domain allowed access.
Execute a domain transition to run openct.
Domain allowed to transition.
Read openct PID files.
Domain allowed access.
Connect to openct over an unix stream socket.
Domain allowed access.
policy for openhpid
Transition to openhpid.
Domain allowed to transition.
Execute openhpid server in the openhpid domain.
Domain allowed access.
Search openhpid lib directories.
Domain allowed access.
Read openhpid lib files.
Domain allowed access.
Manage openhpid lib files.
Domain allowed access.
Manage openhpid lib directories.
Domain allowed access.
All of the rules required to administrate
an openhpid environment
Domain allowed access.
Role allowed access.
policy for openshift
Execute openshift server in the openshift domain.
The type of the process performing this action.
Execute openshift server in the openshift domain.
The type of the process performing this action.
Execute openshift server in the openshift domain.
The type of the process performing this action.
Role access to this domain.
Send a null signal to openshift init scripts.
Domain allowed access.
Send a signal to openshift init scripts.
Domain allowed access.
Allow the specified domain to read openshift's log files.
Domain allowed access.
Allow the specified domain to append
openshift log files.
Domain allowed to transition.
Allow domain to manage openshift log files
Domain to not audit.
Getattr openshift lib files.
Domain allowed access.
Search openshift lib directories.
Domain allowed access.
Read openshift lib files.
Domain allowed access.
Read openshift lib files.
Domain allowed access.
Create, read, write, and delete
openshift lib files.
Domain allowed access.
Manage openshift lib dirs files.
Domain allowed access.
Manage openshift lib content.
Domain allowed access.
Create private objects in the
mail lib directory.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
The name of the object being created.
Read openshift PID files.
Domain allowed access.
All of the rules required to administrate
an openshift environment
Domain allowed access.
Role allowed access.
Make the specified type usable as a openshift domain.
The prefix of the domain (e.g., openshift
is the prefix for openshift_t).
Make the specified type usable as a openshift domain.
Type to be used as a openshift domain type.
Read and write inherited openshift files.
Domain allowed access.
Manage openshift tmp files.
Domain allowed access.
Manage openshift tmp sockets.
Domain allowed access.
Mounton openshift tmp directory.
Domain allowed access.
Dontaudit Read and write inherited script fifo files.
Domain allowed access.
Allow calling app to transition to an openshift domain
Domain allowed access
Allow calling app to transition to an openshift domain
Domain allowed access
Execute openshift in the openshift domain, and
allow the specified role the openshift domain.
Domain allowed to transition.
Role allowed access.
Allow openshift to access nfs file systems without labels
full-featured SSL VPN solution
Execute OPENVPN clients in the openvpn domain.
Domain allowed access.
Execute OPENVPN clients in the openvpn domain, and
allow the specified role the openvpn domain.
Domain allowed access.
The role to be allowed the openvpn domain.
Send OPENVPN clients the kill signal.
Domain allowed access.
Send generic signals to OPENVPN clients.
Domain allowed access.
Send signulls to OPENVPN clients.
Domain allowed access.
Allow the specified domain to read
OpenVPN configuration files.
Domain allowed access.
All of the rules required to administrate
an openvpn environment
Domain allowed access.
The role to be allowed to manage the openvpn domain.
Allow openvpn to read home directories
Allow openvpn to run unconfined scripts
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Transition to openvswitch.
Domain allowed to transition.
Execute TEMPLATE in the openvswitch domin.
Domain allowed to transition.
Allow stream connect to openvswitch.
Domain allowed access.
Read openvswitch PID files.
Domain allowed access.
Search openvswitch lib directories.
Domain allowed access.
Read openvswitch lib files.
Domain allowed access.
Manage openvswitch lib files.
Domain allowed access.
Manage openvswitch lib directories.
Domain allowed access.
WS-Management Server
Execute openwsman in the openwsman domin.
Domain allowed to transition.
policy for oracleasm
Transition to oracleasm.
Domain allowed to transition.
Execute oracleasm server in the oracleasm domain.
Domain allowed access.
All of the rules required to administrate
an oracleasm environment
Domain allowed access.
Role allowed access.
Client-side service written in Python that responds to pings and runs rhn_check when told to by osa-dispatcher.
Execute osad in the osad domin.
Domain allowed to transition.
Execute osad server in the osad domain.
Domain allowed access.
Read osad's log files.
Domain allowed access.
Append to osad log files.
Domain allowed access.
Manage osad log files
Domain allowed access.
Read osad PID files.
Domain allowed access.
All of the rules required to administrate
an osad environment
Domain allowed access.
Role allowed access.
policy for pacemaker
Transition to pacemaker.
Domain allowed to transition.
Execute pacemaker server in the pacemaker domain.
Domain allowed access.
Search pacemaker lib directories.
Domain allowed access.
Read pacemaker lib files.
Domain allowed access.
Manage pacemaker lib files.
Domain allowed access.
Manage pacemaker lib directories.
Domain allowed access.
Read pacemaker PID files.
Domain allowed access.
All of the rules required to administrate
an pacemaker environment
Domain allowed access.
Role allowed access.
Passive Asset Detection System
PADS is a libpcap based detection engine used to
passively detect network assets. It is designed to
complement IDS technology by providing context to IDS
alerts.
All of the rules required to administrate
an pads environment
Domain allowed access.
Role allowed access.
Ruby on rails deployment for Apache and Nginx servers.
Execute passenger in the passenger domain.
Domain allowed to transition.
Execute passenger in the current domain.
Domain allowed to transition.
Read passenger lib files
Domain allowed access.
Manage passenger lib files
Domain allowed access.
Manage passenger var_run content.
Domain allowed access.
Connect to passenger unix stream socket.
Domain allowed access.
Allow to manage passenger tmp files/dirs.
Domain allowed access.
Allow to manage passenger tmp sock_files
Domain allowed access.
The pcp command summarizes the status of a Performance Co-Pilot (PCP) installation
Creates types and rules for a basic
pcp daemon domain.
Prefix for the domain.
Allow domain to read pcp lib files
Prefix for the domain.
All of the rules required to administrate
an pcp environment
Domain allowed access.
Allow the specified domain to execute pcp_pmie
in the caller domain.
Domain allowed to transition.
Allow the specified domain to execute pcp_pmlogger
in the caller domain.
Domain allowed to transition.
Allow pcp to bind to all unreserved_ports
PCSC smart card service
Execute a domain transition to run pcscd.
Domain allowed to transition.
Read pcscd pub files.
Domain allowed access.
Manage pcscd pub files.
Domain allowed access.
Manage pcscd pub fifo files.
Domain allowed access.
Connect to pcscd over an unix stream socket.
Domain allowed access.
The Open Group Pegasus CIM/WBEM Server.
Perdition POP and IMAP proxy
Connect to perdition over a TCP socket (Deprecated)
The type of the process performing this action.
Pingd of the Whatsup cluster node up/down detection utility
Execute a domain transition to run pingd.
Domain allowed to transition.
Read pingd etc configuration files.
Domain allowed access.
Manage pingd etc configuration files.
Domain allowed access.
All of the rules required to administrate
an pingd environment
Domain allowed access.
The role to be allowed to manage the pingd domain.
policy for piranha
Creates types and rules for a basic
cluster init daemon domain.
Prefix for the domain.
Execute a domain transition to run fos.
Domain allowed to transition.
Execute a domain transition to run lvsd.
Domain allowed to transition.
Execute a domain transition to run pulse.
Domain allowed to transition.
Execute pulse server in the pulse domain.
The type of the process performing this action.
Allow the specified domain to read piranha's log files.
Domain allowed access.
Allow the specified domain to append
piranha log files.
Domain allowed to transition.
Allow domain to manage piranha log files
Domain to not audit.
Allow piranha-lvs domain to connect to the network using TCP.
policy for pkcsslotd
Transition to pkcsslotd.
Domain allowed to transition.
Search pkcsslotd lib directories.
Domain allowed access.
Read pkcsslotd lib files.
Domain allowed access.
Manage pkcsslotd lib files.
Domain allowed access.
Manage pkcsslotd lib directories.
Domain allowed access.
All of the rules required to administrate
an pkcsslotd environment
Domain allowed access.
policy for plymouthd
Execute a domain transition to run plymouthd.
Domain allowed to transition.
Execute the plymoth daemon in the current domain
Domain allowed to transition.
Execute the plymoth command in the current domain
Domain allowed to transition.
Execute a domain transition to run plymouthd.
Domain allowed to transition.
Read plymouthd PID files.
Domain allowed access.
Manage plymouthd var_run files.
Domain allowed access.
Search plymouthd lib directories.
Domain allowed access.
Read plymouthd lib files.
Domain allowed access.
Create, read, write, and delete
plymouthd lib files.
Domain allowed access.
Manage plymouthd var_lib files.
Domain allowed access.
Search plymouthd spool directories.
Domain allowed access.
Read plymouthd spool files.
Domain allowed access.
Create, read, write, and delete
plymouthd spool files.
Domain allowed access.
Allow domain to manage plymouthd spool files
Domain allowed access
All of the rules required to administrate
an plymouthd environment
Domain allowed access.
Allow domain to Stream socket connect
to Plymouth daemon.
Domain allowed access.
Policy framework for controlling privileges for system-wide services.
Send and receive messages from
policykit over dbus.
Domain allowed access.
Send and receive messages from
policykit over dbus.
Domain allowed access.
Execute a domain transition to run polkit_auth.
Domain allowed to transition.
Execute a policy_auth in the policy_auth domain, and
allow the specified role the policy_auth domain,
Domain allowed access.
The role to be allowed the load_policy domain.
Execute a domain transition to run polkit_grant.
Domain allowed to transition.
Execute a policy_grant in the policy_grant domain, and
allow the specified role the policy_grant domain,
Domain allowed access.
The role to be allowed the load_policy domain.
read policykit reload files
Domain allowed access.
rw policykit reload files
Domain allowed access.
Execute a domain transition to run polkit_resolve.
Domain allowed to transition.
Search policykit lib directories.
Domain allowed access.
read policykit lib files
Domain allowed access.
The per role template for the policykit module.
Role allowed access
User domain for the role
Send generic signal to policy_auth
Domain allowed to transition.
RPC port mapping service.
Execute portmap_helper in the helper domain.
Domain allowed access.
Execute portmap helper in the helper domain, and
allow the specified role the helper domain.
Communicate with portmap.
Domain allowed access.
The role to be allowed the portmap domain.
Send UDP network traffic to portmap. (Deprecated)
The type of the process performing this action.
Send and receive UDP network traffic from portmap. (Deprecated)
Domain allowed access.
Connect to portmap over a TCP socket (Deprecated)
The type of the process performing this action.
Reserve well-known ports in the RPC port range.
Execute a domain transition to run portreserve.
Domain allowed to transition.
Execute portreserve in the portreserve domain.
The type of the process performing this action.
Allow the specified domain to read
portreserve etcuration files.
Domain allowed access.
Allow the specified domain to manage
portreserve etcuration files.
Domain allowed access.
All of the rules required to administrate
an portreserve environment.
Domain allowed access.
Role allowed access.
Portslave terminal server software
Execute portslave with a domain transition.
Domain allowed to transition.
Postfix email server
Postfix stub interface. No access allowed.
Domain allowed access.
Creates types and rules for a basic
postfix process domain.
Prefix for the domain.
Creates a postfix server process domain.
Prefix of the domain.
Creates a process domain for programs
that are ran by users.
Prefix of the domain.
Read postfix configuration files.
Domain allowed access.
Create files with the specified type in
the postfix configuration directories.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to read and
write postfix local delivery
TCP sockets.
Domain to not audit.
Allow read/write postfix local pipes
TCP sockets.
Domain allowed access.
Allow read/write postfix public pipes
TCP sockets.
Domain allowed access.
Allow domain to read postfix local process state
Domain allowed access.
Allow domain to read postfix master process state
Domain allowed access.
Use postfix master process file
file descriptors.
Domain allowed access.
Do not audit attempts to use
postfix master process file
file descriptors.
Domain to not audit.
Execute postfix_map in the postfix_map domain.
Domain allowed to transition.
Execute postfix_map in the postfix_map domain, and
allow the specified role the postfix_map domain.
Domain allowed to transition.
Role allowed access.
Execute the master postfix program in the
postfix_master domain.
Domain allowed to transition.
Execute the master postfix in the postfix master domain.
Domain allowed access.
Execute the master postfix program in the
caller domain.
Domain allowed access.
Connect to postfix master process using a unix domain stream socket.
Domain allowed access.
Allow read/write postfix master pipes
Domain allowed access.
Execute the master postdrop in the
postfix_postdrop domain.
Domain allowed to transition.
Execute the master postqueue in the
postfix_postqueue domain.
Domain allowed to transition.
Execute the master postqueue in the caller domain.
Domain allowed access.
Create a named socket in a postfix private directory.
Domain allowed access.
manage named socket in a postfix private directory.
Domain allowed access.
Execute the master postfix program in the
postfix_master domain.
Domain allowed to transition.
Getattr postfix mail spool files.
Domain allowed access.
Search postfix mail spool directories.
Domain allowed access.
List postfix mail spool directories.
Domain allowed access.
Read postfix mail spool files.
Domain allowed access.
Create, read, write, and delete postfix mail spool files.
Domain allowed access.
Read, write, and delete postfix maildrop spool files.
Domain allowed access.
Create, read, write, and delete postfix maildrop spool files.
Domain allowed access.
Execute postfix user mail programs
in their respective domains.
Domain allowed access.
All of the rules required to administrate
an postfix environment.
Domain allowed access.
Role allowed access.
Execute the master postdrop in the
postfix_postdrop domain.
Domain allowed to transition.
The role to be allowed the iptables domain.
Allow postfix_local domain full write access to mail_spool directories
Postfix policy server
All of the rules required to administrate
an postfixpolicyd environment
Domain allowed access.
The role to be allowed to manage the postfixpolicyd domain.
PostgreSQL relational database
Role access for SE-PostgreSQL.
The role associated with the user domain.
The type of the user domain.
Marks as a SE-PostgreSQL loadable shared library module
Type marked as a database object type.
Marks as a SE-PostgreSQL database object type
Type marked as a database object type.
Marks as a SE-PostgreSQL schema object type
Type marked as a schema object type.
Marks as a SE-PostgreSQL table/column/tuple object type
Type marked as a table/column/tuple object type.
Marks as a SE-PostgreSQL system table/column/tuple object type
Type marked as a table/column/tuple object type.
Marks as a SE-PostgreSQL sequence type
Type marked as a sequence type.
Marks as a SE-PostgreSQL view object type
Type marked as a view object type.
Marks as a SE-PostgreSQL procedure object type
Type marked as a database object type.
Marks as a SE-PostgreSQL procedural language object type
Type marked as a procedural language object type.
Marks as a SE-PostgreSQL binary large object type
Type marked as a database binary large object type.
Allow the specified domain to search postgresql's database directory.
Domain allowed access.
Allow the specified domain to manage postgresql's database.
Domain allowed access.
Execute postgresql in the postgresql domain.
Domain allowed to transition.
Execute Postgresql in the caller domain.
Domain allowed access.
Allow domain to signal postgresql
Domain allowed access.
Allow the specified domain to read postgresql's etc.
Domain allowed access.
Allow the specified domain to connect to postgresql with a tcp socket.
Domain allowed access.
Allow the specified domain to connect to postgresql with a unix socket.
Domain allowed access.
Allow the specified domain unprivileged accesses to unifined database objects
managed by SE-PostgreSQL,
Domain allowed access.
Allow the specified domain unconfined accesses to any database objects
managed by SE-PostgreSQL,
Domain allowed access.
All of the rules required to administrate an postgresql environment
Domain allowed access.
The role to be allowed to manage the postgresql domain.
Allow postgresql to use ssh and rsync for point-in-time recovery
Allow unprivileged users to execute DDL statement
Allow database admins to execute DML statement
Postfix grey-listing server
Write to postgrey socket
Domain allowed to talk to postgrey
Search the spool directory
Domain allowed access
All of the rules required to administrate
an postgrey environment
Domain allowed access.
The role to be allowed to manage the postgrey domain.
Point to Point Protocol daemon creates links in ppp networks
Use PPP file discriptors.
Domain allowed access.
Do not audit attempts to inherit
and use PPP file discriptors.
Domain to not audit.
Send a SIGCHLD signal to PPP.
Domain allowed access.
Send ppp a kill signal
Domain allowed access.
Send a generic signal to PPP.
Domain allowed access.
Send a generic signull to PPP.
Domain allowed access.
Execute domain in the ppp domain.
Domain allowed access.
Conditionally execute ppp daemon on behalf of a user or staff type.
Domain allowed access.
The role to allow the ppp domain.
Unconditionally execute ppp daemon on behalf of a user or staff type.
Domain allowed access.
The role to allow the ppp domain.
Execute domain in the ppp caller.
Domain allowed access.
Read ppp configuration files.
Domain allowed access.
Read PPP-writable configuration files.
Domain allowed access.
Read PPP secrets.
Domain allowed access.
Read PPP pid files.
Domain allowed access.
Create, read, write, and delete PPP pid files.
Domain allowed access.
Create, read, write, and delete PPP pid files.
Domain allowed access.
Execute ppp server in the ntpd domain.
The type of the process performing this action.
All of the rules required to administrate
an ppp environment
Domain allowed access.
Role allowed access.
Allow pppd to load kernel modules for certain modems
Allow pppd to be run for a regular user
Prelude hybrid intrusion detection system
Execute a domain transition to run prelude.
Domain allowed to transition.
Execute a domain transition to run prelude_audisp.
Domain allowed to transition.
Signal the prelude_audisp domain.
Domain allowed acccess.
Read the prelude spool files
Domain allowed access.
Manage to prelude-manager spool files.
Domain allowed to transition.
All of the rules required to administrate
an prelude environment
Domain allowed access.
Role allowed access.
Privacy enhancing web proxy.
All of the rules required to administrate
an privoxy environment
Domain allowed access.
Role allowed access.
Allow privoxy to connect to all ports, not just
HTTP, FTP, and Gopher ports.
Procmail mail delivery agent
Execute procmail with a domain transition.
Domain allowed access.
Execute procmail in the caller domain.
Domain allowed access.
Read procmail tmp files.
Domain allowed access.
Read/write procmail tmp files.
Domain allowed access.
Read procmail home directory content
Domain allowed access.
Intrusion Detection and Log Analysis with iptables
Execute a domain transition to run psad.
Domain allowed to transition.
Send a generic signal to psad
Domain allowed access.
Send a null signal to psad.
Domain allowed access.
Read psad etc configuration files.
Domain allowed access.
Manage psad etc configuration files.
Domain allowed access.
Read psad PID files.
Domain allowed access.
Read psad PID files.
Domain allowed access.
Allow the specified domain to read psad's log files.
Domain allowed access.
Allow the specified domain to append to psad's log files.
Domain allowed access.
Allow the specified domain to write to psad's log files.
Domain allowed access.
Read and write psad fifo files.
Domain allowed access.
Read and write psad tmp files.
Domain allowed access.
All of the rules required to administrate
an psad environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
publicfile supplies files to the public through HTTP and FTP
Puppet client daemon
Puppet is a configuration management system written in Ruby.
The client daemon is responsible for periodically requesting the
desired system state from the server and ensuring the state of
the client system matches.
Execute puppet_master in the puppet_master
domain.
Domain allowed to transition.
Read / Write to Puppet temp files. Puppet uses
some system binaries (groupadd, etc) that run in
a non-puppet domain and redirects output into temp
files.
Domain allowed access
Allow the specified domain to read puppet's config files.
Domain allowed access.
Allow the specified domain to read puppet's log files.
Domain allowed access.
Allow the specified domain to create puppet's log files.
Domain allowed access.
Allow the specified domain to append puppet's log files.
Domain allowed access.
Read Puppet lib files.
Domain allowed access.
Manage Puppet lib files.
Domain allowed access.
Allow the specified domain to search puppet's log files.
Domain allowed access.
Allow the specified domain to search puppet's pid files.
Domain allowed access.
Execute puppet in the puppet
domain.
Domain allowed to transition.
Execute puppet in the puppet
domain and allow the specified
role the puppetca domain.
Domain allowed to transition.
Role allowed access.
Allow Puppet client to manage all file
types.
Allow Puppet master to use connect to mysql and postgresql database
Server for the PXE network boot protocol
PyICQt is an ICQ transport for XMPP server.
Pyzor is a distributed, collaborative spam detection and filtering network.
Role access for pyzor
Role allowed access
User domain for the role
Send generic signals to pyzor
Domain allowed access.
Execute pyzor with a domain transition.
Domain allowed access.
Execute pyzor in the caller domain.
Domain allowed access.
All of the rules required to administrate
an pyzor environment
Domain allowed access.
The role to be allowed to manage the pyzor domain.
Qmail Mail Server
Template for qmail parent/sub-domain pairs
The prefix of the child domain
The name of the parent domain.
Transition to qmail_inject_t
Domain allowed access
Transition to qmail_queue_t
Domain allowed access
Read qmail configuration files.
Domain allowed access.
Define the specified domain as a qmail-smtp service.
Needed by antivirus/antispam filters.
Domain allowed access
The type associated with the process program.
Create, read, write, and delete qmail
spool directories.
Domain allowed access.
Create, read, write, and delete qmail
spool files.
Domain allowed access.
Read and write to qmail spool pipes.
Domain to not audit.
policy for qpidd
Execute a domain transition to run qpidd.
Domain allowed to transition.
Execute qpidd server in the qpidd domain.
The type of the process performing this action.
Execute qpidd server in the qpidd domain.
The type of the process performing this action.
Read qpidd PID files.
Domain allowed access.
Manage qpidd var_run files.
Domain allowed access.
Search qpidd lib directories.
Domain allowed access.
Read qpidd lib files.
Domain allowed access.
Create, read, write, and delete
qpidd lib files.
Domain allowed access.
Manage qpidd var_lib files.
Domain allowed access.
All of the rules required to administrate
an qpidd environment
Domain allowed access.
Role allowed access.
Allow read and write access to qpidd semaphores.
Domain allowed access.
Read and write to qpidd shared memory.
The type of the process performing this action.
Quantum is a virtual network service for Openstack
Transition to neutron.
Domain allowed to transition.
Read neutron's log files.
Domain allowed access.
Append to neutron log files.
Domain allowed access.
Manage neutron log files
Domain allowed access.
Search neutron lib directories.
Domain allowed access.
Read neutron lib files.
Domain allowed access.
Manage neutron lib files.
Domain allowed access.
Manage neutron lib directories.
Domain allowed access.
Read and write neutron fifo files.
Domain allowed access.
Allow domain to send sigchld to neutron process.
Domain allowed access.
Connect to neutron over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an neutron environment
Domain allowed access.
RADIUS authentication and accounting server.
Use radius over a UDP connection. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an radius environment
Domain allowed access.
Role allowed access.
IPv6 router advertisement daemon
Read radvd PID files.
Domain allowed access.
All of the rules required to administrate
an radvd environment
Domain allowed access.
Role allowed access.
A distributed, collaborative, spam detection and filtering network.
A distributed, collaborative, spam detection and filtering network.
This policy will work with either the ATrpms provided config
file in /etc/razor, or with the default of dumping everything into
$HOME/.razor.
Template to create types and rules common to
all razor domains.
The prefix of the domain (e.g., user
is the prefix for user_t).
Role access for razor
Role allowed access
User domain for the role
Execute razor in the system razor domain.
Domain allowed access.
Create, read, write, and delete razor files
in a user home subdirectory.
Domain allowed access.
read razor lib files.
Domain allowed access.
Network router discovery daemon
Execute rdisc in the caller domain.
Domain allowed access.
Advanced key-value store
Execute redis server in the redis domin.
Domain allowed to transition.
Execute redis server in the redis domain.
Domain allowed access.
Read redis's log files.
Domain allowed access.
Append to redis log files.
Domain allowed access.
Manage redis log files
Domain allowed access.
Search redis lib directories.
Domain allowed access.
Read redis lib files.
Domain allowed access.
Manage redis lib files.
Domain allowed access.
Manage redis lib directories.
Domain allowed access.
Read redis PID files.
Domain allowed access.
Connect to redis over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an redis environment
Domain allowed access.
Role allowed access.
Policy for rshd, rlogind, and telnetd.
Domain transition to the remote login domain.
The type of the process performing this action.
allow Domain to signal remote login domain.
The type of the process performing this action.
Resource management daemon
Connect to resmgrd over a unix domain
stream socket.
Domain allowed access.
SELinux policy for rgmanager
Execute a domain transition to run rgmanager.
Domain allowed to transition.
Allow read and write access to rgmanager semaphores.
Domain allowed access.
Connect to rgmanager over an unix stream socket.
Domain allowed access.
Allow manage rgmanager tmpfs files.
The type of the process performing this action.
Allow manage rgmanager tmp files.
The type of the process performing this action.
Allow manage rgmanager pid files.
The type of the process performing this action.
All of the rules required to administrate
an rgmanager environment
Domain allowed access.
The role to be allowed to manage the rgmanager domain.
Allow the specified domain to manage rgmanager's lib/run files.
Domain allowed access.
Allow the specified domain to search rgmanager's lib files.
Domain allowed access.
Allow rgmanager domain to connect to the network using TCP.
RHCS - Red Hat Cluster Suite
Creates types and rules for a basic
rhcs init daemon domain.
Prefix for the domain.
Execute a domain transition to run dlm_controld.
Domain allowed to transition.
Connect to dlm_controld over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to dlm_controld semaphores.
Domain allowed access.
Execute a domain transition to run fenced.
Domain allowed access.
Allow a domain to getattr on fenced executable.
Domain allowed to transition.
Allow read and write access to fenced semaphores.
Domain allowed access.
Send and receive messages from
fenced over dbus.
Domain allowed access.
Connect to fenced over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run gfs_controld.
Domain allowed access.
Allow read and write access to gfs_controld semaphores.
Domain allowed access.
Read and write to gfs_controld_t shared memory.
Domain allowed access.
Connect to gfs_controld_t over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run groupd.
Domain allowed access.
Connect to groupd over a unix domain
stream socket.
Domain allowed access.
Allow read and write access to groupd semaphores.
Domain allowed access.
Read and write to group shared memory.
Domain allowed access.
Read and write to cluster domains shared memory.
Domain allowed access.
Read and write access to cluster domains semaphores.
Domain allowed access.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
Connect to cluster domains over a unix domain
stream socket.
Domain allowed access.
Domain allowed access.
Execute a domain transition to run qdiskd.
Domain allowed access.
Allow domain to read qdiskd tmpfs files
Domain allowed access.
Execute a domain transition to run cluster administrative domain.
Domain allowed to transition.
Execute cluster init scripts in
the init script domain.
Domain allowed to transition.
Execute cluster in the caller domain.
Domain allowed access.
Read cluster log files.
Domain allowed access.
Setattr cluster log files.
Domain allowed access.
Allow the specified domain to read/write inherited cluster's tmpf files.
Domain allowed access.
Allow manage cluster tmp files.
Domain allowed access.
Allow the specified domain to read/write cluster's tmpfs files.
Domain allowed access.
Allow manage cluster tmpfs files.
Domain allowed access.
Allow manage cluster pid files.
Domain allowed access.
Allow read cluster pid files.
Domain allowed access.
Allow domain to read cluster lib files
Domain allowed access.
Allow domain to manage cluster lib files
Domain allowed access.
Allow domain to relabel cluster lib files
Domain allowed access.
Send and receive messages from
a cluster service over dbus.
Domain allowed access.
Allow fenced domain to connect to the network using TCP.
Allow fenced domain to execute ssh.
Allow cluster administrative domains to connect to the network using TCP.
Allow cluster administrative domains to manage all files on a system.
Allow cluster administrative cluster domains memcheck-amd64- to use executable memory
rhev polic module contains policies for rhev apps
Execute rhev-agentd in the rhev_agentd domain.
Domain allowed access.
Read rhev-agentd PID files.
Domain allowed access.
Connect to rhev_agentd over a unix domain
stream socket.
Domain allowed access.
Send sigchld to rhev-agentd
Domain allowed access
Allow attempts to read and write to rhev-agentd pipes
Domain allowed access
Red Hat Graphical Boot
RHGB stub interface. No access allowed.
N/A
Use a rhgb file descriptor.
The type of the process performing this action.
Get the process group of rhgb.
Domain allowed access.
Send a signal to rhgb.
Domain allowed access.
Read and write to unix stream sockets.
The type of the process performing this action.
Do not audit attempts to read and write
rhgb unix domain stream sockets.
The type of the process performing this action.
Connected to rhgb unix stream socket.
The type of the process performing this action.
Read and write to rhgb shared memory.
The type of the process performing this action.
Read from and write to the rhgb devpts.
Domain allowed access.
dontaudit Read from and write to the rhgb devpts.
Domain allowed access.
Read and write to rhgb temporary file system.
The type of the process performing this action.
policy for rhnsd
Transition to rhnsd.
Domain allowed to transition.
Execute rhnsd server in the rhnsd domain.
Domain allowed access.
Allow the specified domain to manage
rhnsd configuration files.
Domain allowed access.
All of the rules required to administrate
an rhnsd environment
Domain allowed access.
Role allowed access.
Subscription Management Certificate Daemon policy
Transition to rhsmcertd.
Domain allowed to transition.
Execute rhsmcertd server in the rhsmcertd domain.
Domain allowed access.
Read rhsmcertd's log files.
Domain allowed access.
Append to rhsmcertd log files.
Domain allowed access.
Manage rhsmcertd log files
Domain allowed access.
Search rhsmcertd lib directories.
Domain allowed access.
Read rhsmcertd lib files.
Domain allowed access.
Manage rhsmcertd lib files.
Domain allowed access.
Manage rhsmcertd lib directories.
Domain allowed access.
Read rhsmcertd PID files.
Domain allowed access.
Connect to rhsmcertd over a unix domain
stream socket.
Domain allowed access.
Send and receive messages from
rhsmcertd over dbus.
Domain allowed access.
Dontaudit Send and receive messages from
rhsmcertd over dbus.
Domain allowed access.
All of the rules required to administrate
an rhsmcertd environment
Domain allowed access.
Role allowed access.
Ricci cluster management agent
Execute a domain transition to run ricci.
Domain allowed to transition.
Execute ricci server in the ricci domain.
The type of the process performing this action.
Execute a domain transition to run ricci_modcluster.
Domain allowed to transition.
Do not audit attempts to use
ricci_modcluster file descriptors.
The type of process not to audit.
Do not audit attempts to read write
ricci_modcluster unamed pipes.
The type of process not to audit.
Connect to ricci_modclusterd over an unix stream socket.
Domain allowed access.
Read and write to ricci_modclusterd temporary file system.
Domain allowed access.
Execute a domain transition to run ricci_modlog.
Domain allowed to transition.
Execute a domain transition to run ricci_modrpm.
Domain allowed to transition.
Execute a domain transition to run ricci_modservice.
Domain allowed to transition.
Execute a domain transition to run ricci_modstorage.
Domain allowed to transition.
Allow the specified domain to read ricci's lib files.
Domain allowed access.
Allow the specified domain to manage ricci's lib files.
Domain allowed access.
All of the rules required to administrate
an ricci environment
Domain allowed access.
Role allowed access.
Remote login daemon
Execute rlogind in the rlogin domain.
The type of the process performing this action.
read rlogin homedir content (.config)
Domain allowed access.
Roundup Issue Tracking System policy
All of the rules required to administrate
an roundup environment
Domain allowed access.
The role to be allowed to manage the roundup domain.
Remote Procedure Call Daemon for managment of network based process communication
RPC stub interface. No access allowed.
Domain allowed access.
The template to define a rpc domain.
This template creates a domain to be used for
a new rpc daemon.
The type of daemon to be used.
Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated)
The type of the process performing this action.
Do not audit attempts to get the attributes
of the NFS export file.
The type of the process performing this action.
Allow read access to exports.
The type of the process performing this action.
Allow write access to exports.
The type of the process performing this action.
Execute domain in nfsd domain.
The type of the process performing this action.
Execute domain in nfsd domain.
Domain allowed access.
Execute domain in rpcd domain.
The type of the process performing this action.
Send kill signals to rpcd.
Domain allowed access.
Execute rpcd in the rcpd domain, and
allow the specified role the rpcd domain.
Domain allowed to transition.
Role allowed access.
Execute domain in rpcd domain.
Domain allowed access.
Read NFS exported content.
Domain allowed access.
Allow domain to create read and write NFS directories.
Domain allowed access.
Allow domain to create read and write NFS directories.
Domain allowed access.
Allow domain to read and write to an NFS UDP socket.
Domain allowed access.
Send UDP traffic to NFSd. (Deprecated)
Domain allowed access.
Search NFS state data in /var/lib/nfs.
Domain allowed access.
Read NFS state data in /var/lib/nfs.
Domain allowed access.
Manage NFS state data in /var/lib/nfs.
Domain allowed access.
Allow gssd to read temp directory. For access to kerberos tgt.
Universal Addresses to RPC Program Number Mapper
Execute a domain transition to run rpcbind.
Domain allowed to transition.
Connect to rpcbindd over an unix stream socket.
Domain allowed access.
Read rpcbind PID files.
Domain allowed access.
Search rpcbind lib directories.
Domain allowed access.
Read rpcbind lib files.
Domain allowed access.
Create, read, write, and delete
rpcbind lib files.
Domain allowed access.
All of the rules required to administrate
an rpcbind environment
Domain allowed access.
The role to be allowed to manage the rpcbind domain.
Remote shell service.
Domain transition to rshd.
The type of the process performing this action.
Fast incremental file transfer for synchronization
Make rsync an entry point for
the specified domain.
The domain for which init scripts are an entrypoint.
Execute a rsync in a specified domain.
Execute a rsync in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Execute a rsync in a specified domain.
Execute a rsync in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Execute rsync in the caller domain domain.
Domain allowed access.
Read rsync config files.
Domain allowed.
Write to rsync config files.
Domain allowed.
Manage rsync config files.
Domain allowed.
Create objects in the amavis spool directories
with a private type.
Domain allowed access.
Class of the object being created.
Allow rsync to run as a client
Allow rsync to run as a server
Allow rsync to export any files/directories read only.
Allow rsync to modify public files
used for public file transfer services. Files/Directories must be
labeled public_content_rw_t.
Allow rsync servers to share cifs files systems
Allow rsync servers to share nfs files systems
Platform diagnostics report firmware events.
Execute rtas_errd in the rtas_errd domin.
Domain allowed to transition.
Read rtas_errd's log files.
Domain allowed access.
Append to rtas_errd log files.
Domain allowed access.
Manage rtas_errd log files
Domain allowed access.
Read rtas_errd PID files.
Domain allowed access.
All of the rules required to administrate
an rtas_errd environment
Domain allowed access.
Realtime scheduling for user processes.
Execute a domain transition to run rtkit_daemon.
Domain allowed to transition.
Send and receive messages from
rtkit_daemon over dbus.
Domain allowed access.
Do not audit send and receive messages from
rtkit_daemon over dbus.
Domain allowed access.
Allow rtkit to control scheduling for your process
Domain allowed access.
Who is logged in on other machines?
Execute a domain transition to run rwho.
Domain allowed to transition.
Search rwho log directories.
Domain allowed access.
Read rwho log files.
Domain allowed access.
Search rwho spool directories.
Domain allowed access.
Read rwho spool files.
Domain allowed access.
Create, read, write, and delete
rwho spool files.
Domain allowed access.
All of the rules required to administrate
an rwho environment
Domain allowed access.
The role allowed access.
SMB and CIFS client/server programs for UNIX and
name Service Switch daemon for resolving names
from Windows NT servers.
Execute nmbd net in the nmbd_t domain.
The type of the process performing this action.
Execute samba server in the samba domain.
The type of the process performing this action.
Execute samba net in the samba_net domain.
The type of the process performing this action.
Execute samba net in the samba_unconfined_net domain.
The type of the process performing this action.
Execute samba net in the samba_net domain, and
allow the specified role the samba_net domain.
The type of the process performing this action.
The role to be allowed the samba_net domain.
The role for the samba module.
The role to be allowed the samba_net domain.
Execute samba net in the samba_unconfined_net domain, and
allow the specified role the samba_unconfined_net domain.
The type of the process performing this action.
The role to be allowed the samba_unconfined_net domain.
Execute smbmount in the smbmount domain.
The type of the process performing this action.
Execute smbmount interactively and do
a domain transition to the smbmount domain.
Domain allowed acces.
The role to be allowed the smbmount domain.
Allow the specified domain to read
samba configuration files.
Domain allowed access.
Allow the specified domain to read
and write samba configuration files.
Domain allowed access.
Allow the specified domain to read
and write samba configuration files.
Domain allowed access.
Allow the specified domain to read samba's log files.
Domain allowed access.
Allow the specified domain to append to samba's log files.
Domain allowed access.
Execute samba log in the caller domain.
The type of the process performing this action.
Allow the specified domain to read samba's secrets.
Domain allowed access.
Allow the specified domain to read samba's shares
Domain allowed access.
Allow the specified domain to search
samba /var directories.
Domain allowed access.
Allow the specified domain to
read samba /var files.
Domain allowed access.
Do not audit attempts to write samba
/var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var files.
Domain allowed access.
Allow the specified domain to
read and write samba /var directories.
Domain allowed access.
Execute a domain transition to run smbcontrol.
Domain allowed to transition.
Execute smbcontrol in the smbcontrol domain, and
allow the specified role the smbcontrol domain.
Domain allowed access
The role to be allowed the smbcontrol domain.
Execute smbd in the smbd_t domain.
The type of the process performing this action.
Do not audit attempts to use file descriptors from samba.
Domain to not audit.
Allow the specified domain to write to smbmount tcp sockets.
Domain allowed access.
Allow the specified domain to read and write to smbmount tcp sockets.
Domain allowed access.
Execute winbind_helper in the winbind_helper domain.
The type of the process performing this action.
Execute winbind_helper in the winbind_helper domain, and
allow the specified role the winbind_helper domain.
The type of the process performing this action.
The role to be allowed the winbind_helper domain.
Allow the specified domain to read the winbind pid files.
Domain allowed access.
Allow domain to signull winbind
Domain allowed access.
Allow domain to signal samba
Domain to not audit.
Connect to nmbd.
Domain allowed access.
Allow domain to signal samba
Domain to not audit.
Connect to winbind.
Domain allowed access.
Create a set of derived types for apache
web content.
The prefix to be used for deriving type names.
Search the samba pid directory.
Domain to not audit.
Allow domain to signull samba_unconfined_net
Domain allowed access.
Set attributes of samba_share directories.
Domain allowed access.
All of the rules required to administrate
an samba environment
Domain allowed access.
The role to be allowed to manage the samba domain.
Allow samba to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Allow samba to create new home directories (e.g. via PAM)
Allow samba to act as the domain controller, add users,
groups and change passwords.
Allow samba to act as a portmapper
Allow samba to share users home directories.
Allow samba to share any file/directory read only.
Allow samba to share any file/directory read/write.
Allow samba to run unconfined scripts
Allow samba to export NFS volumes.
Allow samba to export ntfs/fusefs volumes.
Allow smbd to load libgfapi from gluster.
policy for sanlock
Execute a domain transition to run sanlock.
Domain allowed access.
Execute sanlock server in the sanlock domain.
The type of the process performing this action.
Create, read, write, and delete sanlock PID files.
Domain allowed access.
Connect to sanlock over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an sanlock environment
Domain allowed access.
Role allowed access.
Allow sanlock to manage nfs files
Allow sanlock to manage cifs files
Allow sanlock to read/write fuse files
SASL authentication server
Connect to SASL.
Domain allowed access.
All of the rules required to administrate
an sasl environment
Domain allowed access.
Role allowed access.
Allow sasl to read shadow
Standards Based Linux Instrumentation for Manageability.
Creates types and rules for a basic
sblim daemon domain.
Prefix for the domain.
Transition to gatherd.
Domain allowed to transition.
Read gatherd PID files.
Domain allowed access.
Connect to sblim_sfcb over a unix stream socket.
Domain allowed access.
Getattr on sblim executable.
Domain allowed to transition.
Connect to sblim_sfcb over a unix stream socket.
Domain allowed access.
Allow read and write access to sblim semaphores.
Domain allowed access.
All of the rules required to administrate
an gatherd environment
Domain allowed access.
Policy for sendmail.
Sendmail stub interface. No access allowed.
Domain allowed access.
Allow attempts to read and write to
sendmail unnamed pipes.
Domain to not audit.
Domain transition to sendmail.
Domain allowed access.
Execute sendmail in the sendmail domain.
The type of the process performing this action.
Execute the sendmail program in the sendmail domain.
Domain allowed access.
The role to allow the sendmail domain.
Send generic signals to sendmail.
Domain allowed access.
Read and write sendmail TCP sockets.
Domain allowed access.
Do not audit attempts to read and write
sendmail TCP sockets.
Domain to not audit.
Read and write sendmail unix_stream_sockets.
Domain allowed access.
Do not audit attempts to read and write
sendmail unix_stream_sockets.
Domain allowed access.
Read sendmail logs.
Domain allowed access.
Create, read, write, and delete sendmail logs.
Domain allowed access.
Create sendmail logs with the correct type.
Domain allowed access.
Manage sendmail tmp files.
Domain allowed access.
Execute sendmail in the unconfined sendmail domain, and
allow the specified role the unconfined sendmail domain,
and use the caller's terminal.
Domain allowed access.
Role allowed access.
Execute sendmail in the unconfined sendmail domain.
Domain allowed access.
All of the rules required to administrate
an sendmail environment
Domain allowed access.
Role allowed access.
Sensor information logging daemon
Execute sensord in the sensord domain.
Domain allowed to transition.
All of the rules required to administrate
an sensord environment
Domain allowed access.
SELinux troubleshooting service
Connect to setroubleshootd over an unix stream socket.
Domain allowed access.
Dontaudit attempts to connect to setroubleshootd
over an unix stream socket.
Domain allowed access.
Send and receive messages from
setroubleshoot over dbus.
Domain allowed access.
dontaudit send and receive messages from
setroubleshoot over dbus.
Domain to not audit.
Send and receive messages from
setroubleshoot over dbus.
Domain allowed access.
Dontaudit read/write to a setroubleshoot leaked sockets.
Domain allowed access.
All of the rules required to administrate
an setroubleshoot environment
Domain allowed access.
Policy for gridengine MPI jobs
Allow sge to access nfs file systems.
Allow sge to connect to the network using any TCP port
OpenSLP server daemon to dynamically register services.
Transition to slpd.
Domain allowed to transition.
Execute slpd server in the slpd domain.
Domain allowed access.
All of the rules required to administrate
an slpd environment
Domain allowed access.
Role allowed access.
Service for downloading news feeds the slrn newsreader.
Allow the domain to search slrnpull spools.
domain allowed access
Allow the domain to create, read,
write, and delete slrnpull spools.
domain allowed access
Smart disk monitoring daemon policy
Allow caller to read smartmon temporary files.
The process type reading the temporary files.
All of the rules required to administrate
an smartmon environment
Domain allowed access.
Role allowed access.
Enable additional permissions needed to support
devices on 3ware controllers.
Smokeping network latency measurement.
Execute a domain transition to run smokeping.
Domain allowed to transition.
Execute smokeping server in the smokeping domain.
Domain allowed access.
Read smokeping PID files.
Domain allowed access.
Manage smokeping PID files.
Domain allowed access.
Get attributes of smokeping lib files.
Domain allowed access.
Read smokeping lib files.
Domain allowed access.
Manage smokeping lib files.
Domain allowed access.
All of the rules required to administrate
a smokeping environment
Domain allowed access.
Role allowed access.
Tools to send and receive short messages through GSM modems or mobile phones.
Search smsd lib directories.
Domain allowed access.
Read smsd lib files.
Domain allowed access.
Manage smsd lib files.
Domain allowed access.
Manage smsd lib directories.
Domain allowed access.
All of the rules required to
administrate an smstools environment.
Domain allowed access.
Role allowed access.
Simple network management protocol services
Connect to snmpd using a unix domain stream socket.
Domain allowed access.
Use snmp over a TCP connection. (Deprecated)
Domain allowed access.
Send and receive UDP traffic to SNMP (Deprecated)
Domain allowed access.
Read snmpd libraries.
Domain allowed access.
Read snmpd libraries directories
Domain allowed access.
Manage snmpd libraries directories
Domain allowed access.
Append snmpd libraries.
Domain allowed access.
Manage snmpd libraries files.
Domain allowed access.
dontaudit Read snmpd libraries.
Domain to not audit.
dontaudit write snmpd libraries files.
Domain to not audit.
All of the rules required to administrate
an snmp environment
Domain allowed access.
The role to be allowed to manage the snmp domain.
Snort network intrusion detection system
Execute a domain transition to run snort.
Domain allowed to transition.
All of the rules required to administrate
an snort environment
Domain allowed access.
The role to be allowed to manage the snort domain.
sound server for network audio server programs, nasd, yiff, etc
Connect to the sound server over a TCP socket (Deprecated)
Domain allowed access.
All of the rules required to administrate
an soundd environment
Domain allowed access.
The role to be allowed to manage the soundd domain.
Filter used for removing unsolicited email.
Role access for spamassassin
Role allowed access
User domain for the role
Execute the standalone spamassassin
program in the caller directory.
Domain allowed access.
Singnal the spam assassin daemon
The type of the process performing this action.
Execute the spamassassin daemon
program in the caller directory.
Domain allowed access.
Execute spamassassin client in the spamassassin client domain.
Domain allowed access.
Send kill signal to spamassassin client
Domain allowed access.
Manage spamc home files.
Domain allowed access.
Execute the spamassassin client
program in the caller directory.
Domain allowed access.
Execute spamassassin standalone client in the user spamassassin domain.
Domain allowed access.
read spamd lib files.
Domain allowed access.
Create, read, write, and delete
spamd lib files.
Domain allowed access.
Read temporary spamd file.
The type of the process performing this action.
Do not audit attempts to get attributes of temporary
spamd sockets/
Domain to not audit.
Connect to run spamd.
Domain allowed to connect.
Read spamd pid file.
Domain allowed to connect.
All of the rules required to administrate
an spamassassin environment
Domain allowed access.
The role to be allowed to manage the spamassassin domain.
Allow user spamassassin clients to use the network.
Allow spamd to read/write user home directories.
Alcatel speedtouch USB ADSL modem
Squid caching http proxy server
Execute squid in the squid domain.
The type of the process performing this action.
Execute squid
The type of the process performing this action.
Send generic signals to squid.
Domain allowed access.
Allow read and write squid
unix domain stream sockets.
Domain allowed access.
Do not audit attempts to search squid cache dirs
Domain to not audit.
Read squid configuration file.
Domain allowed access.
Append squid logs.
Domain allowed access.
Append squid logs.
Domain allowed access.
Create, read, write, and delete
squid logs.
Domain allowed access.
Use squid services by connecting over TCP. (Deprecated)
Domain allowed access.
All of the rules required to administrate
an squid environment
Domain allowed access.
The role to be allowed to manage the squid domain.
Allow squid to connect to all ports, not just
HTTP, FTP, and Gopher ports.
Allow squid to run as a transparent proxy (TPROXY)
Secure shell client and server policy.
Basic SSH client template.
This template creates a derived domains which are used
for ssh client sessions. A derived
type is also created to protect the user ssh keys.
This template was added for NX.
The prefix of the domain (e.g., user
is the prefix for user_t).
The type of the domain.
The role associated with the user domain.
The template to define a ssh server.
This template creates a domains to be used for
creating a ssh server. This is typically done
to have multiple ssh servers of different sensitivities,
such as for an internal network-facing ssh server, and
a external network-facing ssh server.
The prefix of the server domain (e.g., sshd
is the prefix for sshd_t).
Role access for ssh
The prefix of the role (e.g., user
is the prefix for user_r).
Role allowed access
User domain for the role
Send a SIGCHLD signal to the ssh server.
Domain allowed access.
Send a generic signal to the ssh server.
Domain allowed access.
Read a ssh server unnamed pipe.
Domain allowed access.
Read and write a ssh server unnamed pipe.
Domain allowed access.
Read and write ssh server unix domain stream sockets.
Domain allowed access.
Read and write ssh server unix dgram sockets.
Domain allowed access.
Read and write ssh server TCP sockets.
Domain allowed access.
Do not audit attempts to read and write
ssh server TCP sockets.
Domain to not audit.
Connect to SSH daemons over TCP sockets. (Deprecated)
Domain allowed access.
Execute the ssh daemon sshd domain.
Domain allowed access.
Execute sshd server in the sshd domain.
The type of the process performing this action.
Execute the ssh client in the caller domain.
Domain allowed access.
Set the attributes of sshd key files.
Domain allowed access.
Execute the ssh agent client in the caller domain.
Domain allowed access.
Read ssh home directory content
Domain allowed access.
Execute the ssh key generator in the ssh keygen domain.
Domain allowed access.
Execute the ssh key generator in the caller domain.
Domain allowed to transition.
Execute ssh-keygen in the iptables domain, and
allow the specified role the ssh-keygen domain.
Domain allowed to transition.
Role allowed access.
Read ssh server keys
Domain allowed access.
Manage ssh home directory content
Domain allowed access.
Create Secure Shell home directory
content.
Domain allowed access.
Delete from the ssh temp files.
Domain allowed access.
Send a null signal to sshd processes.
Domain allowed access.
Allow domain dyntransition to chroot_user_t domain.
Domain allowed access.
Getattr ssh home directory
Domain allowed access.
Dontaudit search ssh home directory
Domain allowed access.
Do not audit attempts to read and
write the sshd pty type.
Domain to not audit.
Read and write inherited sshd pty type.
Domain to not audit.
All of the rules required to administrate
an sshd environment
Domain allowed access.
Role allowed access.
allow host key based authentication
Allow ssh logins as sysadm_r:sysadm_t
Allow ssh with chroot env to read and write files
in the user home directories
Allow ssh with chroot env to manage all files
Allow ssh with chroot env to apache content
System Security Services Daemon
Execute a domain transition to run sssd.
Domain allowed to transition.
Execute sssd server in the sssd domain.
Domain allowed access.
Read sssd public files.
Domain allowed access.
Read sssd PID files.
Domain allowed access.
Manage sssd var_run files.
Domain allowed access.
Search sssd lib directories.
Domain allowed access.
Do not audit attempts to search sssd lib directories.
Domain to not audit.
Read sssd lib files.
Domain allowed access.
Create, read, write, and delete
sssd lib files.
Domain allowed access.
Send and receive messages from
sssd over dbus.
Domain allowed access.
Connect to sssd over an unix stream socket.
Domain allowed access.
Allow attempts to read and write to
sssd pipes
Domain allowed access.
All of the rules required to administrate
an sssd environment
Domain allowed access.
The role to be allowed to manage the sssd domain.
Instrumentation System Server
Execute stapserver in the stapserver domain.
Domain allowed to transition.
Read stapserver's log files.
Domain allowed access.
Append to stapserver log files.
Domain allowed access.
Manage stapserver log files
Domain allowed access.
Read stapserver PID files.
Domain allowed access.
Manage stapserver lib files
Domain allowed access.
All of the rules required to administrate
an stapserver environment
Domain allowed access.
SSL Tunneling Proxy
Define the specified domain as a stunnel inetd service.
The type associated with the stunnel inetd service process.
The type associated with the process program.
policy for svnserve
Transition to svnserve.
Domain allowed to transition.
Execute svnserve server in the svnserve domain.
Domain allowed access.
Read svnserve PID files.
Domain allowed access.
All of the rules required to administrate
an svnserve environment
Domain allowed access.
policy for swift
Execute TEMPLATE in the swift domin.
Domain allowed to transition.
Read swift PID files.
Domain allowed access.
Manage swift data files.
Domain allowed access.
Read and write swift lock files.
Domain allowed access.
Transition content labels to swift named content
Domain allowed access.
Determine whether swift can
connect to all TCP ports
Policy for sysstat. Reports on various system states
Manage sysstat logs.
Domain allowed access.
Policy for TCP daemon.
Execute tcpd in the tcpd domain.
The type of the process performing this action.
Create a domain for services that
utilize tcp wrappers.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Telnet daemon
Trivial file transfer protocol daemon
Read tftp content
Domain allowed access.
Manage tftp /var/lib files.
Domain allowed access.
Search tftp /var/lib directories.
Domain allowed access.
Search tftp /var/lib directories.
Domain allowed access.
Manage tftp /var/lib files.
Domain allowed access.
Create objects in tftpdir directories
with specified types.
Domain allowed access.
Private file type.
Class of the object being created.
All of the rules required to administrate
an tftp environment
Domain allowed access.
Allow tftp to modify public files
used for public file transfer services.
Allow tftp to read from a NFS store
for public file transfer services.
Allow tftp to read from a CIFS store
for public file transfer services.
Linux Target Framework Daemon.
Linux target framework (tgt) aims to simplify various
SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation
and maintenance. Our key goals are the clean integration into
the scsi-mid layer and implementing a great portion of tgt
in user space.
Allow read and write access to tgtd semaphores.
Domain allowed access.
Manage tgtd sempaphores.
Domain allowed access.
Connect to tgtd using a unix domain stream socket.
Domain allowed access.
MIDI to WAV converter and player configured as a service
policy for tomcat
Creates types and rules for a basic
tomcat daemon domain.
Prefix for the domain.
Transition to tomcat.
Domain allowed to transition.
Search tomcat cache directories.
Domain allowed access.
Read tomcat cache files.
Domain allowed access.
Create, read, write, and delete
tomcat cache files.
Domain allowed access.
Manage tomcat cache dirs.
Domain allowed access.
Read tomcat's log files.
Domain allowed access.
Append to tomcat log files.
Domain allowed access.
Manage tomcat log files
Domain allowed access.
Search tomcat lib directories.
Domain allowed access.
Read tomcat lib files.
Domain allowed access.
Manage tomcat lib files.
Domain allowed access.
Manage tomcat lib directories.
Domain allowed access.
Read tomcat PID files.
Domain allowed access.
All of the rules required to administrate
an tomcat environment
Domain allowed access.
TOR, the onion router
Execute a domain transition to run TOR.
Domain allowed to transition.
All of the rules required to administrate
an tor environment
Domain allowed access.
The role to be allowed to manage the tor domain.
Allow tor daemon to bind
tcp sockets to all unreserved ports.
HTTP transperant proxy
Dynamic adaptive system tuning daemon
Execute a domain transition to run tuned.
Domain allowed to transition.
Execute tuned in the caller domain.
Domain allowed access.
Read tuned PID files.
Domain allowed access.
Manage tuned PID files.
Domain allowed access.
Execute tuned server in the tuned domain.
The type of the process performing this action.
All of the rules required to administrate
an tuned environment
Domain allowed access.
Role allowed access.
ucspitcp policy
Policy for DJB's ucspi-tcpd
Define a specified domain as a ucspitcp service.
Domain allowed access.
The type associated with the process program.
Iptables/netfilter userspace logging daemon.
Execute a domain transition to run ulogd.
Domain allowed to transition.
Allow the specified domain to read
ulogd configuration files.
Domain allowed access.
Allow the specified domain to read ulogd's log files.
Domain allowed access.
Allow the specified domain to search ulogd's log files.
Domain allowed to transition.
Allow the specified domain to append to ulogd's log files.
Domain allowed access.
All of the rules required to administrate
an ulogd environment
Domain allowed access.
The role to be allowed to manage the syslog domain.
Uptime daemon
USB multiplexing daemon for communicating with Apple iPod Touch and iPhone
Execute a domain transition to run usbmuxd.
Domain allowed to transition.
Connect to usbmuxd over a unix domain
stream socket.
Domain allowed access.
Unix to Unix Copy
Execute the uucico program in the
uucpd_t domain.
Domain allowed to transition.
Allow the specified domain to append
to uucp log files.
Domain allowed access.
Create, read, write, and delete uucp spool files.
Domain allowed access.
Execute the master uux program in the
uux_t domain.
Domain allowed access.
All of the rules required to administrate
an uucp environment
Domain allowed access.
policy for uuidd
Transition to uuidd.
Domain allowed to transition.
Execute uuidd server in the uuidd domain.
Domain allowed access.
Search uuidd lib directories.
Domain allowed access.
Read uuidd lib files.
Domain allowed access.
Manage uuidd lib files.
Domain allowed access.
Manage uuidd lib directories.
Domain allowed access.
Read uuidd PID files.
Domain allowed access.
Connect to uuidd over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an uuidd environment
Domain allowed access.
Role allowed access.
University of Washington IMAP toolkit POP3 and IMAP mail server
Execute the UW IMAP/POP3 servers with a domain transition.
Domain allowed access.
Varnishd http accelerator daemon
Execute varnishd in the varnishd domain.
The type of the process performing this action.
Execute varnishd
The type of the process performing this action.
Read varnishd configuration file.
Domain allowed access.
Read varnish lib files.
Domain allowed access.
Read varnish logs.
Domain allowed access.
Append varnish logs.
Domain allowed access.
Manage varnish logs.
Domain allowed access.
All of the rules required to administrate
an varnishlog environment
Domain allowed access.
The role to be allowed to manage the varnishlog domain.
All of the rules required to administrate
an varnishd environment
Domain allowed access.
The role to be allowed to manage the varnishd domain.
Allow varnishd to connect to all ports,
not just HTTP.
policy for vdagent
Getattr on vdagent executable.
Domain allowed to transition.
Execute a domain transition to run vdagent.
Domain allowed access.
Get the attributes of vdagent logs.
Domain allowed access.
Read vdagent PID files.
Domain allowed access.
Connect to vdagent over a unix domain
stream socket.
Domain allowed access.
All of the rules required to administrate
an vdagent environment
Domain allowed access.
Virtual host metrics daemon
Execute a domain transition to run vhostmd.
Domain allowed to transition.
Execute vhostmd server in the vhostmd domain.
The type of the process performing this action.
Allow domain to read, vhostmd tmpfs files
Domain to not audit.
Do not audit attempts to read,
vhostmd tmpfs files
Domain to not audit.
Allow domain to read and write vhostmd tmpfs files
Domain to not audit.
Create, read, write, and delete vhostmd tmpfs files.
Domain to not audit.
Read vhostmd PID files.
Domain allowed access.
Manage vhostmd var_run files.
Domain allowed access.
Connect to vhostmd over an unix domain stream socket.
Domain allowed access.
Dontaudit read and write to vhostmd
over an unix domain stream socket.
Domain allowed access.
All of the rules required to administrate
an vhostmd environment
Domain allowed access.
Role allowed access.
Libvirt virtualization API
Creates types and rules for a basic
qemu process domain.
Prefix for the domain.
Make the specified type usable as a virt image
Type to be used as a virtual image
Getattr on virt executable.
Domain allowed to transition.
Execute a domain transition to run virt.
Domain allowed to transition.
Execute a domain transition to run virt.
Domain allowed to transition.
Role allowed to access.
Transition to virt_bridgehelper.
Domain allowed to transition.
Connect to virt over an unix domain stream socket.
Domain allowed access.
Allow domain to attach to virt TUN devices
Domain allowed access.
Read virt config files.
Domain allowed access.
manage virt config files.
Domain allowed access.
Allow domain to search virt image files
Domain to not audit.
Allow domain to search virt image direcories
Domain allowed access.
Allow domain to manage virt image files
Domain to not audit.
Allow domain to write virt image files
Domain to not audit.
Read virt PID files.
Domain allowed access.
Read virt PID lnk files.
Domain allowed access.
Manage virt pid files.
Domain allowed access.
Search virt lib directories.
Domain allowed access.
Read virt lib files.
Domain allowed access.
Dontaudit inherited read virt lib files.
Domain to not audit.
Create, read, write, and delete
virt lib files.
Domain allowed access.
Allow the specified domain to read virt's log files.
Domain allowed access.
Allow the specified domain to append
virt log files.
Domain allowed to transition.
Allow domain to manage virt log files
Domain to not audit.
Allow domain to read virt blk image files
Domain allowed access.
Allow domain to read virt image files
Domain to not audit.
Allow domain to read virt image files
Domain to not audit.
Create, read, write, and delete
svirt cache files.
Domain allowed access.
Allow domain to manage virt image files
Domain to not audit.
All of the rules required to administrate
an virt environment
Domain allowed access.
Role allowed access.
Execute qemu in the svirt domain, and
allow the specified role the svirt domain.
Domain allowed access
The role to be allowed the svirt domain.
Do not audit attempts to write virt daemon unnamed pipes.
Domain allowed access.
Send a sigkill to virtual machines
Domain allowed access.
Send a sigkill to virtd daemon
Domain allowed access.
Send a signal to virtual machines
Domain allowed access.
allow domain to read
virt tmpf files
Domain allowed access
dontaudit domain to write
virt tmp files
Domain allowed access
Allow domain to write
virt tmp sock files
Domain allowed access
Execute Sandbox Files
Domain allowed access.
Manage Sandbox Files
Domain allowed access.
Relabel Sandbox File systems
Domain allowed access.
Mounton Sandbox Files
Domain allowed access.
Connect to virt over a unix domain stream socket.
Domain allowed access.
Allow virt to use serial/parallell communication ports
Allow virt to read fuse files
Allow virt to manage nfs files
Allow virt to manage cifs files
Allow virt to manage device configuration, (pci)
Allow confined virtual guests to interact with the sanlock
Allow virtual machine to interact with the xserver
Allow virt to use usb devices
Allow confined virtual guests to use executable memory and executable stack
W3C Markup Validator
Software watchdog.
All of the rules required to
administrate an watchdog environment.
Domain allowed access.
Role allowed access.
policy for wdmd
Execute a domain transition to run wdmd.
Domain allowed access.
Execute wdmd server in the wdmd domain.
The type of the process performing this action.
All of the rules required to administrate
an wdmd environment
Domain allowed access.
Role allowed access.
Connect to wdmd over an unix stream socket.
Domain allowed access.
Allow the specified domain to read/write wdmd's tmpfs files.
Domain allowed access.
Allow the specified domain to read/write wdmd's tmpfs files.
Domain allowed access.
X Windows Font Server
Read a X font server named socket.
Domain allowed access.
Connect to a X font server over
a unix domain stream socket.
Domain allowed access.
Allow the specified domain to execute xfs
in the caller domain.
Domain allowed access.
X print server
X Windows Server
Rules required for using the X Windows server
and environment, for restricted users.
Role allowed access.
Domain allowed access.
Rules required for using the X Windows server
and environment.
Role allowed access.
Domain allowed access.
Create sessions on the X server, with read-only
access to the X server shared
memory segments.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Create sessions on the X server, with read and write
access to the X server shared
memory segments.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Create non-drawing client sessions on an X server.
Domain allowed access.
Create full client sessions
on a user X server.
Domain allowed access.
The type of the domain SYSV tmpfs files.
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
X client application.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Client domain allowed access.
Template for creating the set of types used
in an X windows domain.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Interface to provide X object permissions on a given X server to
an X client domain. Provides the minimal set required by a basic
X client application.
The prefix of the X client domain (e.g., user
is the prefix for user_t).
Client domain allowed access.
The type of the domain SYSV tmpfs files.
Read user fonts, user font configuration,
and manage the user font cache.
Read user fonts, user font configuration,
and manage the user font cache.
This is a templated interface, and should only
be called from a per-userdomain template.
Domain allowed access.
Transition to the Xauthority domain.
Domain allowed access.
Allow exec of Xauthority program..
Domain allowed to transition.
Dontaudit exec of Xauthority program.
Domain allowed access.
Create a Xauthority file in the user home directory.
Domain allowed access.
Read all users fonts, user font configurations,
and manage all users font caches.
Domain allowed access.
Read all users .Xauthority.
Domain allowed access.
Set the attributes of the X windows console named pipes.
Domain allowed access.
Read and write the X windows console named pipe.
Domain allowed access.
Use file descriptors for xdm.
Domain allowed access.
Do not audit attempts to inherit
XDM file descriptors.
Domain to not audit.
Read and write XDM unnamed pipes.
Domain allowed access.
Do not audit attempts to read and write
XDM unnamed pipes.
Domain to not audit.
Connect to XDM over a unix domain
stream socket.
Domain allowed access.
Read xdm-writable configuration files.
Domain allowed access.
Set the attributes of XDM temporary directories.
Domain allowed access.
Create a named socket in a XDM
temporary directory.
Domain allowed access.
Read XDM pid files.
Domain allowed access.
Dontaudit Read XDM pid files.
Domain allowed access.
Read XDM var lib files.
Domain allowed access.
Make an X session script an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Execute an X session in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
Execute an Xsession in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Get the attributes of X server logs.
Domain allowed access.
Do not audit attempts to write the X server
log files.
Domain to not audit
Do not audit attempts to write the X server
log files.
Domain to not audit
Read X keyboard extension libraries.
Domain to not audit
Read xdm config files.
Domain to not audit
Manage xdm config files.
Domain to not audit
Read xdm temporary files.
Domain to not audit
Do not audit attempts to read xdm temporary files.
Domain to not audit
Read write xdm temporary files.
Domain to not audit
Create, read, write, and delete xdm temporary files.
Domain to not audit
dontaudit getattr xdm temporary named sockets.
Domain to not audit
Execute the X server in the X server domain.
Domain allowed access.
Signal X servers
Domain to not audit
Kill X servers
Domain to not audit
Read and write X server Sys V Shared
memory segments.
Domain allowed access.
Do not audit attempts to read and write to
X server sockets.
Domain to not audit
Do not audit attempts to read and write X server
unix domain stream sockets.
Domain allowed access.
Connect to the X server over a unix domain
stream socket.
Domain allowed access.
Dontaudit attempts to connect to xserver
over an unix stream socket.
Domain to not audit.
Read X server temporary files.
Domain to not audit
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain permission to read the
virtual core keyboard and virtual core pointer devices.
Domain allowed access.
Interface to provide X object permissions on a given X server to
an X client domain. Gives the domain complete control over the
display.
Domain allowed access.
Dontaudit append to .xsession-errors file
Domain to not audit
append to .xsession-errors file
Domain to not audit
Manage the xdm_spool files
Domain allowed access.
Send and receive messages from
xdm over dbus.
Domain allowed access.
Read xserver files created in /var/run
Domain allowed access.
Execute xserver files created in /var/run
Domain allowed access.
Write xserver files created in /var/run
Domain allowed access.
Allow append the xdm
log files.
Domain to not audit
Read a user Iceauthority domain.
Domain allowed access.
Read user homedir fonts.
Domain allowed access.
Search XDM var lib dirs.
Domain allowed access.
Make an X executable an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Execute xsever in the xserver domain, and
allow the specified role the xserver domain.
The type of the process performing this action.
The role to be allowed the xserver domain.
Execute xsever in the xserver domain, and
allow the specified role the xserver domain.
The type of the process performing this action.
The role to be allowed the xserver domain.
Read user homedir fonts.
Domain allowed access.
Allows clients to write to the X server shared
memory segments.
Allows XServer to execute writable memory
Allows xdm to execute bootloader
Allow xdm logins as sysadm
Support X userspace object manager
Allow regular users direct dri device access
Distributed infrastructure monitoring
Execute a domain transition to run zabbix.
Domain allowed to transition.
Allow connectivity to the zabbix server
Domain allowed access.
Allow the specified domain to read zabbix's log files.
Domain allowed access.
Allow the specified domain to append
zabbix log files.
Domain allowed access.
Read zabbix PID files.
Domain allowed access.
Allow the specified domain to read zabbix's log files.
Domain allowed access.
Read zabbix PID files.
Domain allowed access.
Allow connectivity to a zabbix agent
Domain allowed access.
All of the rules required to administrate
an zabbix environment
Domain allowed access.
The role to be allowed to manage the zabbix domain.
Determine whether zabbix can
connect to all TCP ports
Zarafa collaboration platform.
Creates types and rules for a basic
zararfa init daemon domain.
Prefix for the domain.
Allow the specified domain to search
zarafa configuration dirs.
Domain allowed access.
Execute a domain transition to run zarafa_deliver.
Domain allowed to transition.
Read zarafa_deliver executable.
Domain allowed to transition.
Execute a domain transition to run zarafa_server.
Domain allowed to transition.
Connect to zarafa-server unix domain stream socket.
Domain allowed access.
Allow the specified domain to manage
zarafa /var/lib files.
Domain allowed access.
Allow the specified domain to manage
zarafa /var/lib files.
Domain allowed access.
Zebra border gateway protocol network routing service
Read the configuration files for zebra.
Domain allowed access.
Connect to zebra over an unix stream socket.
Domain allowed access.
All of the rules required to administrate
an zebra environment
Domain allowed access.
The role to be allowed to manage the zebra domain.
Allow zebra daemon to write it configuration files
policy for z/OS Remote-services Audit dispatcher plugin
Execute a domain transition to run audispd-zos-remote.
Domain allowed to transition.
Allow specified type and role to transition and
run in the zos_remote_t domain. Allow specified type
to use zos_remote_t terminal.
Domain allowed access
The role to be allowed the zos_remote domain.
Policy modules for system functions from init to multi-user login.
Policy for user executable applications.
Make the specified type usable as an application domain.
Type to be used as a domain type.
Make the specified type usable for files
that are exectuables, such as binary programs.
This does not include shared libraries.
Type to be used for files.
Execute application executables in the caller domain.
Domain allowed access.
Execute all executable files.
Domain allowed access.
Create a domain for applications.
Create a domain for applications. Typically these are
programs that are run interactively.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
Type to be used as an application domain.
Type of the program to be used as an entry point to this domain.
Send signull to all application domains.
Domain allowed access.
Send signal to all application domains.
Domain allowed access.
Dontaudit signull sent to all application domains.
Domain to not audit.
Dontaudit signal sent to all application domains.
Domain to not audit.
Dontaudit kill signal sent to all application domains.
Domain to not audit.
Common policy for authentication and user login.
Role access for password authentication.
Role allowed access.
Domain allowed access.
Use PAM for authentication.
Domain allowed access.
Make the specified domain used for a login program.
Domain type used for a login program domain.
Use the login program as an entry point program.
The type of process using the login program as entry point.
Execute a login_program in the target domain.
Domain allowed access.
The type of the login_program process.
Execute a login_program in the target domain,
with a range transition.
Domain allowed access.
The type of the login_program process.
Range of the login program.
Search authentication cache
Domain allowed access.
Read authentication cache
Domain allowed access.
Read/Write authentication cache
Domain allowed access.
Manage authentication cache
Domain allowed access.
Automatic transition from cache_t to cache.
Domain allowed access.
Run unix_chkpwd to check a password.
Domain allowed access.
Run unix_chkpwd to check a password.
Stripped down version to be called within boolean
Domain allowed access.
Execute chkpwd programs in the chkpwd domain.
Domain allowed access.
The role to allow the chkpwd domain.
Execute a domain transition to run unix_update.
Domain allowed to transition.
Execute updpwd programs in the updpwd domain.
Domain allowed access.
The role to allow the updpwd domain.
Get the attributes of the shadow passwords file.
Domain allowed access.
Do not audit attempts to get the attributes
of the shadow passwords file.
Domain to not audit.
Read the shadow passwords file (/etc/shadow)
Domain allowed access.
Pass shadow assertion for reading.
Pass shadow assertion for reading.
This should only be used with
auth_tunable_read_shadow(), and
only exists because typeattribute
does not work in conditionals.
Domain allowed access.
Pass shadow assertion for reading.
Pass shadow assertion for reading.
This should only be used with
auth_tunable_read_shadow(), and
only exists because typeattribute
does not work in conditionals.
Domain allowed access.
Read the shadow password file.
Read the shadow password file. This
should only be used in a conditional;
it does not pass the reading shadow
assertion.
Domain allowed access.
Do not audit attempts to read the shadow
password file (/etc/shadow).
The type of the domain to not audit.
Read and write the shadow password file (/etc/shadow).
Domain allowed access.
Create, read, write, and delete the shadow
password file.
Domain allowed access.
Create, read, write, and delete the shadow
password file.
Domain allowed access.
Automatic transition from etc to shadow.
Domain allowed access.
Relabel to the shadow
password file type.
Domain allowed access.
Relabel from and to the shadow
password file type.
Domain allowed access.
Append to the login failure log.
Domain allowed access.
Read and write the login failure log.
Domain allowed access.
Manage the login failure log.
Domain allowed access.
Read the last logins log.
Domain allowed access.
Append only to the last logins log.
Domain allowed access.
Read and write to the last logins log.
Domain allowed access.
Execute pam programs in the pam domain.
Domain allowed access.
Send generic signals to pam processes.
Domain allowed access.
Execute pam programs in the PAM domain.
Domain allowed access.
The role to allow the PAM domain.
Execute the pam program.
Domain allowed access.
Manage var auth files. Used by various other applications
and pam applets etc.
Domain allowed access.
Read PAM PID files.
Domain allowed access.
Do not audit attemps to read PAM PID files.
Domain to not audit.
Delete pam PID files.
Domain allowed access.
Manage pam PID files.
Domain allowed access.
Execute pam_console with a domain transition.
Domain allowed access.
Search the contents of the
pam_console data directory.
Domain allowed access.
List the contents of the pam_console
data directory.
Domain allowed access.
Read pam_console data files.
Domain allowed access.
Create, read, write, and delete
pam_console data files.
Domain allowed access.
Delete pam_console data.
Domain allowed access.
Read all directories on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all symbolic links on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Relabel all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read and write all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Manage all files on the filesystem, except
the shadow passwords and listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Execute utempter programs in the utempter domain.
Domain allowed access.
Execute utempter programs in the utempter domain.
Domain allowed access.
The role to allow the utempter domain.
Do not audit attemps to execute utempter executable.
Domain to not audit.
Set the attributes of login record files.
Domain allowed access.
Read login records files (/var/log/wtmp).
Domain allowed access.
Do not audit attempts to read login records
files (/var/log/wtmp).
Domain allowed access.
Do not audit attempts to write to
login records files.
Domain to not audit.
Append to login records (wtmp).
Domain allowed access.
Write to login records (wtmp).
Domain allowed access.
Read and write login records.
Domain allowed access.
Create a login records in the log directory
using a type transition.
Domain allowed access.
Create, read, write, and delete login
records files.
Domain allowed access.
Use nsswitch to look up user, password, group, or
host information.
Allow the specified domain to look up user, password,
group, or host information using the name service.
The most common use of this interface is for services
that do host name resolution (usually DNS resolution).
Domain allowed access.
Unconfined access to the authlogin module.
Unconfined access to the authlogin module.
Currently, this only allows assertions for
the shadow passwords file (/etc/shadow) to
be passed. No access is granted yet.
Domain allowed access.
Send generic signals to chkpwd processes.
Domain allowed access.
Allow users to login using a radius server
Allow users login programs to access /etc/shadow.
Allow users to login using a yubikey OTP server or challenge response mode
Policy for reading and setting the hardware clock.
Execute hwclock in the clock domain.
The type of the process performing this action.
Execute hwclock in the clock domain, and
allow the specified role the hwclock domain.
The type of the process performing this action.
The role to be allowed the clock domain.
Execute hwclock in the caller domain.
The type of the process performing this action.
Do not audit attempts to write clock drift adjustments.
Domain to not audit.
Read and write clock drift adjustments.
Domain allowed access.
Collection of tools for managing UNIX services
Policy for DJB's daemontools
An ipc channel between the supervised domain and svc_start_t
Domain allowed access to svc_start_t.
Define a specified domain as a supervised service.
Domain allowed access.
The type associated with the process program.
Execute in the svc_start_t domain.
Domain allowed access.
Execute svc_start in the svc_start domain, and
allow the specified role the svc_start domain.
Domain allowed access.
The role to be allowed the svc_start domain.
Execute in the svc_run_t domain.
Domain allowed access.
Execute in the svc_multilog_t domain.
Domain allowed access.
Allow a domain to read svc_svc_t files.
Domain allowed access.
Search svc_svc_t directory.
Domain allowed access.
Allow a domain to create svc_svc_t files.
Domain allowed access.
Send a SIGCHLD signal to svc_run domain.
Domain allowed access.
Tools for filesystem management, such as mkfs and fsck.
Execute fs tools in the fstools domain.
The type of the process performing this action.
Execute fs tools in the fstools domain, and
allow the specified role the fs tools domain.
The type of the process performing this action.
The role to be allowed the fs tools domain.
Execute fsadm in the caller domain.
The type of the process performing this action.
Send signal to fsadm process
Domain allowed access.
Read fstools unnamed pipes.
Domain allowed access.
Relabel a file to the type used by the
filesystem tools programs.
The type of the process performing this action.
Create, read, write, and delete a file used by the
filesystem tools programs.
The type of the process performing this action.
Getattr swapfile
The type of the process performing this action.
Policy for getty.
Execute gettys in the getty domain.
Domain allowed access.
Inherit and use getty file descriptors.
Domain allowed access.
Allow process to read getty log file.
Domain allowed access.
Allow process to read getty config file.
Domain allowed access.
Allow process to edit getty config file.
Domain allowed access.
Policy for changing the system host name.
Execute hostname in the hostname domain.
Domain allowed access.
Execute hostname in the hostname domain, and
allow the specified role the hostname domain.
Domain allowed access.
The role to be allowed the hostname domain.
Execute hostname in the caller domain.
Domain allowed access.
Policy for hotplug system, for supporting the
connection and disconnection of devices at runtime.
Execute hotplug with a domain transition.
Domain allowed access.
Execute hotplug in the caller domain.
Domain allowed access.
Inherit and use hotplug file descriptors.
Domain allowed access.
Do not audit attempts to inherit
hotplug file descriptors.
Domain to not audit.
Do not audit attempts to search the
hotplug configuration directories.
Domain to not audit.
Get the attributes of the hotplug configuration directory.
Domain allowed access.
Search the hotplug configuration directory.
Domain allowed access.
Read the configuration files for hotplug.
The type of the process performing this action.
Search the hotplug PIDs.
Domain allowed access.
System initialization programs (init and init scripts).
Create a file type used for init scripts.
Create a file type used for init scripts. It can not be
used in conjunction with init_script_domain(). These
script files are typically stored in the /etc/init.d directory.
Typically this is used to constrain what services an
admin can start/stop. For example, a policy writer may want
to constrain a web administrator to only being able to
restart the web server, not other services. This special type
will help address that goal.
This also makes the type usable for files; thus an
explicit call to files_type() is redundant.
Type to be used for a script file.
Create a domain used for init scripts.
Create a domain used for init scripts.
Can not be used in conjunction with
init_script_file().
Type to be used as an init script domain.
Type of the script file used as an entry point to this domain.
Create a domain which can be started by init.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Create a domain which can be started by init,
with a range transition.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
Create a domain for long running processes
(daemons/services) which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts. Short running processes
should use the init_system_domain() interface instead.
Typically all long running processes started by an init
script (usually in /etc/init.d) will need to use this
interface.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the process must also run in a specific MLS/MCS level,
the init_ranged_daemon_domain() should be used instead.
Type to be used as a daemon domain.
Type of the program to be used as an entry point to this domain.
Create initrc domain.
Type to be used as a initrc daemon domain.
Create initrc domain.
Type to be used as a initrc daemon domain.
Executable type.
Create a domain for long running processes
(daemons/services) which are started by init scripts,
running at a specified MLS/MCS range.
Create a domain for long running processes (daemons/services)
which are started by init scripts, running at a specified
MLS/MCS range. Short running processes
should use the init_ranged_system_domain() interface instead.
Typically all long running processes started by an init
script (usually in /etc/init.d) will need to use this
interface if they need to run in a specific MLS/MCS range.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the policy build option TYPE is standard (MLS and MCS disabled),
this interface has the same behavior as init_daemon_domain().
Type to be used as a daemon domain.
Type of the program to be used as an entry point to this domain.
MLS/MCS range for the domain.
Create a domain for short running processes
which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts. These are generally applications that
are used to initialize the system during boot.
Long running processes
should use the init_daemon_domain() interface instead.
Typically all short running processes started by an init
script (usually in /etc/init.d) will need to use this
interface.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the process must also run in a specific MLS/MCS level,
the init_ranged_system_domain() should be used instead.
Type to be used as a system domain.
Type of the program to be used as an entry point to this domain.
Create a domain for short running processes
which are started by init scripts.
Create a domain for long running processes (daemons/services)
which are started by init scripts.
These are generally applications that
are used to initialize the system during boot.
Long running processes
should use the init_ranged_system_domain() interface instead.
Typically all short running processes started by an init
script (usually in /etc/init.d) will need to use this
interface if they need to run in a specific MLS/MCS range.
The types will be made usable as a domain and file, making
calls to domain_type() and files_type() redundant.
If the policy build option TYPE is standard (MLS and MCS disabled),
this interface has the same behavior as init_system_domain().
Type to be used as a system domain.
Type of the program to be used as an entry point to this domain.
Range for the domain.
Execute init (/sbin/init) with a domain transition.
Domain allowed access.
Execute the init program in the caller domain.
Domain allowed access.
Get the process group of init.
Domain allowed access.
Send init a null signal.
Domain allowed access.
Send init a SIGCHLD signal.
Domain allowed access.
Inherit and use file descriptors from init.
Allow the specified domain to inherit file
descriptors from the init program (process ID 1).
Typically the only file descriptors to be
inherited from init are for the console.
This does not allow the domain any access to
the object to which the file descriptors references.
Related interfaces:
- init_dontaudit_use_fds()
- term_dontaudit_use_console()
- term_use_console()
Example usage:
init_use_fds(mydomain_t)
term_use_console(mydomain_t)
Normally, processes that can inherit these file
descriptors (usually services) write messages to the
system log instead of writing to the console.
Therefore, in many cases, this access should
dontaudited instead.
Example dontaudit usage:
init_dontaudit_use_fds(mydomain_t)
term_dontaudit_use_console(mydomain_t)
Domain allowed access.
Do not audit attempts to inherit file
descriptors from init.
Domain allowed access.
Send UDP network traffic to init. (Deprecated)
Domain allowed access.
Get the attributes of initctl.
Domain allowed access.
Do not audit attempts to get the
attributes of initctl.
Domain to not audit.
Write to initctl.
Domain allowed access.
Use telinit (Read and write initctl).
Domain allowed access.
Read and write initctl.
Domain allowed access.
Do not audit attempts to read and
write initctl.
Domain allowed access.
Make init scripts an entry point for
the specified domain.
The domain for which init scripts are an entrypoint.
Execute init scripts with a specified domain transition.
Domain allowed access.
Execute init scripts with an automatic domain transition.
Domain allowed access.
Execute a file in a bin directory
in the initrc_t domain
Domain allowed access.
Execute a init script in a specified domain.
Execute a init script in a specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain to transition from.
Domain to transition to.
Transition to the init script domain
on a specified labeled init script.
Domain allowed access.
Labeled init script file.
Transition to the init script domain
for all labeled init script types
Domain allowed access
Start and stop daemon programs directly.
Start and stop daemon programs directly
in the traditional "/etc/init.d/daemon start"
style, and do not require run_init.
Domain allowed access.
The role to be performing this action.
Read the process state (/proc/pid) of init.
Domain allowed access.
Ptrace init
Domain allowed access.
Write an init script unnamed pipe.
Domain allowed access.
Get the attribute of init script entrypoint files.
Domain allowed access.
Read init scripts.
Domain allowed access.
Execute init scripts in the caller domain.
Domain allowed access.
Get the attribute of all init script entrypoint files.
Domain allowed access.
Read all init script files.
Domain allowed access.
Dontaudit read all init script files.
Domain allowed access.
Execute all init scripts in the caller domain.
Domain allowed access.
Read the process state (/proc/pid) of the init scripts.
Domain allowed access.
Inherit and use init script file descriptors.
Domain allowed access.
Do not audit attempts to inherit
init script file descriptors.
Domain allowed access.
Get the process group ID of init scripts.
Domain allowed access.
Send SIGCHLD signals to init scripts.
Domain allowed access.
Connect to init with a unix socket.
Domain allowed access.
Send generic signals to init scripts.
Domain allowed access.
Send null signals to init scripts.
Domain allowed access.
Read and write init script unnamed pipes.
Domain allowed access.
Send UDP network traffic to init scripts. (Deprecated)
Domain allowed access.
Allow the specified domain to connect to
init scripts with a unix socket.
Domain allowed access.
Allow the specified domain to read/write to
init scripts with a unix domain stream sockets.
Domain allowed access.
Dont audit the specified domain connecting to
init scripts with a unix domain stream socket.
Domain allowed access.
Send messages to init scripts over dbus.
Domain allowed access.
Send and receive messages from
init over dbus.
Domain allowed access.
Send and receive messages from
init scripts over dbus.
Domain allowed access.
Read and write the init script pty.
Read and write the init script pty. This
pty is generally opened by the open_init_pty
portion of the run_init program so that the
daemon does not require direct access to
the administrator terminal.
Domain allowed access.
Do not audit attempts to read and
write the init script pty.
Domain to not audit.
Get the attributes of init script
status files.
Domain allowed access.
Do not audit attempts to read init script
status files.
Domain allowed access.
Read init script temporary data.
Domain allowed access.
Read and write init script temporary data.
Domain allowed access.
Read and write init script inherited temporary data.
Domain allowed access.
Create files in a init script
temporary data directory.
Domain allowed access.
The type of the object to be created
The object class.
Get the attributes of init script process id files.
Domain allowed access.
Read utmp.
Domain allowed access.
Do not audit attempts to read utmp.
Domain to not audit.
Do not audit attempts to write utmp.
Domain allowed access.
Write to utmp.
Domain allowed access.
Do not audit attempts to lock
init script pid files.
Domain allowed access.
Read and write utmp.
Domain allowed access.
Do not audit attempts to read and write utmp.
Domain allowed access.
Create, read, write, and delete utmp.
Domain access allowed.
Create files in /var/run with the
utmp file type.
Domain access allowed.
Allow the specified domain to connect to daemon with a tcp socket
Domain allowed access.
Allow the specified domain to connect to daemon with a udp socket
Domain allowed access.
Transition to system_r when execute an init script
Execute a init script in a specified role
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Role to transition from.
dontaudit read and write an leaked init scrip file descriptors
The type of the process performing this action.
dontaudit read and write an leaked file descriptors
Domain to not audit.
Manage init script
status files.
Domain allowed access.
Send generic signals to init.
Domain allowed access.
Enable support for upstart as the init program.
Allow all daemons to use tcp wrappers.
Allow all daemons the ability to read/write terminals
Allow all daemons to write corefiles to /
Enable cluster mode for daemons.
TCP/IP encryption
Execute ipsec in the ipsec domain.
The type of the process performing this action.
Execute ipsec in the ipsec_mgmt domain.
The type of the process performing this action.
Connect to IPSEC using a unix domain stream socket.
The type of the process performing this action.
Connect to racoon using a unix domain stream socket.
The type of the process performing this action.
Get the attributes of an IPSEC key socket.
The type of the process performing this action.
Execute the IPSEC management program in the caller domain.
The type of the process performing this action.
Read the IPSEC configuration
The type of the process performing this action.
Match the default SPD entry.
Domain allowed access.
Set the context of a SPD entry to
the default context.
Domain allowed access.
write the ipsec_var_run_t files.
Domain allowed access.
Allow read the IPSEC pid files.
Domain allowed access.
Create, read, write, and delete the IPSEC pid files.
The type of the process performing this action.
Execute racoon in the racoon domain.
The type of the process performing this action.
Execute racoon and allow the specified role the domain.
Domain allowed access.
Role allowed access.
Execute setkey in the setkey domain.
The type of the process performing this action.
Execute setkey and allow the specified role the domains.
Domain allowed access.
The role to be allowed the racoon and setkey domains.
Send the kill signal to ipsec-mgmt
Domain allowed access.
Send a generic signal to ipsec-mgmt
Domain allowed access.
Send a generic signull to ipsec-mgmt.
Domain allowed access.
Send and receive messages from
ipsec-mgmt over dbus.
Domain allowed access.
Create, read, write, and delete ipsec-mgmt lock files.
The type of the process performing this action.
Allow racoon to read shadow
Policy for iptables.
Execute iptables in the iptables domain.
Domain allowed access.
Execute iptables in the iptables domain, and
allow the specified role the iptables domain.
Domain allowed access.
The role to be allowed the iptables domain.
Execute iptables in the caller domain.
Domain allowed access.
Execute iptables in the iptables domain.
The type of the process performing this action.
Set the attributes of iptables config files.
Domain allowed access.
Read iptables config files.
Domain allowed access.
Create files in /etc with the type used for
the iptables config files.
The type of the process performing this action.
Manage iptables config files.
Domain allowed access.
Establish connections to iSCSI devices
Execute a domain transition to run iscsid.
Domain allowed to transition.
Connect to ISCSI using a unix domain stream socket.
The type of the process performing this action.
Read iscsi lib files.
Domain allowed access.
Manage iscsid sempaphores.
Domain allowed access.
Kernel crash dumping mechanism
Execute kdump in the kdump domain.
The type of the process performing this action.
Execute kdump in the kdump domain.
The type of the process performing this action.
Read kdump configuration file.
Domain allowed access.
Manage kdump configuration file.
Domain allowed access.
All of the rules required to administrate
an kdump environment
Domain allowed access.
The role to be allowed to manage the kdump domain.
Policy for system libraries.
Execute ldconfig in the ldconfig domain.
Domain allowed access.
Execute ldconfig in the caller domain.
Domain allowed access.
Execute ldconfig in the ldconfig domain.
Domain allowed access.
The role to allow the ldconfig domain.
Use the dynamic link/loader for automatic loading
of shared libraries.
Domain allowed access.
Use the dynamic link/loader for automatic loading
of shared libraries with legacy support.
Domain allowed access.
Execute the dynamic link/loader in the caller's domain.
Domain allowed access.
Create, read, write, and delete the
dynamic link/loader.
Domain allowed access.
Relabel to and from the type used for
the dynamic link/loader.
Domain allowed access.
Modify the dynamic link/loader's cached listing
of shared libraries.
Domain allowed access.
Search library directories.
Domain allowed access.
Do not audit attempts to write to library directories.
Do not audit attempts to write to library directories.
Typically this is used to quiet attempts to recompile
python byte code.
Domain allowed access.
Create, read, write, and delete library directories.
Domain allowed access.
Read files in the library directories, such
as static libraries.
Domain allowed access.
Execute library scripts in the caller domain.
Domain allowed access.
Load and execute functions from generic
lib files as shared libraries.
Domain allowed access.
Create, read, write, and delete generic
files in library directories.
Domain allowed access.
Relabel files to the type used in library directories.
Domain allowed access.
Relabel to and from the type used
for generic lib files.
Domain allowed access.
Relabel to and from the type used
for generic lib files.
Domain allowed access.
Delete generic symlinks in library directories.
Domain allowed access.
Delete generic symlinks in library directories.
Domain allowed access.
Create, read, write, and delete shared libraries.
Domain allowed access.
Load and execute functions from shared libraries.
Domain allowed access.
Load and execute functions from shared libraries,
with legacy support.
Domain allowed access.
Relabel to and from the type used for
shared libraries.
Domain allowed access.
Create an object in lib directories, with
the shared libraries type using a type transition.
Domain allowed access.
The object class of the object being created.
Create an object in lib directories, with
the shared libraries type using a type transition. (Deprecated)
Create an object in lib directories, with
the shared libraries type using a type transition. (Deprecated)
lib_filetrans_shared_lib() should be used instead.
Domain allowed access.
The object class of the object being created.
Policy for local logins.
Execute local logins in the local login domain.
The type of the process performing this action.
Allow processes to inherit local login file descriptors.
The type of the process performing this action.
Do not audit attempts to inherit local login file descriptors.
Domain to not audit.
Send a null signal to local login processes.
Domain allowed access.
Search for key.
Domain allowed access.
Allow link to the local_login key ring.
Domain allowed access.
Execute local logins in the local login domain.
Domain allowed access.
Allow domain to gettatr local login home content
Domain allowed access.
Policy for the kernel message logger and system logging daemon.
Make the specified type usable for log files
in a filesystem.
Make the specified type usable for log files in a filesystem.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a log file type may result in problems with log
rotation, log analysis, and log monitoring programs.
Related interfaces:
Example usage with a domain that can create
and append to a private log file stored in the
general directories (e.g., /var/log):
type mylogfile_t;
logging_log_file(mylogfile_t)
allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms };
logging_log_filetrans(mydomain_t, mylogfile_t, file)
Type to be used for files.
Send audit messages.
Domain allowed access.
dontaudit attempts to send audit messages.
Domain allowed access.
Set login uid
Domain allowed access.
Set tty auditing
Domain allowed access.
Set up audit
Domain allowed access.
Read the audit log.
Domain allowed access.
dontaudit search of auditd log files.
Domain to not audit.
Execute auditctl in the auditctl domain.
Domain allowed access.
Execute auditctl in the auditctl domain, and
allow the specified role the auditctl domain.
Domain allowed access.
The role to be allowed the auditctl domain.
Execute auditd in the auditd domain.
Domain allowed access.
Execute auditd in the auditd domain, and
allow the specified role the auditd domain.
Domain allowed access.
The role to be allowed the auditd domain.
Connect to auditdstored over an unix stream socket.
Domain allowed access.
Execute a domain transition to run the audit dispatcher.
Domain allowed to transition.
Signal the audit dispatcher.
Domain allowed to transition.
Create a domain for processes
which can be started by the system audit dispatcher
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
Connect to the audit dispatcher over an unix stream socket.
Domain allowed access.
Manage the auditd configuration files.
Domain allowed access.
Manage the audit log.
Domain allowed access.
Execute klogd in the klog domain.
Domain allowed access.
Check if syslogd is executable.
Domain allowed access.
Execute syslogd in the syslog domain.
Domain allowed access.
Create an object in the log directory, with a private type.
Allow the specified domain to create an object
in the general system log directories (e.g., /var/log)
with a private type. Typically this is used for creating
private log files in /var/log with the private type instead
of the general system log type. To accomplish this goal,
either the program must be SELinux-aware, or use this interface.
Related interfaces:
Example usage with a domain that can create
and append to a private log file stored in the
general directories (e.g., /var/log):
type mylogfile_t;
logging_log_file(mylogfile_t)
allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms };
logging_log_filetrans(mydomain_t, mylogfile_t, file)
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Send system log messages.
Allow the specified domain to connect to the
system log service (syslog), to send messages be added to
the system logs. Typically this is used by services
that do not have their own log file in /var/log.
This does not allow messages to be sent to
the auditing system.
Programs which use the libc function syslog() will
require this access.
Related interfaces:
- logging_send_audit_msgs()
Domain allowed access.
Connect to the syslog control unix stream socket.
Domain allowed access.
Read the auditd configuration files.
Domain allowed access.
dontaudit search of auditd configuration files.
Domain allowed access.
Read syslog configuration files.
Domain allowed access.
Allows the domain to open a file in the
log directory, but does not allow the listing
of the contents of the log directory.
Domain allowed access.
Do not audit attempts to search the var log directory.
Domain not to audit.
List the contents of the generic log directory (/var/log).
Domain allowed access.
Read and write the generic log directory (/var/log).
Domain allowed access.
Do not audit attempts to get the atttributes
of any log files.
Domain allowed access.
Append to all log files.
Domain allowed access.
Append to all log files.
Domain allowed access.
Read all log files.
Domain allowed access.
dontaudit Read all log files.
Domain allowed access.
dontaudit Read all log files.
Domain allowed access.
Execute all log files in the caller domain.
Domain allowed access.
read/write to all log files.
Domain allowed access.
Create, read, write, and delete all log files.
Domain allowed access.
Read generic log files.
Domain allowed access.
Write generic log files.
Domain allowed access.
Dontaudit read/Write inherited generic log files.
Domain to not audit.
Dontaudit Write generic log files.
Domain allowed access.
Read and write generic log files.
Domain allowed access.
Create, read, write, and delete
generic log files.
Domain allowed access.
All of the rules required to administrate
the audit environment
Domain allowed access.
User role allowed access.
All of the rules required to administrate
the syslog environment
Domain allowed access.
User role allowed access.
All of the rules required to administrate
the logging environment
Domain allowed access.
User role allowed access.
Allow syslogd daemon to send mail
Allow syslogd daemon to read user tmp content
Allow syslogd the ability to read/write terminals
Allow syslogd the ability to call nagios plugins. It is
turned on by omprog rsyslog plugin.
Policy for logical volume management programs.
Execute lvm programs in the lvm domain.
The type of the process performing this action.
Execute lvm programs in the caller domain.
The type of the process performing this action.
Execute lvm programs in the lvm domain.
The type of the process performing this action.
The role to allow the LVM domain.
Read LVM configuration files.
The type of the process performing this action.
Manage LVM configuration files.
Domain allowed access.
Connect to lvm using a unix domain stream socket.
Domain allowed access.
Execute a domain transition to run clvmd.
Domain allowed to transition.
Read and write to clvmd temporary file system.
Domain allowed access.
Delete lvm temporary file system.
Domain allowed access.
Send a message to lvm over the
datagram socket.
Domain allowed access.
Miscelaneous files.
Make the specified type usable as a cert file.
Make the specified type usable for cert files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
cert management tools.
Related interfaces:
Example:
type mycertfile_t;
cert_type(mycertfile_t)
allow mydomain_t mycertfile_t:file read_file_perms;
files_search_etc(mydomain_t)
Type to be used for files.
Read system SSL certificates.
Domain allowed access.
Dontaudit read/writei certificates.
Domain allowed access.
manange system SSL certificates.
Domain allowed access.
manange system SSL certificates.
Domain allowed access.
Read fonts.
Domain allowed access.
Set the attributes on a fonts directory.
Domain allowed access.
Do not audit attempts to set the attributes
on a fonts directory.
Domain allowed access.
Do not audit attempts to write fonts.
Domain allowed access.
Create, read, write, and delete fonts.
Domain allowed access.
Set the attributes on a fonts cache directory.
Domain allowed access.
Do not audit attempts to set the attributes
on a fonts cache directory.
Domain allowed access.
Create, read, write, and delete fonts cache.
Domain allowed access.
Read hardware identification data.
Domain allowed access.
Allow process to setattr localization info
Domain allowed access.
Allow process to read localization information.
Allow the specified domain to read the localization files.
This is typically for time zone configuration files, such as
/etc/localtime and files in /usr/share/zoneinfo.
Typically, any domain which needs to know the GMT/UTC
offset of the current timezone will need access
to these files. Generally, it should be safe for any
domain to read these files.
Domain allowed access.
Allow process to write localization info
Domain allowed access.
Allow process to relabel localization info
Domain allowed access.
Allow process to read legacy time localization info
Domain allowed access.
Search man pages.
Domain to not audit.
Do not audit attempts to search man pages.
Domain to not audit.
Read man pages
Domain allowed access.
Delete man pages
Domain allowed access.
Create, read, write, and delete man pages
Domain allowed access.
Read public files used for file
transfer services.
Domain allowed access.
Create, read, write, and delete public files
and directories used for file transfer services.
Domain allowed access.
Read TeX data
Domain allowed access.
Execute TeX data programs in the caller domain.
Domain allowed access.
Let test files be an entry point for
a specified domain.
Domain to be entered.
Read test files and directories.
Domain allowed access.
Execute test files.
Domain allowed access.
Execute test files.
Domain allowed access.
Create, read, write, and delete localization
Domain allowed access.
Dontaudit attempts to write generic SSL certificates.
Domain allowed access.
Do not audit attempts to access check cert dirs/files.
Domain to not audit.
Policy for kernel module utilities
Getattr the dependencies of kernel modules.
Domain allowed access.
Read the dependencies of kernel modules.
Domain allowed access.
list the configuration options used when
loading modules.
Domain allowed access.
Read the configuration options used when
loading modules.
Domain allowed access.
Rename a file with the configuration options used when
loading modules.
Domain allowed access.
Unlink a file with the configuration options used when
loading modules.
Domain allowed access.
Manage files with the configuration options used when
loading modules.
Domain allowed access.
Unconditionally execute insmod in the insmod domain.
Domain allowed access.
Execute insmod in the insmod domain.
Domain allowed access.
Execute insmod in the insmod domain, and
allow the specified role the insmod domain,
and use the caller's terminal. Has a sigchld
backchannel.
Domain allowed access.
The role to be allowed the insmod domain.
Execute insmod in the caller domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
The role to be allowed the depmod domain.
Execute depmod in the caller domain.
Domain allowed access.
Execute depmod in the depmod domain.
Domain allowed access.
Execute update_modules in the update_modules domain.
Domain allowed access.
The role to be allowed the update_modules domain.
Execute update_modules in the caller domain.
Domain allowed access.
Policy for mount.
Execute mount in the mount domain.
The type of the process performing this action.
Execute mount in the mount domain, and
allow the specified role the mount domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the mount domain.
Execute fusermount in the mount domain, and
allow the specified role the mount domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the mount domain.
Execute mount in the caller domain.
The type of the process performing this action.
Send a generic signal to mount.
Domain allowed access.
Manage mount PID files.
Domain allowed access.
Use file descriptors for mount.
The type of the process performing this action.
Allow the mount domain to send nfs requests for mounting
network drives
Allow the mount domain to send nfs requests for mounting
network drives
This interface has been deprecated as these rules were
a side effect of leaked mount file descriptors. This
interface has no effect.
Domain allowed access.
Execute mount in the unconfined mount domain.
Domain allowed access.
Execute mount in the unconfined mount domain, and
allow the specified role the unconfined mount domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the unconfined mount domain.
Execute fusermount in the mount domain.
The type of the process performing this action.
Execute fusermount.
The type of the process performing this action.
dontaudit Execute fusermount.
The type of the process performing this action.
Execute a domain transition to run showmount.
Domain allowed to transition.
Execute showmount in the showmount domain, and
allow the specified role the showmount domain.
Domain allowed access
The role to be allowed the showmount domain.
Allow the mount command to mount any directory or file.
NetLabel/CIPSO labeled networking management
Execute netlabel_mgmt in the netlabel_mgmt domain.
Domain allowed access.
Execute netlabel_mgmt in the netlabel_mgmt domain, and
allow the specified role the netlabel_mgmt domain.
Domain allowed access.
The role to be allowed the netlabel_mgmt domain.
PCMCIA card management services
PCMCIA stub interface. No access allowed.
Domain allowed access.
Execute cardmgr in the cardmgr domain.
The type of the process performing this action.
Inherit and use file descriptors from cardmgr.
Domain allowed access.
Execute cardctl in the cardmgr domain.
The type of the process performing this action.
Execute cardmgr in the cardctl domain, and
allow the specified role the cardmgr domain.
The type of the process performing this action.
The role to be allowed the cardmgr domain.
Read cardmgr pid files.
Domain allowed access.
Create, read, write, and delete
cardmgr pid files.
Domain allowed access.
Create, read, write, and delete
cardmgr runtime character nodes.
Domain allowed access.
RAID array management tools
Execute software raid tools in the mdadm domain.
The type of the process performing this action.
Create, read, write, and delete the mdadm pid files.
Create, read, write, and delete the mdadm pid files.
Added for use in the init module.
The type of the process performing this action.
Read mdadm map file.
The type of the process performing this action.
Policy for SELinux policy and userland applications.
Execute checkpolicy in the checkpolicy domain.
Domain allowed access.
Execute checkpolicy in the checkpolicy domain, and
allow the specified role the checkpolicy domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the checkpolicy domain.
Execute checkpolicy in the caller domain.
Domain allowed access.
Execute load_policy in the load_policy domain.
Domain allowed access.
Execute load_policy in the load_policy domain, and
allow the specified role the load_policy domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the load_policy domain.
Execute load_policy in the caller domain.
Domain allowed access.
Read the load_policy program file.
Domain allowed access.
Execute newrole in the newole domain.
Domain allowed access.
Execute newrole in the newrole domain, and
allow the specified role the newrole domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the newrole domain.
Execute newrole in the caller domain.
Domain allowed access.
Do not audit the caller attempts to send
a signal to newrole.
Domain allowed access.
Send a SIGCHLD signal to newrole.
Allow the specified domain to send a SIGCHLD
signal to newrole. This signal is automatically
sent from a process that is terminating to
its parent. This may be needed by domains
that are executed from newrole.
Domain allowed access.
Inherit and use newrole file descriptors.
Domain allowed access.
Do not audit attempts to inherit and use
newrole file descriptors.
Domain to not audit.
Execute restorecon in the restorecon domain. (Deprecated)
Domain allowed access.
Execute restorecon in the restorecon domain, and
allow the specified role the restorecon domain,
and use the caller's terminal. (Deprecated)
Domain allowed access.
The role to be allowed the restorecon domain.
Execute restorecon in the caller domain. (Deprecated)
Domain allowed access.
Execute restorecond in the caller domain.
Domain allowed access.
Execute run_init in the run_init domain.
Domain allowed access.
Execute init scripts in the run_init domain.
Execute init scripts in the run_init domain.
This is used for the Gentoo integrated run_init.
Domain allowed access.
Execute run_init in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the run_init domain.
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
Execute init scripts in the run_init domain, and
allow the specified role the run_init domain,
and use the caller's terminal.
This is used for the Gentoo integrated run_init.
Domain allowed access.
The role to be allowed the run_init domain.
Inherit and use run_init file descriptors.
Domain allowed access.
Execute setfiles in the setfiles domain.
Domain allowed access.
Execute setfiles in the setfiles domain, and
allow the specified role the setfiles domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setfiles domain.
Execute setfiles in the setfiles domain.
Domain allowed access.
Execute setfiles in the setfiles_mac domain, and
allow the specified role the setfiles_mac domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setfiles_mac domain.
Execute setfiles in the caller domain.
Domain allowed access.
Do not audit attempts to search the SELinux
configuration directory (/etc/selinux).
Domain to not audit.
Do not audit attempts to read the SELinux
userland configuration (/etc/selinux).
Domain to not audit.
Read the general SELinux configuration files.
Domain allowed access.
Read and write the general SELinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files. (Deprecated)
Create, read, write, and delete
the general selinux configuration files.
This interface has been deprecated, please
use the seutil_manage_config() interface instead.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Do not audit attempts to search the SELinux
login configuration directory.
Domain to not audit.
Do not audit attempts to read the SELinux
login configuration.
Domain to not audit.
Read the SELinux login configuration files.
Domain allowed access.
Read and write the SELinux login configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
Create, read, write, and delete
the general selinux configuration files.
Domain allowed access.
manage the login selinux configuration files.
Domain allowed access.
Search the policy directory with default_context files.
Domain allowed access.
Read the default_contexts files.
Domain allowed access.
Create, read, write, and delete the default_contexts files.
Domain allowed access.
Read the file_contexts files.
Domain allowed access.
Do not audit attempts to read the file_contexts files.
Domain allowed access.
Read and write the file_contexts files.
Domain allowed access.
Create, read, write, and delete the file_contexts files.
Domain allowed access.
Read the SELinux binary policy.
Domain allowed access.
Create the SELinux binary policy.
Domain allowed access.
Allow the caller to relabel a file to the binary policy type.
Domain allowed access.
Create, read, write, and delete the SELinux
binary policy.
Domain allowed access.
Read SELinux policy source files.
Domain allowed access.
Create, read, write, and delete SELinux
policy source files.
Domain allowed access.
Execute a domain transition to run semanage.
Domain allowed to transition.
Execute a domain transition to run setsebool.
Domain allowed to transition.
Execute semanage in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the semanage domain.
Execute setsebool in the semanage domain, and
allow the specified role the semanage domain,
and use the caller's terminal.
Domain allowed access.
The role to be allowed the setsebool domain.
Full management of the semanage
module store.
Domain allowed access.
Full management of the semanage
module store.
Domain allowed access.
Get read lock on module store
Domain allowed access.
Get trans lock on module store
Domain allowed access.
SELinux-enabled program access for
libselinux-linked programs.
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will allow access required for
the libselinux constructor to function.
Domain allowed access.
Do not audit SELinux-enabled program access for
libselinux-linked programs.
SELinux-enabled programs are typically
linked to the libselinux library. This
interface will dontaudit access required for
the libselinux constructor to function.
Generally this should not be used on anything
but simple SELinux-enabled programs that do not
rely on data initialized by the libselinux
constructor.
Domain allowed access.
All rules necessary to run semanage command
Domain allowed access.
All rules necessary to run setfiles command
Domain allowed access.
SELinux MLS/MCS label translation service.
Execute setrans server in the setrans domain.
The type of the process performing this action.
Allow a domain to translate contexts.
Domain allowed access.
policy for sosreport
Execute a domain transition to run sosreport.
Domain allowed to transition.
Execute sosreport in the sosreport domain, and
allow the specified role the sosreport domain.
Domain allowed access
The role to be allowed the sosreport domain.
Role access for sosreport
Role allowed access
User domain for the role
Allow the specified domain to read
sosreport tmp files.
Domain allowed access.
Delete sosreport tmp files.
Domain allowed access.
Append sosreport tmp files.
Domain allowed access.
Policy for network configuration: ifconfig and dhcp client.
Execute dhcp client in dhcpc domain.
The type of the process performing this action.
Execute DHCP clients in the dhcpc domain, and
allow the specified role the dhcpc domain.
The type of the process performing this action.
The role to be allowed the clock domain.
Send a SIGCHLD signal to the dhcp client.
The domain sending the SIGCHLD.
Send a kill signal to the dhcp client.
The domain sending the SIGKILL.
Send a SIGSTOP signal to the dhcp client.
The domain sending the SIGSTOP.
Send a null signal to the dhcp client.
The domain sending the null signal.
Send a generic signal to the dhcp client.
The domain sending the signal.
Send and receive messages from
dhcpc over dbus.
Domain allowed access.
Read and write dhcp configuration files.
The domain allowed access.
Read dhcp client state files.
The domain allowed access.
Delete the dhcp client state files.
Domain allowed access.
Allow caller to relabel dhcpc_state files
Domain allowed access.
Manage the dhcp client state files.
Domain allowed access.
Set the attributes of network config files.
Domain allowed access.
Allow caller to relabel net_conf files
Domain allowed access.
Allow caller to relabel net_conf files
Domain allowed access.
Read network config files.
Allow the specified domain to read the
general network configuration files. A
common example of this is the
/etc/resolv.conf file, which has domain
name system (DNS) server IP addresses.
Typically, most networking processes will
require the access provided by this interface.
Higher-level interfaces which involve
networking will generally call this interface,
for example:
- sysnet_dns_name_resolve()
- sysnet_use_ldap()
- sysnet_use_portmap()
Domain allowed access.
Do not audit attempts to read network config files.
Domain to not audit.
Write network config files.
Domain allowed access.
Create network config files.
Domain allowed access.
Create files in /etc with the type used for
the network config files.
The type of the process performing this action.
Create, read, write, and delete network config files.
The type of the process performing this action.
Read the dhcp client pid file.
The type of the process performing this action.
Delete the dhcp client pid file.
The type of the process performing this action.
Manage the dhcp client pid file.
The type of the process performing this action.
Execute ifconfig in the ifconfig domain.
The type of the process performing this action.
Execute ifconfig in the ifconfig domain, and
allow the specified role the ifconfig domain,
and use the caller's terminal.
The type of the process performing this action.
The role to be allowed the ifconfig domain.
Execute ifconfig in the caller domain.
Domain allowed access.
Send a generic signal to ifconfig.
Domain allowed access.
Read the DHCP configuration files.
Domain allowed access.
Search the DHCP state data directory.
Domain allowed access.
Create DHCP state data.
Create DHCP state data.
This is added for DHCP server, as
the server and client put their state
files in the same directory.
Domain allowed access.
The type of the object to be created
The object class.
Perform a DNS name resolution.
Domain allowed access.
Connect and use a LDAP server.
Domain allowed access.
Connect and use remote port mappers.
Domain allowed access.
Do not audit attempts to use
the dhcp file descriptors.
The domain sending the SIGCHLD.
Transition to system_r when execute an dhclient script
Execute dhclient script in a specified role
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Role to transition from.
Allow dhcpc client applications to execute iptables commands
Policy for udev.
Execute udev in the udev domain, and
allow the specified role the udev domain.
Domain allowed access.
The role to be allowed the iptables domain.
Send generic signals to udev.
Domain allowed access.
Execute udev in the udev domain.
The type of the process performing this action.
Execute udev in the caller domain.
Domain allowed access.
Execute a udev helper in the udev domain.
The type of the process performing this action.
Allow process to read udev process state.
Domain allowed access.
Do not audit attempts to inherit a
udev file descriptor.
Domain to not audit.
Do not audit attempts to read or write
to a udev unix datagram socket.
Domain to not audit.
Do not audit search of udev database directories.
Domain to not audit.
Read the udev device table.
Allow the specified domain to read the udev device table.
Domain allowed access.
Allow process to modify list of devices.
The type of the process performing this action.
Allow process to delete list of devices.
The type of the process performing this action.
Create, read, write, and delete
udev pid files.
Domain allowed access.
Create, read, write, and delete
udev pid files.
Domain allowed access.
Create a domain for processes
which can be started by udev.
Type to be used as a domain.
Type of the program to be used as an entry point to this domain.
The unconfined domain.
Make the specified domain unconfined.
Domain to make unconfined.
Make the specified domain unconfined and
audit executable heap usage.
Make the specified domain unconfined and
audit executable heap usage. With exception
of memory protections, usage of this interface
will result in the level of access the domain has
is like SELinux was not being used.
Only completely trusted domains should use this interface.
Domain to make unconfined.
Add an alias type to the unconfined domain. (Deprecated)
Add an alias type to the unconfined domain. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
New alias of the unconfined domain.
Add an alias type to the unconfined execmem
program file type. (Deprecated)
Add an alias type to the unconfined execmem
program file type. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
New alias of the unconfined execmem program type.
Policy for user domains
The template containing the most basic rules common to all users.
The template containing the most basic rules common to all users.
This template creates a user domain, types, and
rules for the user's tty and pty.
The prefix of the user domain (e.g., user
is the prefix for user_t).
Allow a home directory for which the
role has read-only access.
Allow a home directory for which the
role has read-only access.
This does not allow execute access.
The user role
The user domain
Allow a home directory for which the
role has full access.
Allow a home directory for which the
role has full access.
This does not allow execute access.
The user role
The user domain
Manage user temporary files
Role allowed access.
Domain allowed access.
Execute user bin files.
Domain allowed access.
The execute access user temporary files.
Domain allowed access.
Role access for the user tmpfs type
that the user has full access.
Role access for the user tmpfs type
that the user has full access.
This does not allow execute access.
Role allowed access.
Domain allowed access.
The interface allowing the user basic
network permissions
The user domain
The template for creating a user xwindows client. (Deprecated)
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for allowing the user to change passwords.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template containing rules common to unprivileged
users and administrative users.
This template creates a user domain, types, and
rules for the user's tty, pty, tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged xwindows login user.
The template for creating a unprivileged xwindows login user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
The template for creating a unprivileged user roughly
equivalent to a regular linux user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The prefix of the user domain (e.g., user
is the prefix for user_t).
The template for creating an administrative user.
This template creates a user domain, types, and
rules for the user's tty, pty, home directories,
tmp, and tmpfs files.
The privileges given to administrative users are:
- Raw disk access
- Set all sysctls
- All kernel ring buffer controls
- Create, read, write, and delete all files but shadow
- Manage source and binary format SELinux policy
- Run insmod
The prefix of the user domain (e.g., sysadm
is the prefix for sysadm_t).
Allow user to run as a secadm
Create objects in a user home directory
with an automatic type transition to
a specified private type.
This is a templated interface, and should only
be called from a per-userdomain template.
Domain allowed access.
The role of the object to create.
Make the specified type usable as
a user application domain.
Type to be used as a user application domain.
Type to be used as the domain entry point.
Make the specified type usable in a
user home directory.
Type to be used as a file in the
user home directory.
Make the specified type usable in a
generic temporary directory.
Type to be used as a file in the
generic temporary directory.
Make the specified type usable in a
generic tmpfs_t directory.
Type to be used as a file in the
generic temporary directory.
Allow domain to attach to TUN devices created by administrative users.
Domain allowed access.
Set the attributes of a user pty.
Domain allowed access.
Create a user pty.
Domain allowed access.
Get the attributes of user home directories.
Domain allowed access.
Do not audit attempts to get the attributes of user home directories.
Domain allowed access.
Search user home directories.
Domain allowed access.
Do not audit attempts to search user home directories.
Do not audit attempts to search user home directories.
This will supress SELinux denial messages when the specified
domain is denied the permission to search these directories.
Domain to not audit.
List user home directories.
Domain allowed access.
Do not audit attempts to list user home subdirectories.
Domain to not audit
Create user home directories.
Domain allowed access.
Create user home directories.
Domain allowed access.
Relabel to user home directories.
Domain allowed access.
Relabel to user home files.
Domain allowed access.
Relabel user home files.
Domain allowed access.
Create directories in the home dir root with
the user home directory type.
Domain allowed access.
Do a domain transition to the specified
domain when executing a program in the
user home directory.
Do a domain transition to the specified
domain when executing a program in the
user home directory.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
Domain to transition to.
Do not audit attempts to search user home content directories.
Domain to not audit
List contents of users home directory.
Domain allowed access.
Create, read, write, and delete directories
in a user home subdirectory.
Domain allowed access.
Delete directories in a user home subdirectory.
Domain allowed access.
Set the attributes of user home files.
Domain allowed access.
Do not audit attempts to set the
attributes of user home files.
Domain allowed access.
Mmap user home files.
Domain allowed access.
Read user home files.
Domain allowed access.
Do not audit attempts to getattr user home files.
Domain to not audit.
Do not audit attempts to read user home files.
Domain to not audit.
Do not audit attempts to append user home files.
Domain to not audit.
Do not audit attempts to write user home files.
Domain to not audit.
Delete files in a user home subdirectory.
Domain allowed access.
Do not audit attempts to write user home files.
Domain to not audit.
Read user home subdirectory symbolic links.
Domain allowed access.
Execute user home files.
Domain allowed access.
Do not audit attempts to execute user home files.
Domain allowed access.
Create, read, write, and delete files
in a user home subdirectory.
Domain allowed access.
Do not audit attempts to create, read, write, and delete directories
in a user home subdirectory.
Domain allowed access.
Create, read, write, and delete symbolic links
in a user home subdirectory.
Domain allowed access.
Delete symbolic links in a user home directory.
Domain allowed access.
Create, read, write, and delete named pipes
in a user home subdirectory.
Domain allowed access.
Create, read, write, and delete named sockets
in a user home subdirectory.
Domain allowed access.
Create objects in a user home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in a user home directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in a user home directory
with an automatic type transition to
the user home file type.
Domain allowed access.
The class of the object to be created.
Write to user temporary named sockets.
Domain allowed access.
List user temporary directories.
Domain allowed access.
Do not audit attempts to search user
temporary directories.
Domain to not audit.
Do not audit attempts to list user
temporary directories.
Domain to not audit.
Do not audit attempts to manage users
temporary directories.
Domain to not audit.
Read user temporary files.
Domain allowed access.
Do not audit attempts to read users
temporary files.
Domain to not audit.
Do not audit attempts to append users
temporary files.
Domain to not audit.
Read and write user temporary files.
Domain allowed access.
Do not audit attempts to write users
temporary files.
Domain to not audit.
Do not audit attempts to read/write users
temporary fifo files.
Domain to not audit.
Do not audit attempts to use user ttys.
Domain to not audit.
Do not audit attempts to manage users
temporary files.
Domain to not audit.
Read user temporary symbolic links.
Domain allowed access.
Create, read, write, and delete user
temporary directories.
Domain allowed access.
Create, read, write, and delete user
temporary files.
Domain allowed access.
Create, read, write, and delete user
temporary symbolic links.
Domain allowed access.
Create, read, write, and delete user
temporary named pipes.
Domain allowed access.
Create, read, write, and delete user
temporary named sockets.
Domain allowed access.
Create objects in a user temporary directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Create objects in the temporary directory
with an automatic type transition to
the user temporary type.
Domain allowed access.
The class of the object to be created.
Read user tmpfs files.
Domain allowed access.
Read/Write user tmpfs files.
Domain allowed access.
Read/Write inherited user tmpfs files.
Domain allowed access.
Execute user tmpfs files.
Domain allowed access.
Delete user tmpfs files.
Domain allowed access.
Get the attributes of a user domain tty.
Domain allowed access.
Do not audit attempts to get the attributes of a user domain tty.
Domain allowed access.
Set the attributes of a user domain tty.
Domain allowed access.
Do not audit attempts to set the attributes of a user domain tty.
Domain allowed access.
Read and write a user domain tty.
Domain allowed access.
Read and write inherited user domain tty.
Domain allowed access.
Read and write a user domain pty.
Domain allowed access.
Read and write inherited user domain pty.
Domain allowed access.
Read and write inherited user domain pty.
Domain allowed access.
Read and write a user TTYs and PTYs.
Allow the specified domain to read and write user
TTYs and PTYs. This will allow the domain to
interact with the user via the terminal. Typically
all interactive applications will require this
access.
However, this also allows the applications to spy
on user sessions or inject information into the
user session. Thus, this access should likely
not be allowed for non-interactive domains.
Domain allowed access.
Do not audit attempts to read and write
a user domain tty and pty.
Domain allowed access.
Execute a shell in all user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute a shell in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Allow domain dyntrans to unpriv userdomain.
Domain allowed access.
Allow domain dyntrans to admin userdomain.
Domain allowed access.
Execute an Xserver session in all unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Manage unpriviledged user SysV sempaphores.
Domain allowed access.
Manage unpriviledged user SysV shared
memory segments.
Domain allowed access.
Read/Write unpriviledged user SysV shared
memory segments.
Domain allowed access.
Execute bin_t in the unprivileged user domains. This
is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Execute all entrypoint files in unprivileged user
domains. This is an explicit transition, requiring the
caller to use setexeccon().
Domain allowed access.
Search users home directories.
Domain allowed access.
Send general signals to unprivileged user domains.
Domain allowed access.
Inherit the file descriptors from unprivileged user domains.
Domain allowed access.
Do not audit attempts to inherit the file descriptors
from unprivileged user domains.
Do not audit attempts to inherit the file descriptors
from unprivileged user domains. This will supress
SELinux denial messages when the specified domain is denied
the permission to inherit these file descriptors.
Domain to not audit.
Do not audit attempts to use user ptys.
Domain to not audit.
Relabel files to unprivileged user pty types.
Domain allowed access.
Do not audit attempts to relabel files from
user pty types.
Domain allowed access.
Write all users files in /tmp
Domain allowed access.
Read the process state of all user domains.
Domain allowed access.
Get the attributes of all user domains.
Domain allowed access.
Inherit the file descriptors from all user domains
Domain allowed access.
Do not audit attempts to inherit the file
descriptors from any user domains.
Domain to not audit.
Send general signals to all user domains.
Domain allowed access.
Send a SIGCHLD signal to all user domains.
Domain allowed access.
Create keys for all user domains.
Domain allowed access.
Send a dbus message to all user domains.
Domain allowed access.
Allow apps to set rlimits on userdomain
Domain allowed access.
Define this type as a Allow apps to set rlimits on userdomain
The prefix of the user domain (e.g., user
is the prefix for user_t).
Domain allowed access.
Connect to users over an unix stream socket.
Domain allowed access.
Dontaudit connectto to users over an unix stream socket.
Domain allowed access.
Ptrace user domains.
Domain allowed access.
dontaudit Search /root
Domain allowed access.
dontaudit list /root
Domain allowed access.
dontaudit write /root
Domain allowed access.
Allow domain to list /root
Domain allowed access.
Allow Search /root
Domain allowed access.
RW unpriviledged user SysV sempaphores.
Domain allowed access.
Send a message to unpriv users over a unix domain
datagram socket.
Domain allowed access.
Send a message to users over a unix domain
datagram socket.
Domain allowed access.
Allow execmod on files in homedirectory
Domain allowed access.
Read admin home files.
Domain allowed access.
Read admin home files.
Domain allowed access.
Execute admin home files.
Domain allowed access.
Append files inherited
in the /root directory.
Domain allowed access.
Manage all files/directories in the homedir
The user domain
Create objects in a user home directory
with an automatic type transition to
the user home file type.
Domain allowed access.
The class of the object to be created.
Create objects in the /root directory
with an automatic type transition to
a specified private type.
Domain allowed access.
The type of the object to create.
The class of the object to be created.
Send signull to unprivileged user domains.
Domain allowed access.
Write all users files in /tmp
Domain allowed access.
Manage keys for all user domains.
Domain allowed access.
Do not audit attempts to read and write
unserdomain stream.
Domain to not audit.
Append files
in a user home subdirectory.
Domain allowed access.
Read files inherited
in a user home subdirectory.
Domain allowed access.
Append files inherited
in a user home subdirectory.
Domain allowed access.
Append files inherited
in a user tmp files.
Domain allowed access.
Read system SSL certificates in the users homedir.
Domain allowed access.
Manage system SSL certificates in the users homedir.
Domain allowed access.
Dontaudit Write system SSL certificates in the users homedir.
Domain to not audit.
Read audio files in the users homedir.
Domain allowed access.
Do not audit attempts to write all user home content files.
Domain to not audit.
Do not audit attempts to write all user tmp content files.
Domain to not audit.
Manage all user temporary content.
Domain allowed access.
List all user temporary content.
Domain allowed access.
Manage all user tmpfs content.
Domain allowed access.
Delete all user temporary content.
Domain allowed access.
dontaudit Search getatrr /root files
Domain allowed access.
dontaudit read /root lnk files
Domain allowed access.
Create, read, write, and delete user
temporary chr files.
Domain allowed access.
Create, read, write, and delete user
temporary blk files.
Domain allowed access.
Dontaudit attempt to set attributes on user temporary directories.
Domain to not audit.
Read all inherited users files in /tmp
Domain allowed access.
Dontaudit search user temporary directories.
Domain allowed access.
Write all inherited users files in /tmp
Domain allowed access.
Delete all users files in /tmp
Domain allowed access.
Send kill signals to all user domains.
Domain allowed access.
Read/write all inherited users files in /tmp
Domain allowed access.
Read and write userdomain stream.
Domain allowed access.
Allow users to connect to mysql
Allow users to connect to PostgreSQL
Allow regular users direct mouse access
Allow user to r/w files on filesystems
that do not have extended attributes (FAT, CDROM, FLOPPY)
Allow user processes to change their priority
Allow w to display everyone
Xen hypervisor
Execute a domain transition to run xend.
Domain allowed to transition.
Inherit and use xen file descriptors.
Domain to not audit.
Do not audit attempts to inherit
xen file descriptors.
Domain to not audit.
Read xend image files.
Domain allowed access.
Allow the specified domain to read/write
xend image files.
Domain allowed to transition.
Allow the specified domain to append
xend log files.
Domain allowed to transition.
Create, read, write, and delete the
xend log files.
Domain allowed access.
Do not audit attempts to read and write
Xen unix domain stream sockets. These
are leaked file descriptors.
Domain to not audit.
Connect to xenstored over an unix stream socket.
Domain allowed access.
Connect to xend over an unix domain stream socket.
Domain allowed access.
Execute a domain transition to run xm.
Domain allowed to transition.
Connect to xm over an unix stream socket.
Domain allowed access.
Allow xen to manage nfs files
Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla)
Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t)
Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla)
Enable polyinstantiated directory support.
Allow system to run with NIS
Enable reading of urandom for all domains.
This should be enabled when all programs
are compiled with ProPolice/SSP
stack smashing protection. All domains will
be allowed to read from /dev/urandom.
Support NFS home directories
Support fusefs home directories
Support SAMBA home directories
Allow users to run TCP servers (bind to ports and accept connection from
the same domain and outside users) disabling this forces FTP passive mode
and may change other protocols.
Allow direct login to the console device. Required for System 390
Allow certain domains to map low memory in the kernel
Enabling secure mode disallows programs, such as
newrole, from transitioning to administrative
user domains.
Disable transitions to insmod.
boolean to determine whether the system permits loading policy, setting
enforcing mode, and changing boolean values. Set this to true and you
have to reboot to set it back