?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for administrative functions, such as package management. policy for accountsd Execute a domain transition to run accountsd. Domain allowed to transition. Search accountsd lib directories. Domain allowed access. Read accountsd lib files. Domain allowed access. Create, read, write, and delete accountsd lib files. Domain allowed access. Manage accountsd var_lib files. Domain allowed access. Send and receive messages from accountsd over dbus. Domain allowed access. Do not audit attempts to read and write Accounts Daemon fifo file. Domain allowed access. All of the rules required to administrate an accountsd environment Domain allowed access. Berkeley process accounting Transition to the accounting management domain. Domain allowed access. Execute accounting management tools in the caller domain. The type of the process performing this action. Execute accounting management data in the caller domain. The type of the process performing this action. Create, read, write, and delete process accounting data. The type of the process performing this action. Ainit ALSA configuration tool Domain transition to alsa Domain allowed access. Allow read and write access to alsa semaphores. Domain allowed access. Allow read and write access to alsa shared memory. Domain allowed access. Read alsa writable config files. Domain allowed access. Manage alsa writable config files. Domain allowed access. Read alsa lib files. Domain allowed access. Automated backup program. Execute amrecover in the amanda_recover domain. The type of the process performing this action. Execute amrecover in the amanda_recover domain, and allow the specified role the amanda_recover domain. The type of the process performing this action. The role to be allowed the amanda_recover domain. Search amanda library directories. The type of the process performing this action. Allow append amanda lib files. Domain to allow Do not audit attempts to read /etc/dumpdates. Domain to not audit. Allow read/writing /etc/dumpdates. Domain to allow Search amanda library directories. The type of the process performing this action. Allow read/writing amanda logs Domain to allow Search amanda var library directories. The type of the process performing this action. Abstract Machine Test Utility Execute amtu in the amtu domain. Domain allowed access. Execute amtu in the amtu domain, and allow the specified role the amtu domain. Domain allowed access. The role to be allowed the amtu domain. Policy for the Anaconda installer. Execute preupgrade in the caller domain. Domain allowed to transition. Execute a domain transition to run preupgrade. Domain allowed to transition. Read preupgrade lib files Domain allowed access. Manage preupgrade lib files Domain allowed access. APT advanced package tool. Execute apt programs in the apt domain. The type of the process performing this action. Execute apt programs in the apt domain. The type of the process performing this action. The role to allow the apt domain. Inherit and use file descriptors from apt. The type of the process performing this action. Do not audit attempts to use file descriptors from apt. The type of the process attempting performing this action which should not be audited. Read from an unnamed apt pipe. The type of the process performing this action. Read and write an unnamed apt pipe. The type of the process performing this action. Read from and write to apt ptys. Domain allowed access. Read the apt package cache. The type of the process performing this action. Read the apt package database. The type of the process performing this action. Create, read, write, and delete the apt package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the apt package database. Domain to not audit. System backup scripts Execute backup in the backup domain. Domain allowed access. Execute backup in the backup domain, and allow the specified role the backup domain. The type of the process performing this action. The role to be allowed the backup domain. Policy for the kernel modules, kernel image, and bootloader. Execute bootloader in the bootloader domain. The type of the process performing this action. Execute bootloader in the caller domain. The type of the process performing this action. Execute bootloader interactively and do a domain transition to the bootloader domain. The type of the process performing this action. The role to be allowed the bootloader domain. Read the bootloader configuration file. The type of the process performing this action. Read and write the bootloader configuration file. The type of the process performing this action. Manage the bootloader configuration file. Domain allowed access. Read and write the bootloader temporary data in /tmp. The type of the process performing this action. Read and write the bootloader temporary data in /tmp. The type of the process performing this action. Utilities for configuring the linux ethernet bridge Execute a domain transition to run brctl. Domain allowed to transition. Execute a domain transition to run brctl. Domain allowed to transition. Execute brctl in the brctl domain. Domain allowed to transition. Role allowed access. Digital Certificate Tracking Domain transition to certwatch. Domain allowed access. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. The type of the process performing this action. The role to be allowed the certwatch domain. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. (Deprecated) The type of the process performing this action. The role to be allowed the certwatch domain. The type of the terminal allow the certwatch domain to use. Determine of the console connected to the controlling terminal. Execute consoletype in the consoletype domain. The type of the process performing this action. Execute consoletype in the consoletype domain, and allow the specified role the consoletype domain. The type of the process performing this action. The role to be allowed the consoletype domain. Execute consoletype in the caller domain. The type of the process performing this action. ddcprobe retrieves monitor and graphics card information Execute ddcprobe in the ddcprobe domain. The type of the process performing this action. Execute ddcprobe in the ddcprobe domain, and allow the specified role the ddcprobe domain. The type of the process performing this action. Role to be authenticated for ddcprobe domain. Policy for dmesg. Execute dmesg in the dmesg domain. The type of the process performing this action. Execute dmesg in the caller domain. The type of the process performing this action. Decode DMI data for x86/ia64 bioses. Execute dmidecode in the dmidecode domain. Domain allowed access. Execute dmidecode in the dmidecode domain, and allow the specified role the dmidecode domain. The type of the process performing this action. The role to be allowed the dmidecode domain. Execute dmidecode in the caller domain. Domain allowed access. Policy for the Debian package manager. Execute dpkg programs in the dpkg domain. The type of the process performing this action. Execute dpkg_script programs in the dpkg_script domain. Domain allowed access. Execute dpkg programs in the dpkg domain. The type of the process performing this action. The role to allow the dpkg domain. Inherit and use file descriptors from dpkg. The type of the process performing this action. Read from an unnamed dpkg pipe. The type of the process performing this action. Read and write an unnamed dpkg pipe. The type of the process performing this action. Inherit and use file descriptors from dpkg scripts. The type of the process performing this action. Read the dpkg package database. The type of the process performing this action. Create, read, write, and delete the dpkg package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the dpkg package database. Domain to not audit. Lock the dpkg package database. The type of the process performing this action. Final system configuration run during the first boot after installation of Red Hat/Fedora systems. Execute firstboot in the firstboot domain. The type of the process performing this action. Execute firstboot in the firstboot domain, and allow the specified role the firstboot domain. The type of the process performing this action. The role to be allowed the firstboot domain. Inherit and use a file descriptor from firstboot. The type of the process performing this action. Do not audit attempts to inherit a file descriptor from firstboot. Domain to not audit. Write to a firstboot unnamed pipe. The type of the process performing this action. Read and Write to a firstboot unnamed pipe. The type of the process performing this action. Do not audit attemps to read and write to a firstboot unnamed pipe. Domain to not audit. Do not audit attemps to read and write to a firstboot unix domain stream socket. Domain to not audit. dontaudit read and write an leaked file descriptors Domain to not audit. Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Execute a domain transition to run kismet. Domain allowed to transition. Execute kismet in the kismet domain, and allow the specified role the kismet domain. Domain allowed access The role to be allowed the kismet domain. Read kismet PID files. Domain allowed access. Manage kismet var_run files. Domain allowed access. Search kismet lib directories. Domain allowed access. Read kismet lib files. Domain allowed access. Create, read, write, and delete kismet lib files. Domain allowed access. Manage kismet var_lib files. Domain allowed access. Allow the specified domain to read kismet's log files. Domain allowed access. Allow the specified domain to append kismet log files. Domain allowed to transition. Allow domain to manage kismet log files Domain to not audit. All of the rules required to administrate an kismet environment Domain allowed access. Hardware detection and configuration tools Execute kudzu in the kudzu domain. The type of the process performing this action. Execute kudzu in the kudzu domain, and allow the specified role the kudzu domain. The type of the process performing this action. The role to be allowed the kudzu domain. Get attributes of kudzu executable. The type of the process performing this action. Rotate and archive system logs Execute logrotate in the logrotate domain. The type of the process performing this action. Execute logrotate in the logrotate domain, and allow the specified role the logrotate domain. The type of the process performing this action. The role to be allowed the logrotate domain. Execute logrotate in the caller domain. The type of the process performing this action. Inherit and use logrotate file descriptors. Domain allowed access. Do not audit attempts to inherit logrotate file descriptors. The type of the process to not audit. Read a logrotate temporary files. The type of the process to not audit.

Allow logrotate to manage nfs files

System log analyzer and reporter Read logwatch temporary files. Domain allowed access. Search logwatch cache directory. Domain allowed access. policy for mcelog Execute a domain transition to run mcelog. Domain allowed to transition. Read mcelog logs. Domain allowed access.

Determine whether mcelog can use all the user ttys.

Network traffic graphing Create and append mrtg logs. Domain allowed access. policy for ncftool Execute a domain transition to run ncftool. Domain allowed to transition. Execute ncftool in the ncftool domain, and allow the specified role the ncftool domain. Domain allowed access The role to be allowed the ncftool domain. Role access for ncftool Role allowed access User domain for the role

Allow ncftool to read user content.

Network analysis utilities Execute network utilities in the netutils domain. Domain allowed access. Execute network utilities in the netutils domain, and allow the specified role the netutils domain. Domain allowed access. The role to be allowed the netutils domain. Execute network utilities in the caller domain. Domain allowed access. Send generic signals to network utilities. Domain allowed access. Execute ping in the ping domain. Domain allowed access. Send a kill (SIGKILL) signal to ping. Domain allowed access. Send generic signals to ping. Domain allowed access. Execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed access. The role to be allowed the ping domain. Conditionally execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed access. The role to be allowed the ping domain. Execute ping in the caller domain. Domain allowed access. Execute traceroute in the traceroute domain. Domain allowed access. Execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed access. The role to be allowed the traceroute domain. Conditionally execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed access. The role to be allowed the traceroute domain. Execute traceroute in the caller domain. Domain allowed access.

Control users use of ping and traceroute

No Interfaces Portage Package Management System. The primary package management and distribution system for Gentoo. Execute emerge in the portage domain. Domain allowed access. Execute emerge in the portage domain, and allow the specified role the portage domain. Domain allowed access. The role to allow the portage domain. Template for portage sandbox.

Template for portage sandbox. Portage does all compiling in the sandbox.

Domain Allowed Access
Execute gcc-config in the gcc_config domain. Domain allowed access. Execute gcc-config in the gcc_config domain, and allow the specified role the gcc_config domain. Domain allowed access. The role to allow the gcc_config domain. Do not audit attempts to search the portage temporary directories. Domain allowed access. Do not audit attempts to read and write the portage temporary files. Domain allowed access.
Prelink ELF shared library mappings. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. Execute the prelink program in the current domain. Domain allowed access. Getattr the prelink program in the current domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed access. The role to allow the prelink domain. Make the specified file type prelinkable. File type to be prelinked. Read the prelink cache. Domain allowed access. Delete the prelink cache. Domain allowed access. Create, read, write, and delete prelink log files. Domain allowed access. Create, read, write, and delete prelink var_lib files. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. File system quota management Execute quota management tools in the quota domain. The type of the process performing this action. Execute quota management tools in the quota domain, and allow the specified role the quota domain. The type of the process performing this action. The role to be allowed the quota domain. Do not audit attempts to get the attributes of filesystem quota data files. Domain to not audit. Alow to read of filesystem quota data files. Domain to not audit. Create, read, write, and delete quota flag files. Domain to not audit. Readahead, read files into page cache for improved performance Policy for the RPM package manager. Execute rpm programs in the rpm domain. The type of the process performing this action. Execute debuginfo_install programs in the rpm domain. The type of the process performing this action. Execute rpm_script programs in the rpm_script domain. Domain allowed access. Execute RPM programs in the RPM domain. The type of the process performing this action. The role to allow the RPM domain. Execute the rpm client in the caller domain. Domain allowed access. Inherit and use file descriptors from RPM. The type of the process performing this action. Read from an unnamed RPM pipe. The type of the process performing this action. Read and write an unnamed RPM pipe. The type of the process performing this action. dontaudit read and write an leaked file descriptors The type of the process performing this action. Do not audit attempts to create, read, write, and delete RPM script temporary files. Domain to not audit. Send and receive messages from rpm over dbus. Domain allowed access. dontaudit attempts to Send and receive messages from rpm over dbus. Domain allowed access. Send and receive messages from rpm_script over dbus. Domain allowed access. Allow the specified domain to append to rpm log files. Domain allowed access. Create, read, write, and delete the RPM log. The type of the process performing this action. Search RPM log directory. The type of the process performing this action. Inherit and use file descriptors from RPM scripts. The type of the process performing this action. Create, read, write, and delete RPM script temporary files. Domain allowed access. Allow the specified domain to append to rpm tmp files. Domain allowed access. Create, read, write, and delete RPM temporary files. Domain allowed access. read, RPM script temporary files. Domain allowed access. Read the RPM package database. The type of the process performing this action. Delete the RPM package database. The type of the process performing this action. Create, read, write, and delete the RPM package database. The type of the process performing this action. Do not audit attempts to create, read,the RPM package database. Domain to not audit. Read the RPM cache. The type of the process performing this action. Create, read, write, and delete the RPM package database. The type of the process performing this action. Do not audit attempts to create, read, write, and delete the RPM package database. Domain to not audit. Dontaudit search the RPM package database. Domain allowed access. Read rpm pid files. Domain allowed access. Create, read, write, and delete rpm pid files. Domain allowed access. Create files in /var/run with the rpm pid file type. Domain allowed access. Allow application to transition to rpm_script domain. Domain allowed access. Send a null signal to rpm. Domain allowed access. Send a null signal to rpm. Domain allowed access. Sectool security audit tool Shoreline Firewall high-level tool for configuring netfilter Execute a domain transition to run shorewall. Domain allowed to transition. Execute a domain transition to run shorewall. Domain allowed to transition. Read shorewall etc configuration files. Domain allowed access. Read shorewall /var/lib files. Domain allowed access. Read and write shorewall /var/lib files. Domain allowed access. Read shorewall tmp files. Domain allowed access. All of the rules required to administrate an shorewall environment Domain allowed access. The role to be allowed to manage the syslog domain. policy for shutdown Execute a domain transition to run shutdown. Domain allowed to transition. Execute shutdown in the shutdown domain, and allow the specified role the shutdown domain. Domain allowed access The role to be allowed the shutdown domain. Role access for shutdown Role allowed access User domain for the role Recieve sigchld from shutdown Domain allowed access Send and receive messages from shutdown over dbus. Domain allowed access. Get attributes of shutdown executable. Domain allowed access. The Fedora hardware profiler client Run shells with substitute user and group Execute su in the caller domain. Domain allowed access. Execute a command with a substitute user Send a SIGCHLD signal to the sudo domain. Domain allowed access. Allow execute sudo in called domain. This interfaces is added for nova-stack policy. Domain allowed access. Allow to manage sudo database in called domain. Domain allowed access. SUID/SGID program monitoring Allow the specified domain to read sxid log files. Domain allowed access. Manage temporary directory sizes and file ages Execute tmpreaper in the caller domain. The type of the process performing this action.

Determine whether tmpreaper can use nfs file systems.

Determine whether tmpreaper can use samba_share files

Tripwire file integrity checker.

Tripwire file integrity checker.

NOTE: Tripwire creates temp file in its current working directory. This policy does not allow write access to home directories, so users will need to either cd to a directory where they have write permission, or set the TEMPDIRECTORY variable in the tripwire config file. The latter is preferable, as then the file_type_auto_trans rules will kick in and label the files as private to tripwire.

Execute tripwire in the tripwire domain. Domain allowed access. Execute tripwire in the tripwire domain, and allow the specified role the tripwire domain. Domain allowed access. The role to be allowed the tripwire domain. Execute twadmin in the twadmin domain. Domain allowed access. Execute twadmin in the twadmin domain, and allow the specified role the twadmin domain. Domain allowed access. The role to be allowed the twadmin domain. Execute twprint in the twprint domain. Domain allowed access. Execute twprint in the twprint domain, and allow the specified role the twprint domain. Domain allowed access. The role to be allowed the twprint domain. Execute siggen in the siggen domain. Domain allowed access. Execute siggen in the siggen domain, and allow the specified role the siggen domain. Domain allowed access. The role to be allowed the siggen domain.
Time zone updater Execute a domain transition to run tzdata. Domain allowed to transition. Execute the tzdata program in the tzdata domain. Domain allowed access. The role to allow the tzdata domain. Red Hat utility to change /etc/fstab. Execute updfstab in the updfstab domain. The type of the process performing this action. List kernel modules of USB devices Execute usbmodules in the usbmodules domain. Domain allowed access. Execute usbmodules in the usbmodules domain, and allow the specified role the usbmodules domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the usbmodules domain. Policy for managing user accounts. Execute chfn in the chfn domain. The type of the process performing this action. Execute chfn in the chfn domain, and allow the specified role the chfn domain. The type of the process performing this action. The role to be allowed the chfn domain. Execute groupadd in the groupadd domain. The type of the process performing this action. Check access to the groupadd executable. Domain allowed access. Execute groupadd in the groupadd domain, and allow the specified role the groupadd domain. The type of the process performing this action. The role to be allowed the groupadd domain. Execute passwd in the passwd domain. The type of the process performing this action. Send sigkills to passwd. Domain allowed access. Execute passwd in the passwd domain, and allow the specified role the passwd domain. The type of the process performing this action. The role to be allowed the passwd domain. Check access to the passwd executable Domain allowed access. Execute password admin functions in the admin passwd domain. Domain allowed access. Execute passwd admin functions in the admin passwd domain, and allow the specified role the admin passwd domain. The type of the process performing this action. The role to be allowed the admin passwd domain. Dontaudit attempts to use useradd fds The type of the process performing this action. Execute useradd in the useradd domain. The type of the process performing this action. Execute useradd in the useradd domain, and allow the specified role the useradd domain. The type of the process performing this action. The role to be allowed the useradd domain. Check access to the useradd executable. Domain allowed access. Read the crack database. The type of the process performing this action. run real-mode video BIOS code to alter hardware state Execute vbetool application in the vbetool domain. Domain allowed access. Execute vbetool in the vbetool domain, and allow the specified role the vbetool domain. Domain allowed access. The role to be allowed the vbetool domain.

Ignore vbetool mmap_zero errors.

Virtual Private Networking client Execute VPN clients in the vpnc domain. Domain allowed access. Execute VPN clients in the vpnc domain, and allow the specified role the vpnc domain. Domain allowed access. The role to be allowed the vpnc domain. Send VPN clients the kill signal. Domain allowed access. Send generic signals to VPN clients. Domain allowed access. Send signull to VPN clients. Domain allowed access. Send and receive messages from Vpnc over dbus. Domain allowed access. Relabelfrom from vpnc socket. Domain allowed access.
Policy modules for applications GNAT Ada95 compiler Execute the ada program in the ada domain. Domain allowed access. Execute ada in the ada domain, and allow the specified role the ada domain. Domain allowed access. The role to be allowed the ada domain. Tool for non-root processes to bind to reserved ports Use authbind to bind to a reserved port. Domain allowed access. AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. Read and write awstats unnamed pipes. Domain allowed access. Execute awstats cgi scripts in the caller domain. Domain allowed access.

Determine whether awstats can purge httpd log files.

Squid log analysis Allow domain to read calamaris www files. Domain allowed access. Policy for cdrecord Role access for cdrecord Role allowed access User domain for the role

Allow cdrecord to read various content. nfs, samba, removable devices, user temp and untrusted content files

policy for chrome Execute a domain transition to run chrome_sandbox. Domain allowed to transition. Execute chrome_sandbox in the chrome_sandbox domain, and allow the specified role the chrome_sandbox domain. Domain allowed access The role to be allowed the chrome_sandbox domain. Role access for chrome sandbox Role allowed access User domain for the role Role access for chrome sandbox Role allowed access User domain for the role Dontaudit read/write to a chrome_sandbox leaks Domain to not audit. Command-line CPU frequency settings. Ethereal packet capture tool. Role access for ethereal Role allowed access User domain for the role Run ethereal in ethereal domain. Domain allowed access. Run tethereal in the tethereal domain. Domain allowed access. Execute tethereal in the tethereal domain, and allow the specified role the tethereal domain. Domain allowed access. The role to be allowed the tethereal domain. Evolution email client Role access for evolution Role allowed access User domain for the role Create objects in users evolution home folders. Domain allowed access. Private file type. The object class of the object being created. Connect to evolution unix stream socket. Domain allowed access. Send and receive messages from evolution over dbus. Domain allowed access. Send and receive messages from evolution_alarm over dbus. Domain allowed access. execmem domain Execute the execmem program in the execmem domain. Domain allowed access. Execute a execmem_exec file in the specified domain. Domain allowed access. The type of the new process. Execmod the execmem_exec applications Domain allowed access. policy for firewallgui Send and receive messages from firewallgui over dbus. Domain allowed access. Games Role access for games Role allowed access User domain for the role Allow the specified domain to read/write games data. Domain allowed access. giFT peer to peer file sharing tool Role access for gift Role allowed access User domain for the role Tools for managing and hosting git repositories. Execute a domain transition to run gitosis. Domain allowed to transition. Execute gitosis-serve in the gitosis domain, and allow the specified role the gitosis domain. Domain allowed access Role allowed access. Allow the specified domain to read gitosis lib files. Domain allowed access. Allow the specified domain to manage gitosis lib files. Domain allowed access. GNU network object model environment (GNOME) Role access for gnome Role allowed access User domain for the role gconf connection template. The type of the user domain. Run gconfd in gconfd domain. Domain allowed access. Dontaudit search gnome homedir content (.config) The type of the user domain. manage gnome homedir content (.config) The type of the user domain. Send general signals to all gconf domains. Domain allowed access. Create objects in a Gnome cache home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Read generic cache home files (.cache) Domain allowed access. Set attributes of cache home dir (.cache) Domain allowed access. write to generic cache home files (.cache) Domain allowed access. Set attributes of Gnome config dirs. Domain allowed access. Create objects in a Gnome gconf home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Read generic data home files. Domain allowed access. Create gconf_home_t objects in the /root directory Domain allowed access. The class of the object to be created. Manage gconf config files Domain allowed access. Execute gconf programs in in the caller domain. Domain allowed access. Read gconf home files Domain allowed access. search gconf homedir (.local) The type of the domain. Append gconf home files Domain allowed access. manage gconf home files Domain allowed access. Connect to gnome over an unix stream socket. Domain allowed access. The type of the user domain. Read/Write all inherited gnome home config Domain allowed access. read gnome homedir content (.config) Domain allowed access. Send and receive messages from gconf system service over dbus. Domain allowed access. Policy for GNU Privacy Guard and related programs. Role access for gpg Role allowed access User domain for the role Transition to a user gpg domain. Domain allowed access. Transition to a gpg web domain. Domain allowed access. Make gpg an entrypoint for the specified domain. The domain for which cifs_t is an entrypoint. Send generic signals to user gpg processes. Domain allowed access. Read and write GPG named pipes. Domain allowed access. Send messages to and from GPG Pinentry over DBUS. Domain allowed access. List Gnu Privacy Guard user content dirs. Domain allowed access.

Allow usage of the gpg-agent --write-env-file option. This also allows gpg-agent to manage user files.

Allow gpg web domain to modify public files used for public file transfer services.

IRC client policy Role access for IRC Role allowed access User domain for the role

Allow the Irssi IRC Client to connect to any port, and to bind to any unreserved port.

Java virtual machine Role access for java Role allowed access User domain for the role Execute java in the java domain, and allow the specified role the java domain. The type of the process performing this action. The role to be allowed the java domain. Execute the java program in the unconfined java domain. Domain allowed access. Execute the java program in the unconfined java domain. Domain allowed access. Role allowed access. Allow read and write access to unconfined java shared memory. Domain allowed access. Execute the java program in the java domain. Domain allowed access.

Allow java executable stack

system-config-kdump policy

Allow s-c-kdump to run bootloader in bootloader_t.

policy for livecd Execute a domain transition to run livecd. Domain allowed to transition. Execute livecd in the livecd domain, and allow the specified role the livecd domain. Domain allowed access The role to be allowed the livecd domain. Dontaudit read/write to a livecd leaks Domain allowed access. Read livecd temporary files. Domain allowed access. Read and write livecd temporary files. Domain allowed access. Allow read and write access to livecd semaphores. Domain allowed access. Load keyboard mappings. Execute the loadkeys program in the loadkeys domain. The type of the process performing this action. Execute the loadkeys program in the loadkeys domain. The type of the process performing this action. The role to allow the loadkeys domain. Execute the loadkeys program in the caller domain. The type of the process performing this action. device locking policy for lockdev Role access for lockdev Role allowed access User domain for the role Mediawiki policy Allow the specified domain to read mediawiki tmp files. Domain allowed access. Delete mediawiki tmp files. Domain allowed access. Run .NET server and client applications on Linux. Execute the mono program in the mono domain. Domain allowed access. Execute mono in the mono domain, and allow the specified role the mono domain. The type of the process performing this action. The role to be allowed the mono domain. Execute the mono program in the caller domain. Domain allowed access. Read and write to mono shared memory. The type of the process performing this action. Policy for Mozilla and related web browsers Role access for mozilla Role allowed access User domain for the role Read mozilla home directory content Domain allowed access. Write mozilla home directory content Domain allowed access. Dontaudit attempts to read/write mozilla home directory content Domain allowed access. Dontaudit attempts to write mozilla home directory content Domain allowed access. Run mozilla in the mozilla domain. Domain allowed access. Send and receive messages from mozilla over dbus. Domain allowed access. Write mozilla home directory content Domain allowed access. Execute mozilla_exec_t in the specified domain.

Execute a mozilla_exec_t in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the new process.
Execute a domain transition to run mozilla_plugin. Domain allowed access. Execute mozilla_plugin in the mozilla_plugin domain, and allow the specified role the mozilla_plugin domain. Domain allowed access The role to be allowed the mozilla_plugin domain. Execute qemu unconfined programs in the role. The role to allow the mozilla_plugin domain. read/write mozilla per user tcp_socket Domain allowed access. Read mozilla_plugin tmpfs files Domain allowed access Delete mozilla_plugin tmpfs files Domain allowed access Dontaudit read/write to a mozilla_plugin leaks Domain to not audit. Execute mozilla home directory content. Domain allowed access.

Control mozilla content access

Mplayer media player and encoder Role access for mplayer Role allowed access User domain for the role Run mplayer in mplayer domain. Domain allowed access. Execute mplayer in the caller domain. Domain allowed access. Read mplayer per user homedir Domain allowed access. Execute mplayer_exec_t in the specified domain.

Execute a mplayer_exec_t in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the new process.

Allow mplayer executable stack

policy for namespace Execute a domain transition to run namespace_init. Domain allowed access. Execute namespace_init in the namespace_init domain, and allow the specified role the namespace_init domain. Domain allowed access The role to be allowed the namespace_init domain. policy for nsplugin Create, read, write, and delete nsplugin rw files. Domain allowed access. Manage nsplugin rw files. Domain allowed access. The per role template for the nsplugin module.

This template creates a derived domains which are used for nsplugin web browser.

This template is invoked automatically for each user, and generally does not need to be invoked directly by policy writers.

The role associated with the user domain. The type of the user domain.
Role access for nsplugin The role associated with the user domain. The type of the user domain. The per role template for the nsplugin module. The type of the user domain. The per role template for the nsplugin module. The type of the user domain. Search nsplugin rw directories. Domain allowed access. Read nsplugin rw files. Domain allowed access. Read nsplugin home files. Domain allowed access. Exec nsplugin rw files. Domain allowed access. Create, read, write, and delete nsplugin home files. Domain allowed access. manage nnsplugin home dirs. Domain allowed access. Allow attempts to read and write to nsplugin named pipes. Domain to not audit. Read and write to nsplugin shared memory. The type of the process performing this action. Allow read and write access to nsplugin semaphores. Domain allowed access. Execute nsplugin_exec_t in the specified domain.

Execute a nsplugin_exec_t in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the new process.
Create objects in a user home directory with an automatic type transition to the nsplugin home file type. Domain allowed access. The class of the object to be created. Create objects in a user home directory with an automatic type transition to the nsplugin home file type. Domain allowed access. The class of the object to be created. Send signull signal to nsplugin processes. Domain allowed access. Send generic signals to user nsplugin processes. Domain allowed access.

Allow nsplugin code to execmem/execstack

Allow nsplugin code to connect to unreserved ports

Openoffice The per role template for the openoffice module. The type of the user domain. role for openoffice

This template creates a derived domains which are used for java applications.

The prefix of the user domain (e.g., user is the prefix for user_t). The role associated with the user domain. The type of the user domain.
Execute openoffice_exec_t in the specified domain.

Execute a openoffice_exec_t in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the new process.
Podsleuth is a tool to get information about an Apple (TM) iPod (TM) Execute a domain transition to run podsleuth. Domain allowed to transition. Execute podsleuth in the podsleuth domain, and allow the specified role the podsleuth domain. Domain allowed access The role to be allowed the podsleuth domain. helper function for grantpt(3), changes ownship and permissions of pseudotty Execute a domain transition to run ptchown. Domain allowed to transition. Execute ptchown in the ptchown domain, and allow the specified role the ptchown domain. Domain allowed access. The role to be allowed the ptchown domain. Pulseaudio network sound server. Role access for pulseaudio Role allowed access User domain for the role Execute a domain transition to run pulseaudio. Domain allowed to transition. Execute pulseaudio in the pulseaudio domain, and allow the specified role the pulseaudio domain. Domain allowed access. The role to be allowed the pulseaudio domain. Execute a pulseaudio in the current domain. Domain allowed to transition. dontaudit attempts to execute a pulseaudio in the current domain. Domain allowed to transition. Connect to pulseaudio over a unix domain stream socket. Domain allowed access. Send and receive messages from pulseaudio over dbus. Domain allowed access. Set the attributes of the pulseaudio homedir. Domain allowed access. Read pulseaudio homedir files. Domain allowed access. Read and write Pulse Audio files. Domain allowed access. Create, read, write, and delete pulseaudio home directory files. Domain allowed access. Send signull signal to pulseaudio processes. Domain allowed access. Create, read, write, and delete pulseaudio home directory symlinks. Domain allowed access. QEMU machine emulator and virtualizer Execute a domain transition to run qemu. Domain allowed to transition. Execute a qemu in the callers domain Domain allowed access. Execute qemu in the qemu domain. Domain allowed to transition. The role to allow the qemu domain. Allow the domain to read state files in /proc. Domain to allow access. Set the schedule on qemu. Domain allowed access. Send a signal to qemu. Domain allowed access. Send a sigill to qemu Domain allowed access. Execute qemu_exec_t in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon().

Execute qemu_exec_t in the specified domain. This allows the specified domain to qemu programs on these filesystems in the specified domain.

Domain allowed access. The type of the new process.
Manage qemu temporary dirs. Domain allowed access. Manage qemu temporary files. Domain allowed access. Make qemu_exec_t an entrypoint for the specified domain. The domain for which qemu_exec_t is an entrypoint.

Allow qemu to connect fully to the network

Allow qemu to use cifs/Samba file systems

Allow qemu to user serial/parallel communication ports

Allow qemu to use nfs file systems

Allow qemu to use usb devices

Restricted (scp/sftp) only shell Role access for rssh Role allowed access User domain for the role Transition to all user rssh domains. Domain allowed access. Execute the rssh program in the caller domain. Domain allowed access. Read all users rssh read-only content. Domain allowed access. system-config-samba policy policy for sandbox Execute sandbox in the sandbox domain, and allow the specified role the sandbox domain. Domain allowed access The role to be allowed the sandbox domain. allow domain to read, write sandbox_xserver tmp files Domain allowed access allow domain to read sandbox tmpfs files Domain allowed access allow domain to manage sandbox tmpfs files Domain allowed access Delete sandbox files Domain allowed access Delete sandbox sock files Domain allowed access Allow domain to set the attributes of the sandbox directory. Domain allowed access allow domain to delete sandbox files Domain allowed access allow domain to list sandbox dirs Domain allowed access Read and write a sandbox domain pty. Domain allowed access. GNU terminal multiplexer Execute the rssh program in the caller domain. Domain allowed access. Filesystem namespacing/polyinstantiation application. The role template for the seunshare module. The prefix of the user role (e.g., user is the prefix for user_r). Role allowed access. User domain for the role. Update database for mlocate Create the locate log with append mode. Domain allowed access. Read locate lib files. Domain allowed access. Telepathy framework. Send DBus messages to and from all Telepathy domain. Domain allowed access. Send DBus messages to and from Telepathy Gabble. Domain allowed access. Stream connect to Telepathy Gabble Domain allowed access. Stream connect to telepathy MSN managers Domain allowed access. Stream connect to Telepathy Salut Domain allowed access.

Allow the Telepathy connection managers to connect to any generic TCP port.

Thunderbird email client Role access for thunderbird Role allowed access User domain for the role Run thunderbird in the user thunderbird domain. Domain allowed access. tvtime - a high quality television application Role access for tvtime Role allowed access User domain for the role Policy for UML Role access for uml Role allowed access User domain for the role Set attributes on uml utility socket files. Domain allowed access. Manage uml utility files. Domain allowed access. SELinux utility to run a shell with a new role Search the userhelper configuration directory. Domain allowed access. Do not audit attempts to search the userhelper configuration directory. Domain to not audit. Allow domain to use userhelper file descriptor. Domain allowed access. Allow domain to send sigchld to userhelper. Domain allowed access. Execute the userhelper program in the caller domain. The type of the process performing this action. User network interface configuration helper Execute usernetctl in the usernetctl domain. Domain allowed access. Execute usernetctl in the usernetctl domain, and allow the specified role the usernetctl domain. Domain allowed access. The role to be allowed the usernetctl domain. VMWare Workstation virtual machines Role access for vmware Role allowed access User domain for the role Read VMWare system configuration files. Domain allowed access. Append to VMWare system configuration files. Domain allowed access. Append to VMWare log files. Domain allowed access. Execute vmware host executables Domain allowed access. Web server log analysis Execute webalizer in the webalizer domain. The type of the process performing this action. Execute webalizer in the webalizer domain, and allow the specified role the webalizer domain. The type of the process performing this action. The role to be allowed the webalizer domain. Wine Is Not an Emulator. Run Windows programs in Linux. Execute the wine program in the wine domain. Domain allowed access. Execute wine in the wine domain, and allow the specified role the wine domain. The type of the process performing this action. The role to be allowed the wine domain.

Ignore wine mmap_zero errors

Wireshark packet capture tool. Role access for wireshark Role allowed access User domain for the role Run wireshark in wireshark domain. Domain allowed access. X Window Managers Execute the wm program in the wm domain. Domain allowed access. X Screensaver Role access for xscreensaver Role allowed access User domain for the role Yum/Apt Mirroring Execute yam in the yam domain. Domain allowed access. Execute yam in the yam domain, and allow the specified role the yam domain. Domain allowed access. The role to be allowed the yam domain. Read yam content. Domain allowed access.
Policy modules for kernel resources. Core policy for shells, and generic programs in /bin, /sbin, /usr/bin, and /usr/sbin. Contains the base bin and sbin directory types which need to be searched for the kernel to run init. Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. Type to be used for files. Create a aliased type to generic bin files. (Deprecated)

Create a aliased type to generic bin files. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

Alias type for bin_t.
Make general progams in bin an entrypoint for the specified domain. The domain for which bin_t is an entrypoint. Make general progams in sbin an entrypoint for the specified domain. (Deprecated) The domain for which sbin programs are an entrypoint. Make the shell an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Search the contents of bin directories. Domain allowed access. Do not audit attempts to search the contents of bin directories. Domain allowed access. List the contents of bin directories. Domain allowed access. Do not auidt attempts to write bin directories. Domain allowed access. Do not audit attempts to write bin files. Domain to not audit. Get the attributes of files in bin directories. Domain allowed access. Get the attributes of files in bin directories. Domain allowed access. Read files in bin directories. Domain allowed access. Read symbolic links in bin directories. Domain allowed access. Read pipes in bin directories. Domain allowed access. Read named sockets in bin directories. Domain allowed access. Execute generic programs in bin directories, in the caller domain.

Allow the specified domain to execute generic programs in system bin directories (/bin, /sbin, /usr/bin, /usr/sbin) a without domain transition.

Typically, this interface should be used when the domain executes general system progams within the privileges of the source domain. Some examples of these programs are ls, cp, sed, python, and tar. This does not include shells, such as bash.

Related interface:

  • corecmd_exec_shell()
Domain allowed access.
Create, read, write, and delete bin files. Domain allowed access. Relabel to and from the bin type. Domain allowed access. Mmap a bin file as executable. Domain allowed access. Execute a file in a bin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon().

Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the userhelper policy.

Domain allowed access. The type of the new process.
Execute a file in a bin directory in the specified domain.

Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the ssh-agent policy.

Domain allowed access. The type of the new process.
Search the contents of sbin directories. (Deprecated) Domain allowed access. Do not audit attempts to search sbin directories. (Deprecated) Domain to not audit. List the contents of sbin directories. (Deprecated) Domain allowed access. Do not audit attempts to write sbin directories. (Deprecated) Domain to not audit. Get the attributes of sbin files. (Deprecated) Domain allowed access. Do not audit attempts to get the attibutes of sbin files. (Deprecated) Domain to not audit. Read files in sbin directories. (Deprecated) Domain allowed access. Read symbolic links in sbin directories. (Deprecated) Domain allowed access. Read named pipes in sbin directories. (Deprecated) Domain allowed access. Read named sockets in sbin directories. (Deprecated) Domain allowed access. Execute generic programs in sbin directories, in the caller domain. (Deprecated) Domain allowed access. Create, read, write, and delete sbin files. (Deprecated) Domain allowed access. Relabel to and from the sbin type. (Deprecated) Domain allowed access. Mmap a sbin file as executable. (Deprecated) Domain allowed access. Execute a file in a sbin directory in the specified domain. (Deprecated)

Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated)

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the ssh-agent policy.

Domain allowed access. The type of the new process.
Execute a file in a sbin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon(). (Deprecated)

Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated)

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the userhelper policy.

Domain allowed access. The type of the new process.
Check if a shell is executable (DAC-wise). Domain allowed access. Execute shells in the caller domain.

Allow the specified domain to execute shells without a domain transition.

Typically, this interface should be used when the domain executes shells within the privileges of the source domain. Some examples of these programs are bash, tcsh, and zsh.

Related interface:

  • corecmd_exec_bin()
Domain allowed access.
Execute ls in the caller domain. (Deprecated) Domain allowed access. Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the shell process.
Execute a shell in the specified domain.

Execute a shell in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the shell process.
Execute chroot in the caller domain. Domain allowed access. Get the attributes of all executable files. Domain allowed access. Read all executable files. Domain allowed access. Execute all executable files. Domain allowed access. Do not audit attempts to execute all executables. Domain allowed access. Create, read, write, and all executable files. Domain allowed access. Relabel to and from the bin type. Domain allowed access. Mmap all executables as executable. Domain allowed access.
Policy controlling access to network objects Contains the initial SIDs for network objects. Define type to be a network packet type

Define type to be a network packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network packet.
Define type to be a network port type

Define type to be a network port type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define network type to be a reserved port (lt 1024)

Define network type to be a reserved port (lt 1024)

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define network type to be a rpc port ( 512 lt PORT lt 1024)

Define network type to be a rpc port ( 512 lt PORT lt 1024)

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define type to be a network client packet type

Define type to be a network client packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network client packet.
Define type to be a network server packet type

Define type to be a network server packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network server packet.
Send and receive TCP network traffic on generic interfaces.

Allow the specified domain to send and receive TCP network traffic on generic network interfaces.

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_connect_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send and receive TCP network traffic on loopback interface. The type of the process performing this action. Send UDP network traffic on generic interfaces. The type of the process performing this action. Dontaudit attempts to send UDP network traffic on generic interfaces. Domain to not audit. Receive UDP network traffic on generic interfaces. The type of the process performing this action. Do not audit attempts to receive UDP network traffic on generic interfaces. Domain to not audit. Send and receive UDP network traffic on generic interfaces.

Allow the specified domain to send and receive UDP network traffic on generic network interfaces.

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_node()
  • corenet_udp_sendrecv_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Do not audit attempts to send and receive UDP network traffic on generic interfaces. Domain to not audit. Send raw IP packets on generic interfaces. The type of the process performing this action. Receive raw IP packets on generic interfaces. The type of the process performing this action. Send and receive raw IP packets on generic interfaces. The type of the process performing this action. Allow outgoing network traffic on the generic interfaces. The peer label of the outgoing network traffic. Allow incoming traffic on the generic interfaces. The peer label of the incoming network traffic. Allow incoming and outgoing network traffic on the generic interfaces. The peer label of the network traffic. Send and receive TCP network traffic on all interfaces. The type of the process performing this action. Send UDP network traffic on all interfaces. The type of the process performing this action. Receive UDP network traffic on all interfaces. The type of the process performing this action. Send and receive UDP network traffic on all interfaces. The type of the process performing this action. Send raw IP packets on all interfaces. The type of the process performing this action. Receive raw IP packets on all interfaces. The type of the process performing this action. Send and receive raw IP packets on all interfaces. The type of the process performing this action. Send and receive TCP network traffic on generic nodes.

Allow the specified domain to send and receive TCP network traffic to/from generic network nodes (hostnames/networks).

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_connect_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send UDP network traffic on generic nodes. The type of the process performing this action. Receive UDP network traffic on generic nodes. The type of the process performing this action. Send and receive UDP network traffic on generic nodes.

Allow the specified domain to send and receive UDP network traffic to/from generic network nodes (hostnames/networks).

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_if()
  • corenet_udp_sendrecv_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send raw IP packets on generic nodes. The type of the process performing this action. Receive raw IP packets on generic nodes. The type of the process performing this action. Send and receive raw IP packets on generic nodes. The type of the process performing this action. Bind TCP sockets to generic nodes.

Bind TCP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections.

Related interface:

  • corenet_udp_bind_generic_node()
Domain allowed access.
Bind UDP sockets to generic nodes.

Bind UDP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections.

Related interface:

  • corenet_tcp_bind_generic_node()
Domain allowed access.
Bind raw sockets to genric nodes. The type of the process performing this action. Allow outgoing network traffic to generic nodes. The peer label of the outgoing network traffic. Allow incoming network traffic from generic nodes. The peer label of the incoming network traffic. Allow incoming and outgoing network traffic with generic nodes. The peer label of the network traffic. Send and receive TCP network traffic on all nodes. The type of the process performing this action. Send UDP network traffic on all nodes. The type of the process performing this action. Do not audit attempts to send UDP network traffic on any nodes. Domain to not audit. Receive UDP network traffic on all nodes. The type of the process performing this action. Do not audit attempts to receive UDP network traffic on all nodes. Domain to not audit. Send and receive UDP network traffic on all nodes. The type of the process performing this action. Do not audit attempts to send and receive UDP network traffic on any nodes nodes. Domain to not audit. Send raw IP packets on all nodes. The type of the process performing this action. Receive raw IP packets on all nodes. The type of the process performing this action. Send and receive raw IP packets on all nodes. The type of the process performing this action. Bind TCP sockets to all nodes. The type of the process performing this action. Bind UDP sockets to all nodes. The type of the process performing this action. Bind raw sockets to all nodes. The type of the process performing this action. Send and receive TCP network traffic on generic ports. The type of the process performing this action. Do not audit send and receive TCP network traffic on generic ports. The type of the process performing this action. Send UDP network traffic on generic ports. The type of the process performing this action. Receive UDP network traffic on generic ports. The type of the process performing this action. Send and receive UDP network traffic on generic ports. The type of the process performing this action. Bind TCP sockets to generic ports. The type of the process performing this action. Do not audit bind TCP sockets to generic ports. Domain to not audit. Bind UDP sockets to generic ports. The type of the process performing this action. Connect TCP sockets to generic ports. The type of the process performing this action. Send and receive TCP network traffic on all ports.

Send and receive TCP network traffic on all ports. Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_connect_all_ports()
  • corenet_tcp_bind_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send UDP network traffic on all ports. The type of the process performing this action. Receive UDP network traffic on all ports. The type of the process performing this action. Send and receive UDP network traffic on all ports.

Send and receive UDP network traffic on all ports. Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_if()
  • corenet_udp_sendrecv_generic_node()
  • corenet_udp_bind_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Bind TCP sockets to all ports. The type of the process performing this action. Do not audit attepts to bind TCP sockets to any ports. Domain to not audit. Bind UDP sockets to all ports. The type of the process performing this action. Do not audit attepts to bind UDP sockets to any ports. Domain to not audit. Connect TCP sockets to all ports.

Connect TCP sockets to all ports

Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_bind_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Do not audit attempts to connect TCP sockets to all ports. Domain to not audit. Send and receive TCP network traffic on generic reserved ports. The type of the process performing this action. Send UDP network traffic on generic reserved ports. The type of the process performing this action. Receive UDP network traffic on generic reserved ports. The type of the process performing this action. Send and receive UDP network traffic on generic reserved ports. The type of the process performing this action. Bind TCP sockets to generic reserved ports. The type of the process performing this action. Bind UDP sockets to generic reserved ports. The type of the process performing this action. Connect TCP sockets to generic reserved ports. The type of the process performing this action. Send and receive TCP network traffic on all reserved ports. The type of the process performing this action. Send UDP network traffic on all reserved ports. The type of the process performing this action. Receive UDP network traffic on all reserved ports. The type of the process performing this action. Send and receive UDP network traffic on all reserved ports. The type of the process performing this action. Bind TCP sockets to all reserved ports. The type of the process performing this action. Do not audit attempts to bind TCP sockets to all reserved ports. The type of the process to not audit. Bind UDP sockets to all reserved ports. The type of the process performing this action. Do not audit attempts to bind UDP sockets to all reserved ports. The type of the process to not audit. Bind TCP sockets to all ports > 1024. The type of the process performing this action. Bind UDP sockets to all ports > 1024. The type of the process performing this action. Connect TCP sockets to reserved ports. The type of the process performing this action. Connect TCP sockets to all ports > 1024. The type of the process performing this action. Do not audit attempts to connect TCP sockets all reserved ports. Domain to not audit. Connect TCP sockets to rpc ports. The type of the process performing this action. Do not audit attempts to connect TCP sockets all rpc ports. Domain to not audit. Read and write the TUN/TAP virtual network device. The domain allowed access. Do not audit attempts to read or write the TUN/TAP virtual network device. Domain to not audit. Getattr the point-to-point device. The domain allowed access. Read and write the point-to-point device. The domain allowed access. Bind TCP sockets to all RPC ports. The type of the process performing this action. Do not audit attempts to bind TCP sockets to all RPC ports. The type of the process to not audit. Bind UDP sockets to all RPC ports. The type of the process performing this action. Do not audit attempts to bind UDP sockets to all RPC ports. The type of the process to not audit. Send and receive messages on a non-encrypted (no IPSEC) network session.

Send and receive messages on a non-encrypted (no IPSEC) network session. (Deprecated)

The corenet_all_recvfrom_unlabeled() interface should be used instead of this one.

Domain allowed access.
Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session.

Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session.

The corenet_dontaudit_all_recvfrom_unlabeled() interface should be used instead of this one.

Domain to not audit.
Receive TCP packets from a NetLabel connection. Domain allowed access. Receive TCP packets from a NetLabel connection. Domain allowed access. Receive TCP packets from an unlabled connection. Domain allowed access. Do not audit attempts to receive TCP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive TCP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive TCP packets from an unlabeled connection. Domain to not audit. Receive UDP packets from a NetLabel connection. Domain allowed access. Receive UDP packets from a NetLabel connection. Domain allowed access. Receive UDP packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive UDP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive UDP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive UDP packets from an unlabeled connection. Domain to not audit. Receive Raw IP packets from a NetLabel connection. Domain allowed access. Receive Raw IP packets from a NetLabel connection. Domain allowed access. Receive Raw IP packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive Raw IP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive Raw IP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive Raw IP packets from an unlabeled connection. Domain to not audit. Receive packets from an unlabeled connection.

Allow the specified domain to receive packets from an unlabeled connection. On machines that do not utilize labeled networking, this will be required on all networking domains. On machines tha do utilize labeled networking, this will be required for any networking domain that is allowed to receive network traffic that does not have a label.

Domain allowed access.
Receive packets from a NetLabel connection.

Allow the specified domain to receive NetLabel network traffic, which utilizes the Commercial IP Security Option (CIPSO) to set the MLS level of the network packets. This is required for all networking domains that receive NetLabel network traffic.

Domain allowed access.
Enable unlabeled net packets

Allow unlabeled_packet_t to be used by all domains that use the network

Domain allowed access.
Do not audit attempts to receive packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive packets from a NetLabel connection. Domain to not audit. Rules for receiving labeled TCP packets.

Rules for receiving labeled TCP packets.

Due to the nature of TCP, this is bidirectional.

Domain allowed access. Peer domain.
Rules for receiving labeled UDP packets. Domain allowed access. Peer domain. Rules for receiving labeled raw IP packets. Domain allowed access. Peer domain. Rules for receiving labeled packets via TCP, UDP and raw IP.

Rules for receiving labeled packets via TCP, UDP and raw IP.

Due to the nature of TCP, the rules (for TCP networking only) are bidirectional.

Domain allowed access. Peer domain.
Send generic client packets. Domain allowed access. Receive generic client packets. Domain allowed access. Send and receive generic client packets. Domain allowed access. Relabel packets to the generic client packet type. Domain allowed access. Send generic server packets. Domain allowed access. Receive generic server packets. Domain allowed access. Send and receive generic server packets. Domain allowed access. Relabel packets to the generic server packet type. Domain allowed access. Send and receive unlabeled packets.

Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules.

Domain allowed access.
Send all client packets. Domain allowed access. Receive all client packets. Domain allowed access. Send and receive all client packets. Domain allowed access. Relabel packets to any client packet type. Domain allowed access. Send all server packets. Domain allowed access. Receive all server packets. Domain allowed access. Send and receive all server packets. Domain allowed access. Relabel packets to any server packet type. Domain allowed access. Send all packets. Domain allowed access. Receive all packets. Domain allowed access. Send and receive all packets. Domain allowed access. Relabel packets to any packet type. Domain allowed access. Unconfined access to network objects. The domain allowed access. Send and receive TCP traffic on the afs_bos port. Domain allowed access. Send UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_bos port. Domain to not audit. Receive UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_bos port. Domain to not audit. Send and receive UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_bos port. Domain to not audit. Bind TCP sockets to the afs_bos port. Domain allowed access. Bind UDP sockets to the afs_bos port. Domain allowed access. Make a TCP connection to the afs_bos port. Domain allowed access. Send afs_bos_client packets. Domain allowed access. Do not audit attempts to send afs_bos_client packets. Domain to not audit. Receive afs_bos_client packets. Domain allowed access. Do not audit attempts to receive afs_bos_client packets. Domain allowed access. Send and receive afs_bos_client packets. Domain allowed access. Do not audit attempts to send and receive afs_bos_client packets. Domain to not audit. Relabel packets to afs_bos_client the packet type. Domain allowed access. Send afs_bos_server packets. Domain allowed access. Do not audit attempts to send afs_bos_server packets. Domain to not audit. Receive afs_bos_server packets. Domain allowed access. Do not audit attempts to receive afs_bos_server packets. Domain allowed access. Send and receive afs_bos_server packets. Domain allowed access. Do not audit attempts to send and receive afs_bos_server packets. Domain to not audit. Relabel packets to afs_bos_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_client port. Domain allowed access. Send UDP traffic on the afs_client port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_client port. Domain to not audit. Receive UDP traffic on the afs_client port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_client port. Domain to not audit. Send and receive UDP traffic on the afs_client port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_client port. Domain to not audit. Bind TCP sockets to the afs_client port. Domain allowed access. Bind UDP sockets to the afs_client port. Domain allowed access. Make a TCP connection to the afs_client port. Domain allowed access. Send afs_client_client packets. Domain allowed access. Do not audit attempts to send afs_client_client packets. Domain to not audit. Receive afs_client_client packets. Domain allowed access. Do not audit attempts to receive afs_client_client packets. Domain allowed access. Send and receive afs_client_client packets. Domain allowed access. Do not audit attempts to send and receive afs_client_client packets. Domain to not audit. Relabel packets to afs_client_client the packet type. Domain allowed access. Send afs_client_server packets. Domain allowed access. Do not audit attempts to send afs_client_server packets. Domain to not audit. Receive afs_client_server packets. Domain allowed access. Do not audit attempts to receive afs_client_server packets. Domain allowed access. Send and receive afs_client_server packets. Domain allowed access. Do not audit attempts to send and receive afs_client_server packets. Domain to not audit. Relabel packets to afs_client_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_fs port. Domain allowed access. Send UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_fs port. Domain to not audit. Receive UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_fs port. Domain to not audit. Send and receive UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_fs port. Domain to not audit. Bind TCP sockets to the afs_fs port. Domain allowed access. Bind UDP sockets to the afs_fs port. Domain allowed access. Make a TCP connection to the afs_fs port. Domain allowed access. Send afs_fs_client packets. Domain allowed access. Do not audit attempts to send afs_fs_client packets. Domain to not audit. Receive afs_fs_client packets. Domain allowed access. Do not audit attempts to receive afs_fs_client packets. Domain allowed access. Send and receive afs_fs_client packets. Domain allowed access. Do not audit attempts to send and receive afs_fs_client packets. Domain to not audit. Relabel packets to afs_fs_client the packet type. Domain allowed access. Send afs_fs_server packets. Domain allowed access. Do not audit attempts to send afs_fs_server packets. Domain to not audit. Receive afs_fs_server packets. Domain allowed access. Do not audit attempts to receive afs_fs_server packets. Domain allowed access. Send and receive afs_fs_server packets. Domain allowed access. Do not audit attempts to send and receive afs_fs_server packets. Domain to not audit. Relabel packets to afs_fs_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_ka port. Domain allowed access. Send UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_ka port. Domain to not audit. Receive UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_ka port. Domain to not audit. Send and receive UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_ka port. Domain to not audit. Bind TCP sockets to the afs_ka port. Domain allowed access. Bind UDP sockets to the afs_ka port. Domain allowed access. Make a TCP connection to the afs_ka port. Domain allowed access. Send afs_ka_client packets. Domain allowed access. Do not audit attempts to send afs_ka_client packets. Domain to not audit. Receive afs_ka_client packets. Domain allowed access. Do not audit attempts to receive afs_ka_client packets. Domain allowed access. Send and receive afs_ka_client packets. Domain allowed access. Do not audit attempts to send and receive afs_ka_client packets. Domain to not audit. Relabel packets to afs_ka_client the packet type. Domain allowed access. Send afs_ka_server packets. Domain allowed access. Do not audit attempts to send afs_ka_server packets. Domain to not audit. Receive afs_ka_server packets. Domain allowed access. Do not audit attempts to receive afs_ka_server packets. Domain allowed access. Send and receive afs_ka_server packets. Domain allowed access. Do not audit attempts to send and receive afs_ka_server packets. Domain to not audit. Relabel packets to afs_ka_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_pt port. Domain allowed access. Send UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_pt port. Domain to not audit. Receive UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_pt port. Domain to not audit. Send and receive UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_pt port. Domain to not audit. Bind TCP sockets to the afs_pt port. Domain allowed access. Bind UDP sockets to the afs_pt port. Domain allowed access. Make a TCP connection to the afs_pt port. Domain allowed access. Send afs_pt_client packets. Domain allowed access. Do not audit attempts to send afs_pt_client packets. Domain to not audit. Receive afs_pt_client packets. Domain allowed access. Do not audit attempts to receive afs_pt_client packets. Domain allowed access. Send and receive afs_pt_client packets. Domain allowed access. Do not audit attempts to send and receive afs_pt_client packets. Domain to not audit. Relabel packets to afs_pt_client the packet type. Domain allowed access. Send afs_pt_server packets. Domain allowed access. Do not audit attempts to send afs_pt_server packets. Domain to not audit. Receive afs_pt_server packets. Domain allowed access. Do not audit attempts to receive afs_pt_server packets. Domain allowed access. Send and receive afs_pt_server packets. Domain allowed access. Do not audit attempts to send and receive afs_pt_server packets. Domain to not audit. Relabel packets to afs_pt_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_vl port. Domain allowed access. Send UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_vl port. Domain to not audit. Receive UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_vl port. Domain to not audit. Send and receive UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_vl port. Domain to not audit. Bind TCP sockets to the afs_vl port. Domain allowed access. Bind UDP sockets to the afs_vl port. Domain allowed access. Make a TCP connection to the afs_vl port. Domain allowed access. Send afs_vl_client packets. Domain allowed access. Do not audit attempts to send afs_vl_client packets. Domain to not audit. Receive afs_vl_client packets. Domain allowed access. Do not audit attempts to receive afs_vl_client packets. Domain allowed access. Send and receive afs_vl_client packets. Domain allowed access. Do not audit attempts to send and receive afs_vl_client packets. Domain to not audit. Relabel packets to afs_vl_client the packet type. Domain allowed access. Send afs_vl_server packets. Domain allowed access. Do not audit attempts to send afs_vl_server packets. Domain to not audit. Receive afs_vl_server packets. Domain allowed access. Do not audit attempts to receive afs_vl_server packets. Domain allowed access. Send and receive afs_vl_server packets. Domain allowed access. Do not audit attempts to send and receive afs_vl_server packets. Domain to not audit. Relabel packets to afs_vl_server the packet type. Domain allowed access. Send and receive TCP traffic on the agentx port. Domain allowed access. Send UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to send UDP traffic on the agentx port. Domain to not audit. Receive UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to receive UDP traffic on the agentx port. Domain to not audit. Send and receive UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the agentx port. Domain to not audit. Bind TCP sockets to the agentx port. Domain allowed access. Bind UDP sockets to the agentx port. Domain allowed access. Make a TCP connection to the agentx port. Domain allowed access. Send agentx_client packets. Domain allowed access. Do not audit attempts to send agentx_client packets. Domain to not audit. Receive agentx_client packets. Domain allowed access. Do not audit attempts to receive agentx_client packets. Domain allowed access. Send and receive agentx_client packets. Domain allowed access. Do not audit attempts to send and receive agentx_client packets. Domain to not audit. Relabel packets to agentx_client the packet type. Domain allowed access. Send agentx_server packets. Domain allowed access. Do not audit attempts to send agentx_server packets. Domain to not audit. Receive agentx_server packets. Domain allowed access. Do not audit attempts to receive agentx_server packets. Domain allowed access. Send and receive agentx_server packets. Domain allowed access. Do not audit attempts to send and receive agentx_server packets. Domain to not audit. Relabel packets to agentx_server the packet type. Domain allowed access. Send and receive TCP traffic on the amanda port. Domain allowed access. Send UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to send UDP traffic on the amanda port. Domain to not audit. Receive UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amanda port. Domain to not audit. Send and receive UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amanda port. Domain to not audit. Bind TCP sockets to the amanda port. Domain allowed access. Bind UDP sockets to the amanda port. Domain allowed access. Make a TCP connection to the amanda port. Domain allowed access. Send amanda_client packets. Domain allowed access. Do not audit attempts to send amanda_client packets. Domain to not audit. Receive amanda_client packets. Domain allowed access. Do not audit attempts to receive amanda_client packets. Domain allowed access. Send and receive amanda_client packets. Domain allowed access. Do not audit attempts to send and receive amanda_client packets. Domain to not audit. Relabel packets to amanda_client the packet type. Domain allowed access. Send amanda_server packets. Domain allowed access. Do not audit attempts to send amanda_server packets. Domain to not audit. Receive amanda_server packets. Domain allowed access. Do not audit attempts to receive amanda_server packets. Domain allowed access. Send and receive amanda_server packets. Domain allowed access. Do not audit attempts to send and receive amanda_server packets. Domain to not audit. Relabel packets to amanda_server the packet type. Domain allowed access. Send and receive TCP traffic on the amavisd_recv port. Domain allowed access. Send UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to send UDP traffic on the amavisd_recv port. Domain to not audit. Receive UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amavisd_recv port. Domain to not audit. Send and receive UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amavisd_recv port. Domain to not audit. Bind TCP sockets to the amavisd_recv port. Domain allowed access. Bind UDP sockets to the amavisd_recv port. Domain allowed access. Make a TCP connection to the amavisd_recv port. Domain allowed access. Send amavisd_recv_client packets. Domain allowed access. Do not audit attempts to send amavisd_recv_client packets. Domain to not audit. Receive amavisd_recv_client packets. Domain allowed access. Do not audit attempts to receive amavisd_recv_client packets. Domain allowed access. Send and receive amavisd_recv_client packets. Domain allowed access. Do not audit attempts to send and receive amavisd_recv_client packets. Domain to not audit. Relabel packets to amavisd_recv_client the packet type. Domain allowed access. Send amavisd_recv_server packets. Domain allowed access. Do not audit attempts to send amavisd_recv_server packets. Domain to not audit. Receive amavisd_recv_server packets. Domain allowed access. Do not audit attempts to receive amavisd_recv_server packets. Domain allowed access. Send and receive amavisd_recv_server packets. Domain allowed access. Do not audit attempts to send and receive amavisd_recv_server packets. Domain to not audit. Relabel packets to amavisd_recv_server the packet type. Domain allowed access. Send and receive TCP traffic on the amavisd_send port. Domain allowed access. Send UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to send UDP traffic on the amavisd_send port. Domain to not audit. Receive UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amavisd_send port. Domain to not audit. Send and receive UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amavisd_send port. Domain to not audit. Bind TCP sockets to the amavisd_send port. Domain allowed access. Bind UDP sockets to the amavisd_send port. Domain allowed access. Make a TCP connection to the amavisd_send port. Domain allowed access. Send amavisd_send_client packets. Domain allowed access. Do not audit attempts to send amavisd_send_client packets. Domain to not audit. Receive amavisd_send_client packets. Domain allowed access. Do not audit attempts to receive amavisd_send_client packets. Domain allowed access. Send and receive amavisd_send_client packets. Domain allowed access. Do not audit attempts to send and receive amavisd_send_client packets. Domain to not audit. Relabel packets to amavisd_send_client the packet type. Domain allowed access. Send amavisd_send_server packets. Domain allowed access. Do not audit attempts to send amavisd_send_server packets. Domain to not audit. Receive amavisd_send_server packets. Domain allowed access. Do not audit attempts to receive amavisd_send_server packets. Domain allowed access. Send and receive amavisd_send_server packets. Domain allowed access. Do not audit attempts to send and receive amavisd_send_server packets. Domain to not audit. Relabel packets to amavisd_send_server the packet type. Domain allowed access. Send and receive TCP traffic on the amqp port. Domain allowed access. Send UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to send UDP traffic on the amqp port. Domain to not audit. Receive UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amqp port. Domain to not audit. Send and receive UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amqp port. Domain to not audit. Bind TCP sockets to the amqp port. Domain allowed access. Bind UDP sockets to the amqp port. Domain allowed access. Make a TCP connection to the amqp port. Domain allowed access. Send amqp_client packets. Domain allowed access. Do not audit attempts to send amqp_client packets. Domain to not audit. Receive amqp_client packets. Domain allowed access. Do not audit attempts to receive amqp_client packets. Domain allowed access. Send and receive amqp_client packets. Domain allowed access. Do not audit attempts to send and receive amqp_client packets. Domain to not audit. Relabel packets to amqp_client the packet type. Domain allowed access. Send amqp_server packets. Domain allowed access. Do not audit attempts to send amqp_server packets. Domain to not audit. Receive amqp_server packets. Domain allowed access. Do not audit attempts to receive amqp_server packets. Domain allowed access. Send and receive amqp_server packets. Domain allowed access. Do not audit attempts to send and receive amqp_server packets. Domain to not audit. Relabel packets to amqp_server the packet type. Domain allowed access. Send and receive TCP traffic on the aol port. Domain allowed access. Send UDP traffic on the aol port. Domain allowed access. Do not audit attempts to send UDP traffic on the aol port. Domain to not audit. Receive UDP traffic on the aol port. Domain allowed access. Do not audit attempts to receive UDP traffic on the aol port. Domain to not audit. Send and receive UDP traffic on the aol port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the aol port. Domain to not audit. Bind TCP sockets to the aol port. Domain allowed access. Bind UDP sockets to the aol port. Domain allowed access. Make a TCP connection to the aol port. Domain allowed access. Send aol_client packets. Domain allowed access. Do not audit attempts to send aol_client packets. Domain to not audit. Receive aol_client packets. Domain allowed access. Do not audit attempts to receive aol_client packets. Domain allowed access. Send and receive aol_client packets. Domain allowed access. Do not audit attempts to send and receive aol_client packets. Domain to not audit. Relabel packets to aol_client the packet type. Domain allowed access. Send aol_server packets. Domain allowed access. Do not audit attempts to send aol_server packets. Domain to not audit. Receive aol_server packets. Domain allowed access. Do not audit attempts to receive aol_server packets. Domain allowed access. Send and receive aol_server packets. Domain allowed access. Do not audit attempts to send and receive aol_server packets. Domain to not audit. Relabel packets to aol_server the packet type. Domain allowed access. Send and receive TCP traffic on the apc port. Domain allowed access. Send UDP traffic on the apc port. Domain allowed access. Do not audit attempts to send UDP traffic on the apc port. Domain to not audit. Receive UDP traffic on the apc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the apc port. Domain to not audit. Send and receive UDP traffic on the apc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the apc port. Domain to not audit. Bind TCP sockets to the apc port. Domain allowed access. Bind UDP sockets to the apc port. Domain allowed access. Make a TCP connection to the apc port. Domain allowed access. Send apc_client packets. Domain allowed access. Do not audit attempts to send apc_client packets. Domain to not audit. Receive apc_client packets. Domain allowed access. Do not audit attempts to receive apc_client packets. Domain allowed access. Send and receive apc_client packets. Domain allowed access. Do not audit attempts to send and receive apc_client packets. Domain to not audit. Relabel packets to apc_client the packet type. Domain allowed access. Send apc_server packets. Domain allowed access. Do not audit attempts to send apc_server packets. Domain to not audit. Receive apc_server packets. Domain allowed access. Do not audit attempts to receive apc_server packets. Domain allowed access. Send and receive apc_server packets. Domain allowed access. Do not audit attempts to send and receive apc_server packets. Domain to not audit. Relabel packets to apc_server the packet type. Domain allowed access. Send and receive TCP traffic on the apcupsd port. Domain allowed access. Send UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to send UDP traffic on the apcupsd port. Domain to not audit. Receive UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the apcupsd port. Domain to not audit. Send and receive UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the apcupsd port. Domain to not audit. Bind TCP sockets to the apcupsd port. Domain allowed access. Bind UDP sockets to the apcupsd port. Domain allowed access. Make a TCP connection to the apcupsd port. Domain allowed access. Send apcupsd_client packets. Domain allowed access. Do not audit attempts to send apcupsd_client packets. Domain to not audit. Receive apcupsd_client packets. Domain allowed access. Do not audit attempts to receive apcupsd_client packets. Domain allowed access. Send and receive apcupsd_client packets. Domain allowed access. Do not audit attempts to send and receive apcupsd_client packets. Domain to not audit. Relabel packets to apcupsd_client the packet type. Domain allowed access. Send apcupsd_server packets. Domain allowed access. Do not audit attempts to send apcupsd_server packets. Domain to not audit. Receive apcupsd_server packets. Domain allowed access. Do not audit attempts to receive apcupsd_server packets. Domain allowed access. Send and receive apcupsd_server packets. Domain allowed access. Do not audit attempts to send and receive apcupsd_server packets. Domain to not audit. Relabel packets to apcupsd_server the packet type. Domain allowed access. Send and receive TCP traffic on the apertus_ldp port. Domain allowed access. Send UDP traffic on the apertus_ldp port. Domain allowed access. Do not audit attempts to send UDP traffic on the apertus_ldp port. Domain to not audit. Receive UDP traffic on the apertus_ldp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the apertus_ldp port. Domain to not audit. Send and receive UDP traffic on the apertus_ldp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the apertus_ldp port. Domain to not audit. Bind TCP sockets to the apertus_ldp port. Domain allowed access. Bind UDP sockets to the apertus_ldp port. Domain allowed access. Make a TCP connection to the apertus_ldp port. Domain allowed access. Send apertus_ldp_client packets. Domain allowed access. Do not audit attempts to send apertus_ldp_client packets. Domain to not audit. Receive apertus_ldp_client packets. Domain allowed access. Do not audit attempts to receive apertus_ldp_client packets. Domain allowed access. Send and receive apertus_ldp_client packets. Domain allowed access. Do not audit attempts to send and receive apertus_ldp_client packets. Domain to not audit. Relabel packets to apertus_ldp_client the packet type. Domain allowed access. Send apertus_ldp_server packets. Domain allowed access. Do not audit attempts to send apertus_ldp_server packets. Domain to not audit. Receive apertus_ldp_server packets. Domain allowed access. Do not audit attempts to receive apertus_ldp_server packets. Domain allowed access. Send and receive apertus_ldp_server packets. Domain allowed access. Do not audit attempts to send and receive apertus_ldp_server packets. Domain to not audit. Relabel packets to apertus_ldp_server the packet type. Domain allowed access. Send and receive TCP traffic on the asterisk port. Domain allowed access. Send UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to send UDP traffic on the asterisk port. Domain to not audit. Receive UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to receive UDP traffic on the asterisk port. Domain to not audit. Send and receive UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the asterisk port. Domain to not audit. Bind TCP sockets to the asterisk port. Domain allowed access. Bind UDP sockets to the asterisk port. Domain allowed access. Make a TCP connection to the asterisk port. Domain allowed access. Send asterisk_client packets. Domain allowed access. Do not audit attempts to send asterisk_client packets. Domain to not audit. Receive asterisk_client packets. Domain allowed access. Do not audit attempts to receive asterisk_client packets. Domain allowed access. Send and receive asterisk_client packets. Domain allowed access. Do not audit attempts to send and receive asterisk_client packets. Domain to not audit. Relabel packets to asterisk_client the packet type. Domain allowed access. Send asterisk_server packets. Domain allowed access. Do not audit attempts to send asterisk_server packets. Domain to not audit. Receive asterisk_server packets. Domain allowed access. Do not audit attempts to receive asterisk_server packets. Domain allowed access. Send and receive asterisk_server packets. Domain allowed access. Do not audit attempts to send and receive asterisk_server packets. Domain to not audit. Relabel packets to asterisk_server the packet type. Domain allowed access. Send and receive TCP traffic on the audit port. Domain allowed access. Send UDP traffic on the audit port. Domain allowed access. Do not audit attempts to send UDP traffic on the audit port. Domain to not audit. Receive UDP traffic on the audit port. Domain allowed access. Do not audit attempts to receive UDP traffic on the audit port. Domain to not audit. Send and receive UDP traffic on the audit port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the audit port. Domain to not audit. Bind TCP sockets to the audit port. Domain allowed access. Bind UDP sockets to the audit port. Domain allowed access. Make a TCP connection to the audit port. Domain allowed access. Send audit_client packets. Domain allowed access. Do not audit attempts to send audit_client packets. Domain to not audit. Receive audit_client packets. Domain allowed access. Do not audit attempts to receive audit_client packets. Domain allowed access. Send and receive audit_client packets. Domain allowed access. Do not audit attempts to send and receive audit_client packets. Domain to not audit. Relabel packets to audit_client the packet type. Domain allowed access. Send audit_server packets. Domain allowed access. Do not audit attempts to send audit_server packets. Domain to not audit. Receive audit_server packets. Domain allowed access. Do not audit attempts to receive audit_server packets. Domain allowed access. Send and receive audit_server packets. Domain allowed access. Do not audit attempts to send and receive audit_server packets. Domain to not audit. Relabel packets to audit_server the packet type. Domain allowed access. Send and receive TCP traffic on the auth port. Domain allowed access. Send UDP traffic on the auth port. Domain allowed access. Do not audit attempts to send UDP traffic on the auth port. Domain to not audit. Receive UDP traffic on the auth port. Domain allowed access. Do not audit attempts to receive UDP traffic on the auth port. Domain to not audit. Send and receive UDP traffic on the auth port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the auth port. Domain to not audit. Bind TCP sockets to the auth port. Domain allowed access. Bind UDP sockets to the auth port. Domain allowed access. Make a TCP connection to the auth port. Domain allowed access. Send auth_client packets. Domain allowed access. Do not audit attempts to send auth_client packets. Domain to not audit. Receive auth_client packets. Domain allowed access. Do not audit attempts to receive auth_client packets. Domain allowed access. Send and receive auth_client packets. Domain allowed access. Do not audit attempts to send and receive auth_client packets. Domain to not audit. Relabel packets to auth_client the packet type. Domain allowed access. Send auth_server packets. Domain allowed access. Do not audit attempts to send auth_server packets. Domain to not audit. Receive auth_server packets. Domain allowed access. Do not audit attempts to receive auth_server packets. Domain allowed access. Send and receive auth_server packets. Domain allowed access. Do not audit attempts to send and receive auth_server packets. Domain to not audit. Relabel packets to auth_server the packet type. Domain allowed access. Send and receive TCP traffic on the bacula port. Domain allowed access. Send UDP traffic on the bacula port. Domain allowed access. Do not audit attempts to send UDP traffic on the bacula port. Domain to not audit. Receive UDP traffic on the bacula port. Domain allowed access. Do not audit attempts to receive UDP traffic on the bacula port. Domain to not audit. Send and receive UDP traffic on the bacula port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the bacula port. Domain to not audit. Bind TCP sockets to the bacula port. Domain allowed access. Bind UDP sockets to the bacula port. Domain allowed access. Make a TCP connection to the bacula port. Domain allowed access. Send bacula_client packets. Domain allowed access. Do not audit attempts to send bacula_client packets. Domain to not audit. Receive bacula_client packets. Domain allowed access. Do not audit attempts to receive bacula_client packets. Domain allowed access. Send and receive bacula_client packets. Domain allowed access. Do not audit attempts to send and receive bacula_client packets. Domain to not audit. Relabel packets to bacula_client the packet type. Domain allowed access. Send bacula_server packets. Domain allowed access. Do not audit attempts to send bacula_server packets. Domain to not audit. Receive bacula_server packets. Domain allowed access. Do not audit attempts to receive bacula_server packets. Domain allowed access. Send and receive bacula_server packets. Domain allowed access. Do not audit attempts to send and receive bacula_server packets. Domain to not audit. Relabel packets to bacula_server the packet type. Domain allowed access. Send and receive TCP traffic on the bgp port. Domain allowed access. Send UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to send UDP traffic on the bgp port. Domain to not audit. Receive UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the bgp port. Domain to not audit. Send and receive UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the bgp port. Domain to not audit. Bind TCP sockets to the bgp port. Domain allowed access. Bind UDP sockets to the bgp port. Domain allowed access. Make a TCP connection to the bgp port. Domain allowed access. Send bgp_client packets. Domain allowed access. Do not audit attempts to send bgp_client packets. Domain to not audit. Receive bgp_client packets. Domain allowed access. Do not audit attempts to receive bgp_client packets. Domain allowed access. Send and receive bgp_client packets. Domain allowed access. Do not audit attempts to send and receive bgp_client packets. Domain to not audit. Relabel packets to bgp_client the packet type. Domain allowed access. Send bgp_server packets. Domain allowed access. Do not audit attempts to send bgp_server packets. Domain to not audit. Receive bgp_server packets. Domain allowed access. Do not audit attempts to receive bgp_server packets. Domain allowed access. Send and receive bgp_server packets. Domain allowed access. Do not audit attempts to send and receive bgp_server packets. Domain to not audit. Relabel packets to bgp_server the packet type. Domain allowed access. Send and receive TCP traffic on the boinc port. Domain allowed access. Send UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to send UDP traffic on the boinc port. Domain to not audit. Receive UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the boinc port. Domain to not audit. Send and receive UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the boinc port. Domain to not audit. Bind TCP sockets to the boinc port. Domain allowed access. Bind UDP sockets to the boinc port. Domain allowed access. Make a TCP connection to the boinc port. Domain allowed access. Send boinc_client packets. Domain allowed access. Do not audit attempts to send boinc_client packets. Domain to not audit. Receive boinc_client packets. Domain allowed access. Do not audit attempts to receive boinc_client packets. Domain allowed access. Send and receive boinc_client packets. Domain allowed access. Do not audit attempts to send and receive boinc_client packets. Domain to not audit. Relabel packets to boinc_client the packet type. Domain allowed access. Send boinc_server packets. Domain allowed access. Do not audit attempts to send boinc_server packets. Domain to not audit. Receive boinc_server packets. Domain allowed access. Do not audit attempts to receive boinc_server packets. Domain allowed access. Send and receive boinc_server packets. Domain allowed access. Do not audit attempts to send and receive boinc_server packets. Domain to not audit. Relabel packets to boinc_server the packet type. Domain allowed access. Send and receive TCP traffic on the certmaster port. Domain allowed access. Send UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to send UDP traffic on the certmaster port. Domain to not audit. Receive UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the certmaster port. Domain to not audit. Send and receive UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the certmaster port. Domain to not audit. Bind TCP sockets to the certmaster port. Domain allowed access. Bind UDP sockets to the certmaster port. Domain allowed access. Make a TCP connection to the certmaster port. Domain allowed access. Send certmaster_client packets. Domain allowed access. Do not audit attempts to send certmaster_client packets. Domain to not audit. Receive certmaster_client packets. Domain allowed access. Do not audit attempts to receive certmaster_client packets. Domain allowed access. Send and receive certmaster_client packets. Domain allowed access. Do not audit attempts to send and receive certmaster_client packets. Domain to not audit. Relabel packets to certmaster_client the packet type. Domain allowed access. Send certmaster_server packets. Domain allowed access. Do not audit attempts to send certmaster_server packets. Domain to not audit. Receive certmaster_server packets. Domain allowed access. Do not audit attempts to receive certmaster_server packets. Domain allowed access. Send and receive certmaster_server packets. Domain allowed access. Do not audit attempts to send and receive certmaster_server packets. Domain to not audit. Relabel packets to certmaster_server the packet type. Domain allowed access. Send and receive TCP traffic on the cockpit port. Domain allowed access. Send UDP traffic on the cockpit port. Domain allowed access. Do not audit attempts to send UDP traffic on the cockpit port. Domain to not audit. Receive UDP traffic on the cockpit port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cockpit port. Domain to not audit. Send and receive UDP traffic on the cockpit port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cockpit port. Domain to not audit. Bind TCP sockets to the cockpit port. Domain allowed access. Bind UDP sockets to the cockpit port. Domain allowed access. Make a TCP connection to the cockpit port. Domain allowed access. Send cockpit_client packets. Domain allowed access. Do not audit attempts to send cockpit_client packets. Domain to not audit. Receive cockpit_client packets. Domain allowed access. Do not audit attempts to receive cockpit_client packets. Domain allowed access. Send and receive cockpit_client packets. Domain allowed access. Do not audit attempts to send and receive cockpit_client packets. Domain to not audit. Relabel packets to cockpit_client the packet type. Domain allowed access. Send cockpit_server packets. Domain allowed access. Do not audit attempts to send cockpit_server packets. Domain to not audit. Receive cockpit_server packets. Domain allowed access. Do not audit attempts to receive cockpit_server packets. Domain allowed access. Send and receive cockpit_server packets. Domain allowed access. Do not audit attempts to send and receive cockpit_server packets. Domain to not audit. Relabel packets to cockpit_server the packet type. Domain allowed access. Send and receive TCP traffic on the collectd port. Domain allowed access. Send UDP traffic on the collectd port. Domain allowed access. Do not audit attempts to send UDP traffic on the collectd port. Domain to not audit. Receive UDP traffic on the collectd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the collectd port. Domain to not audit. Send and receive UDP traffic on the collectd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the collectd port. Domain to not audit. Bind TCP sockets to the collectd port. Domain allowed access. Bind UDP sockets to the collectd port. Domain allowed access. Make a TCP connection to the collectd port. Domain allowed access. Send collectd_client packets. Domain allowed access. Do not audit attempts to send collectd_client packets. Domain to not audit. Receive collectd_client packets. Domain allowed access. Do not audit attempts to receive collectd_client packets. Domain allowed access. Send and receive collectd_client packets. Domain allowed access. Do not audit attempts to send and receive collectd_client packets. Domain to not audit. Relabel packets to collectd_client the packet type. Domain allowed access. Send collectd_server packets. Domain allowed access. Do not audit attempts to send collectd_server packets. Domain to not audit. Receive collectd_server packets. Domain allowed access. Do not audit attempts to receive collectd_server packets. Domain allowed access. Send and receive collectd_server packets. Domain allowed access. Do not audit attempts to send and receive collectd_server packets. Domain to not audit. Relabel packets to collectd_server the packet type. Domain allowed access. Send and receive TCP traffic on the chronyd port. Domain allowed access. Send UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to send UDP traffic on the chronyd port. Domain to not audit. Receive UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the chronyd port. Domain to not audit. Send and receive UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the chronyd port. Domain to not audit. Bind TCP sockets to the chronyd port. Domain allowed access. Bind UDP sockets to the chronyd port. Domain allowed access. Make a TCP connection to the chronyd port. Domain allowed access. Send chronyd_client packets. Domain allowed access. Do not audit attempts to send chronyd_client packets. Domain to not audit. Receive chronyd_client packets. Domain allowed access. Do not audit attempts to receive chronyd_client packets. Domain allowed access. Send and receive chronyd_client packets. Domain allowed access. Do not audit attempts to send and receive chronyd_client packets. Domain to not audit. Relabel packets to chronyd_client the packet type. Domain allowed access. Send chronyd_server packets. Domain allowed access. Do not audit attempts to send chronyd_server packets. Domain to not audit. Receive chronyd_server packets. Domain allowed access. Do not audit attempts to receive chronyd_server packets. Domain allowed access. Send and receive chronyd_server packets. Domain allowed access. Do not audit attempts to send and receive chronyd_server packets. Domain to not audit. Relabel packets to chronyd_server the packet type. Domain allowed access. Send and receive TCP traffic on the clamd port. Domain allowed access. Send UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to send UDP traffic on the clamd port. Domain to not audit. Receive UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the clamd port. Domain to not audit. Send and receive UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the clamd port. Domain to not audit. Bind TCP sockets to the clamd port. Domain allowed access. Bind UDP sockets to the clamd port. Domain allowed access. Make a TCP connection to the clamd port. Domain allowed access. Send clamd_client packets. Domain allowed access. Do not audit attempts to send clamd_client packets. Domain to not audit. Receive clamd_client packets. Domain allowed access. Do not audit attempts to receive clamd_client packets. Domain allowed access. Send and receive clamd_client packets. Domain allowed access. Do not audit attempts to send and receive clamd_client packets. Domain to not audit. Relabel packets to clamd_client the packet type. Domain allowed access. Send clamd_server packets. Domain allowed access. Do not audit attempts to send clamd_server packets. Domain to not audit. Receive clamd_server packets. Domain allowed access. Do not audit attempts to receive clamd_server packets. Domain allowed access. Send and receive clamd_server packets. Domain allowed access. Do not audit attempts to send and receive clamd_server packets. Domain to not audit. Relabel packets to clamd_server the packet type. Domain allowed access. Send and receive TCP traffic on the clockspeed port. Domain allowed access. Send UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to send UDP traffic on the clockspeed port. Domain to not audit. Receive UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to receive UDP traffic on the clockspeed port. Domain to not audit. Send and receive UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the clockspeed port. Domain to not audit. Bind TCP sockets to the clockspeed port. Domain allowed access. Bind UDP sockets to the clockspeed port. Domain allowed access. Make a TCP connection to the clockspeed port. Domain allowed access. Send clockspeed_client packets. Domain allowed access. Do not audit attempts to send clockspeed_client packets. Domain to not audit. Receive clockspeed_client packets. Domain allowed access. Do not audit attempts to receive clockspeed_client packets. Domain allowed access. Send and receive clockspeed_client packets. Domain allowed access. Do not audit attempts to send and receive clockspeed_client packets. Domain to not audit. Relabel packets to clockspeed_client the packet type. Domain allowed access. Send clockspeed_server packets. Domain allowed access. Do not audit attempts to send clockspeed_server packets. Domain to not audit. Receive clockspeed_server packets. Domain allowed access. Do not audit attempts to receive clockspeed_server packets. Domain allowed access. Send and receive clockspeed_server packets. Domain allowed access. Do not audit attempts to send and receive clockspeed_server packets. Domain to not audit. Relabel packets to clockspeed_server the packet type. Domain allowed access. Send and receive TCP traffic on the cluster port. Domain allowed access. Send UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to send UDP traffic on the cluster port. Domain to not audit. Receive UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cluster port. Domain to not audit. Send and receive UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cluster port. Domain to not audit. Bind TCP sockets to the cluster port. Domain allowed access. Bind UDP sockets to the cluster port. Domain allowed access. Make a TCP connection to the cluster port. Domain allowed access. Send cluster_client packets. Domain allowed access. Do not audit attempts to send cluster_client packets. Domain to not audit. Receive cluster_client packets. Domain allowed access. Do not audit attempts to receive cluster_client packets. Domain allowed access. Send and receive cluster_client packets. Domain allowed access. Do not audit attempts to send and receive cluster_client packets. Domain to not audit. Relabel packets to cluster_client the packet type. Domain allowed access. Send cluster_server packets. Domain allowed access. Do not audit attempts to send cluster_server packets. Domain to not audit. Receive cluster_server packets. Domain allowed access. Do not audit attempts to receive cluster_server packets. Domain allowed access. Send and receive cluster_server packets. Domain allowed access. Do not audit attempts to send and receive cluster_server packets. Domain to not audit. Relabel packets to cluster_server the packet type. Domain allowed access. Send and receive TCP traffic on the cma port. Domain allowed access. Send UDP traffic on the cma port. Domain allowed access. Do not audit attempts to send UDP traffic on the cma port. Domain to not audit. Receive UDP traffic on the cma port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cma port. Domain to not audit. Send and receive UDP traffic on the cma port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cma port. Domain to not audit. Bind TCP sockets to the cma port. Domain allowed access. Bind UDP sockets to the cma port. Domain allowed access. Make a TCP connection to the cma port. Domain allowed access. Send cma_client packets. Domain allowed access. Do not audit attempts to send cma_client packets. Domain to not audit. Receive cma_client packets. Domain allowed access. Do not audit attempts to receive cma_client packets. Domain allowed access. Send and receive cma_client packets. Domain allowed access. Do not audit attempts to send and receive cma_client packets. Domain to not audit. Relabel packets to cma_client the packet type. Domain allowed access. Send cma_server packets. Domain allowed access. Do not audit attempts to send cma_server packets. Domain to not audit. Receive cma_server packets. Domain allowed access. Do not audit attempts to receive cma_server packets. Domain allowed access. Send and receive cma_server packets. Domain allowed access. Do not audit attempts to send and receive cma_server packets. Domain to not audit. Relabel packets to cma_server the packet type. Domain allowed access. Send and receive TCP traffic on the cobbler port. Domain allowed access. Send UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to send UDP traffic on the cobbler port. Domain to not audit. Receive UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cobbler port. Domain to not audit. Send and receive UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cobbler port. Domain to not audit. Bind TCP sockets to the cobbler port. Domain allowed access. Bind UDP sockets to the cobbler port. Domain allowed access. Make a TCP connection to the cobbler port. Domain allowed access. Send cobbler_client packets. Domain allowed access. Do not audit attempts to send cobbler_client packets. Domain to not audit. Receive cobbler_client packets. Domain allowed access. Do not audit attempts to receive cobbler_client packets. Domain allowed access. Send and receive cobbler_client packets. Domain allowed access. Do not audit attempts to send and receive cobbler_client packets. Domain to not audit. Relabel packets to cobbler_client the packet type. Domain allowed access. Send cobbler_server packets. Domain allowed access. Do not audit attempts to send cobbler_server packets. Domain to not audit. Receive cobbler_server packets. Domain allowed access. Do not audit attempts to receive cobbler_server packets. Domain allowed access. Send and receive cobbler_server packets. Domain allowed access. Do not audit attempts to send and receive cobbler_server packets. Domain to not audit. Relabel packets to cobbler_server the packet type. Domain allowed access. Send and receive TCP traffic on the commplex port. Domain allowed access. Send UDP traffic on the commplex port. Domain allowed access. Do not audit attempts to send UDP traffic on the commplex port. Domain to not audit. Receive UDP traffic on the commplex port. Domain allowed access. Do not audit attempts to receive UDP traffic on the commplex port. Domain to not audit. Send and receive UDP traffic on the commplex port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the commplex port. Domain to not audit. Bind TCP sockets to the commplex port. Domain allowed access. Bind UDP sockets to the commplex port. Domain allowed access. Make a TCP connection to the commplex port. Domain allowed access. Send commplex_client packets. Domain allowed access. Do not audit attempts to send commplex_client packets. Domain to not audit. Receive commplex_client packets. Domain allowed access. Do not audit attempts to receive commplex_client packets. Domain allowed access. Send and receive commplex_client packets. Domain allowed access. Do not audit attempts to send and receive commplex_client packets. Domain to not audit. Relabel packets to commplex_client the packet type. Domain allowed access. Send commplex_server packets. Domain allowed access. Do not audit attempts to send commplex_server packets. Domain to not audit. Receive commplex_server packets. Domain allowed access. Do not audit attempts to receive commplex_server packets. Domain allowed access. Send and receive commplex_server packets. Domain allowed access. Do not audit attempts to send and receive commplex_server packets. Domain to not audit. Relabel packets to commplex_server the packet type. Domain allowed access. Send and receive TCP traffic on the comsat port. Domain allowed access. Send UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to send UDP traffic on the comsat port. Domain to not audit. Receive UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the comsat port. Domain to not audit. Send and receive UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the comsat port. Domain to not audit. Bind TCP sockets to the comsat port. Domain allowed access. Bind UDP sockets to the comsat port. Domain allowed access. Make a TCP connection to the comsat port. Domain allowed access. Send comsat_client packets. Domain allowed access. Do not audit attempts to send comsat_client packets. Domain to not audit. Receive comsat_client packets. Domain allowed access. Do not audit attempts to receive comsat_client packets. Domain allowed access. Send and receive comsat_client packets. Domain allowed access. Do not audit attempts to send and receive comsat_client packets. Domain to not audit. Relabel packets to comsat_client the packet type. Domain allowed access. Send comsat_server packets. Domain allowed access. Do not audit attempts to send comsat_server packets. Domain to not audit. Receive comsat_server packets. Domain allowed access. Do not audit attempts to receive comsat_server packets. Domain allowed access. Send and receive comsat_server packets. Domain allowed access. Do not audit attempts to send and receive comsat_server packets. Domain to not audit. Relabel packets to comsat_server the packet type. Domain allowed access. Send and receive TCP traffic on the condor port. Domain allowed access. Send UDP traffic on the condor port. Domain allowed access. Do not audit attempts to send UDP traffic on the condor port. Domain to not audit. Receive UDP traffic on the condor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the condor port. Domain to not audit. Send and receive UDP traffic on the condor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the condor port. Domain to not audit. Bind TCP sockets to the condor port. Domain allowed access. Bind UDP sockets to the condor port. Domain allowed access. Make a TCP connection to the condor port. Domain allowed access. Send condor_client packets. Domain allowed access. Do not audit attempts to send condor_client packets. Domain to not audit. Receive condor_client packets. Domain allowed access. Do not audit attempts to receive condor_client packets. Domain allowed access. Send and receive condor_client packets. Domain allowed access. Do not audit attempts to send and receive condor_client packets. Domain to not audit. Relabel packets to condor_client the packet type. Domain allowed access. Send condor_server packets. Domain allowed access. Do not audit attempts to send condor_server packets. Domain to not audit. Receive condor_server packets. Domain allowed access. Do not audit attempts to receive condor_server packets. Domain allowed access. Send and receive condor_server packets. Domain allowed access. Do not audit attempts to send and receive condor_server packets. Domain to not audit. Relabel packets to condor_server the packet type. Domain allowed access. Send and receive TCP traffic on the conman port. Domain allowed access. Send UDP traffic on the conman port. Domain allowed access. Do not audit attempts to send UDP traffic on the conman port. Domain to not audit. Receive UDP traffic on the conman port. Domain allowed access. Do not audit attempts to receive UDP traffic on the conman port. Domain to not audit. Send and receive UDP traffic on the conman port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the conman port. Domain to not audit. Bind TCP sockets to the conman port. Domain allowed access. Bind UDP sockets to the conman port. Domain allowed access. Make a TCP connection to the conman port. Domain allowed access. Send conman_client packets. Domain allowed access. Do not audit attempts to send conman_client packets. Domain to not audit. Receive conman_client packets. Domain allowed access. Do not audit attempts to receive conman_client packets. Domain allowed access. Send and receive conman_client packets. Domain allowed access. Do not audit attempts to send and receive conman_client packets. Domain to not audit. Relabel packets to conman_client the packet type. Domain allowed access. Send conman_server packets. Domain allowed access. Do not audit attempts to send conman_server packets. Domain to not audit. Receive conman_server packets. Domain allowed access. Do not audit attempts to receive conman_server packets. Domain allowed access. Send and receive conman_server packets. Domain allowed access. Do not audit attempts to send and receive conman_server packets. Domain to not audit. Relabel packets to conman_server the packet type. Domain allowed access. Send and receive TCP traffic on the ctdb port. Domain allowed access. Send UDP traffic on the ctdb port. Domain allowed access. Do not audit attempts to send UDP traffic on the ctdb port. Domain to not audit. Receive UDP traffic on the ctdb port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ctdb port. Domain to not audit. Send and receive UDP traffic on the ctdb port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ctdb port. Domain to not audit. Bind TCP sockets to the ctdb port. Domain allowed access. Bind UDP sockets to the ctdb port. Domain allowed access. Make a TCP connection to the ctdb port. Domain allowed access. Send ctdb_client packets. Domain allowed access. Do not audit attempts to send ctdb_client packets. Domain to not audit. Receive ctdb_client packets. Domain allowed access. Do not audit attempts to receive ctdb_client packets. Domain allowed access. Send and receive ctdb_client packets. Domain allowed access. Do not audit attempts to send and receive ctdb_client packets. Domain to not audit. Relabel packets to ctdb_client the packet type. Domain allowed access. Send ctdb_server packets. Domain allowed access. Do not audit attempts to send ctdb_server packets. Domain to not audit. Receive ctdb_server packets. Domain allowed access. Do not audit attempts to receive ctdb_server packets. Domain allowed access. Send and receive ctdb_server packets. Domain allowed access. Do not audit attempts to send and receive ctdb_server packets. Domain to not audit. Relabel packets to ctdb_server the packet type. Domain allowed access. Send and receive TCP traffic on the cvs port. Domain allowed access. Send UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to send UDP traffic on the cvs port. Domain to not audit. Receive UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cvs port. Domain to not audit. Send and receive UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cvs port. Domain to not audit. Bind TCP sockets to the cvs port. Domain allowed access. Bind UDP sockets to the cvs port. Domain allowed access. Make a TCP connection to the cvs port. Domain allowed access. Send cvs_client packets. Domain allowed access. Do not audit attempts to send cvs_client packets. Domain to not audit. Receive cvs_client packets. Domain allowed access. Do not audit attempts to receive cvs_client packets. Domain allowed access. Send and receive cvs_client packets. Domain allowed access. Do not audit attempts to send and receive cvs_client packets. Domain to not audit. Relabel packets to cvs_client the packet type. Domain allowed access. Send cvs_server packets. Domain allowed access. Do not audit attempts to send cvs_server packets. Domain to not audit. Receive cvs_server packets. Domain allowed access. Do not audit attempts to receive cvs_server packets. Domain allowed access. Send and receive cvs_server packets. Domain allowed access. Do not audit attempts to send and receive cvs_server packets. Domain to not audit. Relabel packets to cvs_server the packet type. Domain allowed access. Send and receive TCP traffic on the cyphesis port. Domain allowed access. Send UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to send UDP traffic on the cyphesis port. Domain to not audit. Receive UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cyphesis port. Domain to not audit. Send and receive UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cyphesis port. Domain to not audit. Bind TCP sockets to the cyphesis port. Domain allowed access. Bind UDP sockets to the cyphesis port. Domain allowed access. Make a TCP connection to the cyphesis port. Domain allowed access. Send cyphesis_client packets. Domain allowed access. Do not audit attempts to send cyphesis_client packets. Domain to not audit. Receive cyphesis_client packets. Domain allowed access. Do not audit attempts to receive cyphesis_client packets. Domain allowed access. Send and receive cyphesis_client packets. Domain allowed access. Do not audit attempts to send and receive cyphesis_client packets. Domain to not audit. Relabel packets to cyphesis_client the packet type. Domain allowed access. Send cyphesis_server packets. Domain allowed access. Do not audit attempts to send cyphesis_server packets. Domain to not audit. Receive cyphesis_server packets. Domain allowed access. Do not audit attempts to receive cyphesis_server packets. Domain allowed access. Send and receive cyphesis_server packets. Domain allowed access. Do not audit attempts to send and receive cyphesis_server packets. Domain to not audit. Relabel packets to cyphesis_server the packet type. Domain allowed access. Send and receive TCP traffic on the cyrus_imapd port. Domain allowed access. Send UDP traffic on the cyrus_imapd port. Domain allowed access. Do not audit attempts to send UDP traffic on the cyrus_imapd port. Domain to not audit. Receive UDP traffic on the cyrus_imapd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cyrus_imapd port. Domain to not audit. Send and receive UDP traffic on the cyrus_imapd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cyrus_imapd port. Domain to not audit. Bind TCP sockets to the cyrus_imapd port. Domain allowed access. Bind UDP sockets to the cyrus_imapd port. Domain allowed access. Make a TCP connection to the cyrus_imapd port. Domain allowed access. Send cyrus_imapd_client packets. Domain allowed access. Do not audit attempts to send cyrus_imapd_client packets. Domain to not audit. Receive cyrus_imapd_client packets. Domain allowed access. Do not audit attempts to receive cyrus_imapd_client packets. Domain allowed access. Send and receive cyrus_imapd_client packets. Domain allowed access. Do not audit attempts to send and receive cyrus_imapd_client packets. Domain to not audit. Relabel packets to cyrus_imapd_client the packet type. Domain allowed access. Send cyrus_imapd_server packets. Domain allowed access. Do not audit attempts to send cyrus_imapd_server packets. Domain to not audit. Receive cyrus_imapd_server packets. Domain allowed access. Do not audit attempts to receive cyrus_imapd_server packets. Domain allowed access. Send and receive cyrus_imapd_server packets. Domain allowed access. Do not audit attempts to send and receive cyrus_imapd_server packets. Domain to not audit. Relabel packets to cyrus_imapd_server the packet type. Domain allowed access. Send and receive TCP traffic on the connlcli port. Domain allowed access. Send UDP traffic on the connlcli port. Domain allowed access. Do not audit attempts to send UDP traffic on the connlcli port. Domain to not audit. Receive UDP traffic on the connlcli port. Domain allowed access. Do not audit attempts to receive UDP traffic on the connlcli port. Domain to not audit. Send and receive UDP traffic on the connlcli port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the connlcli port. Domain to not audit. Bind TCP sockets to the connlcli port. Domain allowed access. Bind UDP sockets to the connlcli port. Domain allowed access. Make a TCP connection to the connlcli port. Domain allowed access. Send connlcli_client packets. Domain allowed access. Do not audit attempts to send connlcli_client packets. Domain to not audit. Receive connlcli_client packets. Domain allowed access. Do not audit attempts to receive connlcli_client packets. Domain allowed access. Send and receive connlcli_client packets. Domain allowed access. Do not audit attempts to send and receive connlcli_client packets. Domain to not audit. Relabel packets to connlcli_client the packet type. Domain allowed access. Send connlcli_server packets. Domain allowed access. Do not audit attempts to send connlcli_server packets. Domain to not audit. Receive connlcli_server packets. Domain allowed access. Do not audit attempts to receive connlcli_server packets. Domain allowed access. Send and receive connlcli_server packets. Domain allowed access. Do not audit attempts to send and receive connlcli_server packets. Domain to not audit. Relabel packets to connlcli_server the packet type. Domain allowed access. Send and receive TCP traffic on the gluster port. Domain allowed access. Send UDP traffic on the gluster port. Domain allowed access. Do not audit attempts to send UDP traffic on the gluster port. Domain to not audit. Receive UDP traffic on the gluster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gluster port. Domain to not audit. Send and receive UDP traffic on the gluster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gluster port. Domain to not audit. Bind TCP sockets to the gluster port. Domain allowed access. Bind UDP sockets to the gluster port. Domain allowed access. Make a TCP connection to the gluster port. Domain allowed access. Send gluster_client packets. Domain allowed access. Do not audit attempts to send gluster_client packets. Domain to not audit. Receive gluster_client packets. Domain allowed access. Do not audit attempts to receive gluster_client packets. Domain allowed access. Send and receive gluster_client packets. Domain allowed access. Do not audit attempts to send and receive gluster_client packets. Domain to not audit. Relabel packets to gluster_client the packet type. Domain allowed access. Send gluster_server packets. Domain allowed access. Do not audit attempts to send gluster_server packets. Domain to not audit. Receive gluster_server packets. Domain allowed access. Do not audit attempts to receive gluster_server packets. Domain allowed access. Send and receive gluster_server packets. Domain allowed access. Do not audit attempts to send and receive gluster_server packets. Domain to not audit. Relabel packets to gluster_server the packet type. Domain allowed access. Send and receive TCP traffic on the dbskkd port. Domain allowed access. Send UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to send UDP traffic on the dbskkd port. Domain to not audit. Receive UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dbskkd port. Domain to not audit. Send and receive UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dbskkd port. Domain to not audit. Bind TCP sockets to the dbskkd port. Domain allowed access. Bind UDP sockets to the dbskkd port. Domain allowed access. Make a TCP connection to the dbskkd port. Domain allowed access. Send dbskkd_client packets. Domain allowed access. Do not audit attempts to send dbskkd_client packets. Domain to not audit. Receive dbskkd_client packets. Domain allowed access. Do not audit attempts to receive dbskkd_client packets. Domain allowed access. Send and receive dbskkd_client packets. Domain allowed access. Do not audit attempts to send and receive dbskkd_client packets. Domain to not audit. Relabel packets to dbskkd_client the packet type. Domain allowed access. Send dbskkd_server packets. Domain allowed access. Do not audit attempts to send dbskkd_server packets. Domain to not audit. Receive dbskkd_server packets. Domain allowed access. Do not audit attempts to receive dbskkd_server packets. Domain allowed access. Send and receive dbskkd_server packets. Domain allowed access. Do not audit attempts to send and receive dbskkd_server packets. Domain to not audit. Relabel packets to dbskkd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dcc port. Domain allowed access. Send UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to send UDP traffic on the dcc port. Domain to not audit. Receive UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dcc port. Domain to not audit. Send and receive UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dcc port. Domain to not audit. Bind TCP sockets to the dcc port. Domain allowed access. Bind UDP sockets to the dcc port. Domain allowed access. Make a TCP connection to the dcc port. Domain allowed access. Send dcc_client packets. Domain allowed access. Do not audit attempts to send dcc_client packets. Domain to not audit. Receive dcc_client packets. Domain allowed access. Do not audit attempts to receive dcc_client packets. Domain allowed access. Send and receive dcc_client packets. Domain allowed access. Do not audit attempts to send and receive dcc_client packets. Domain to not audit. Relabel packets to dcc_client the packet type. Domain allowed access. Send dcc_server packets. Domain allowed access. Do not audit attempts to send dcc_server packets. Domain to not audit. Receive dcc_server packets. Domain allowed access. Do not audit attempts to receive dcc_server packets. Domain allowed access. Send and receive dcc_server packets. Domain allowed access. Do not audit attempts to send and receive dcc_server packets. Domain to not audit. Relabel packets to dcc_server the packet type. Domain allowed access. Send and receive TCP traffic on the dccm port. Domain allowed access. Send UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to send UDP traffic on the dccm port. Domain to not audit. Receive UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dccm port. Domain to not audit. Send and receive UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dccm port. Domain to not audit. Bind TCP sockets to the dccm port. Domain allowed access. Bind UDP sockets to the dccm port. Domain allowed access. Make a TCP connection to the dccm port. Domain allowed access. Send dccm_client packets. Domain allowed access. Do not audit attempts to send dccm_client packets. Domain to not audit. Receive dccm_client packets. Domain allowed access. Do not audit attempts to receive dccm_client packets. Domain allowed access. Send and receive dccm_client packets. Domain allowed access. Do not audit attempts to send and receive dccm_client packets. Domain to not audit. Relabel packets to dccm_client the packet type. Domain allowed access. Send dccm_server packets. Domain allowed access. Do not audit attempts to send dccm_server packets. Domain to not audit. Receive dccm_server packets. Domain allowed access. Do not audit attempts to receive dccm_server packets. Domain allowed access. Send and receive dccm_server packets. Domain allowed access. Do not audit attempts to send and receive dccm_server packets. Domain to not audit. Relabel packets to dccm_server the packet type. Domain allowed access. Send and receive TCP traffic on the dhcpc port. Domain allowed access. Send UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to send UDP traffic on the dhcpc port. Domain to not audit. Receive UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dhcpc port. Domain to not audit. Send and receive UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dhcpc port. Domain to not audit. Bind TCP sockets to the dhcpc port. Domain allowed access. Bind UDP sockets to the dhcpc port. Domain allowed access. Make a TCP connection to the dhcpc port. Domain allowed access. Send dhcpc_client packets. Domain allowed access. Do not audit attempts to send dhcpc_client packets. Domain to not audit. Receive dhcpc_client packets. Domain allowed access. Do not audit attempts to receive dhcpc_client packets. Domain allowed access. Send and receive dhcpc_client packets. Domain allowed access. Do not audit attempts to send and receive dhcpc_client packets. Domain to not audit. Relabel packets to dhcpc_client the packet type. Domain allowed access. Send dhcpc_server packets. Domain allowed access. Do not audit attempts to send dhcpc_server packets. Domain to not audit. Receive dhcpc_server packets. Domain allowed access. Do not audit attempts to receive dhcpc_server packets. Domain allowed access. Send and receive dhcpc_server packets. Domain allowed access. Do not audit attempts to send and receive dhcpc_server packets. Domain to not audit. Relabel packets to dhcpc_server the packet type. Domain allowed access. Send and receive TCP traffic on the dhcpd port. Domain allowed access. Send UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the dhcpd port. Domain to not audit. Receive UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dhcpd port. Domain to not audit. Send and receive UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dhcpd port. Domain to not audit. Bind TCP sockets to the dhcpd port. Domain allowed access. Bind UDP sockets to the dhcpd port. Domain allowed access. Make a TCP connection to the dhcpd port. Domain allowed access. Send dhcpd_client packets. Domain allowed access. Do not audit attempts to send dhcpd_client packets. Domain to not audit. Receive dhcpd_client packets. Domain allowed access. Do not audit attempts to receive dhcpd_client packets. Domain allowed access. Send and receive dhcpd_client packets. Domain allowed access. Do not audit attempts to send and receive dhcpd_client packets. Domain to not audit. Relabel packets to dhcpd_client the packet type. Domain allowed access. Send dhcpd_server packets. Domain allowed access. Do not audit attempts to send dhcpd_server packets. Domain to not audit. Receive dhcpd_server packets. Domain allowed access. Do not audit attempts to receive dhcpd_server packets. Domain allowed access. Send and receive dhcpd_server packets. Domain allowed access. Do not audit attempts to send and receive dhcpd_server packets. Domain to not audit. Relabel packets to dhcpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dey_sapi port. Domain allowed access. Send UDP traffic on the dey_sapi port. Domain allowed access. Do not audit attempts to send UDP traffic on the dey_sapi port. Domain to not audit. Receive UDP traffic on the dey_sapi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dey_sapi port. Domain to not audit. Send and receive UDP traffic on the dey_sapi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dey_sapi port. Domain to not audit. Bind TCP sockets to the dey_sapi port. Domain allowed access. Bind UDP sockets to the dey_sapi port. Domain allowed access. Make a TCP connection to the dey_sapi port. Domain allowed access. Send dey_sapi_client packets. Domain allowed access. Do not audit attempts to send dey_sapi_client packets. Domain to not audit. Receive dey_sapi_client packets. Domain allowed access. Do not audit attempts to receive dey_sapi_client packets. Domain allowed access. Send and receive dey_sapi_client packets. Domain allowed access. Do not audit attempts to send and receive dey_sapi_client packets. Domain to not audit. Relabel packets to dey_sapi_client the packet type. Domain allowed access. Send dey_sapi_server packets. Domain allowed access. Do not audit attempts to send dey_sapi_server packets. Domain to not audit. Receive dey_sapi_server packets. Domain allowed access. Do not audit attempts to receive dey_sapi_server packets. Domain allowed access. Send and receive dey_sapi_server packets. Domain allowed access. Do not audit attempts to send and receive dey_sapi_server packets. Domain to not audit. Relabel packets to dey_sapi_server the packet type. Domain allowed access. Send and receive TCP traffic on the dict port. Domain allowed access. Send UDP traffic on the dict port. Domain allowed access. Do not audit attempts to send UDP traffic on the dict port. Domain to not audit. Receive UDP traffic on the dict port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dict port. Domain to not audit. Send and receive UDP traffic on the dict port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dict port. Domain to not audit. Bind TCP sockets to the dict port. Domain allowed access. Bind UDP sockets to the dict port. Domain allowed access. Make a TCP connection to the dict port. Domain allowed access. Send dict_client packets. Domain allowed access. Do not audit attempts to send dict_client packets. Domain to not audit. Receive dict_client packets. Domain allowed access. Do not audit attempts to receive dict_client packets. Domain allowed access. Send and receive dict_client packets. Domain allowed access. Do not audit attempts to send and receive dict_client packets. Domain to not audit. Relabel packets to dict_client the packet type. Domain allowed access. Send dict_server packets. Domain allowed access. Do not audit attempts to send dict_server packets. Domain to not audit. Receive dict_server packets. Domain allowed access. Do not audit attempts to receive dict_server packets. Domain allowed access. Send and receive dict_server packets. Domain allowed access. Do not audit attempts to send and receive dict_server packets. Domain to not audit. Relabel packets to dict_server the packet type. Domain allowed access. Send and receive TCP traffic on the distccd port. Domain allowed access. Send UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to send UDP traffic on the distccd port. Domain to not audit. Receive UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the distccd port. Domain to not audit. Send and receive UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the distccd port. Domain to not audit. Bind TCP sockets to the distccd port. Domain allowed access. Bind UDP sockets to the distccd port. Domain allowed access. Make a TCP connection to the distccd port. Domain allowed access. Send distccd_client packets. Domain allowed access. Do not audit attempts to send distccd_client packets. Domain to not audit. Receive distccd_client packets. Domain allowed access. Do not audit attempts to receive distccd_client packets. Domain allowed access. Send and receive distccd_client packets. Domain allowed access. Do not audit attempts to send and receive distccd_client packets. Domain to not audit. Relabel packets to distccd_client the packet type. Domain allowed access. Send distccd_server packets. Domain allowed access. Do not audit attempts to send distccd_server packets. Domain to not audit. Receive distccd_server packets. Domain allowed access. Do not audit attempts to receive distccd_server packets. Domain allowed access. Send and receive distccd_server packets. Domain allowed access. Do not audit attempts to send and receive distccd_server packets. Domain to not audit. Relabel packets to distccd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dns port. Domain allowed access. Send UDP traffic on the dns port. Domain allowed access. Do not audit attempts to send UDP traffic on the dns port. Domain to not audit. Receive UDP traffic on the dns port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dns port. Domain to not audit. Send and receive UDP traffic on the dns port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dns port. Domain to not audit. Bind TCP sockets to the dns port. Domain allowed access. Bind UDP sockets to the dns port. Domain allowed access. Make a TCP connection to the dns port. Domain allowed access. Send dns_client packets. Domain allowed access. Do not audit attempts to send dns_client packets. Domain to not audit. Receive dns_client packets. Domain allowed access. Do not audit attempts to receive dns_client packets. Domain allowed access. Send and receive dns_client packets. Domain allowed access. Do not audit attempts to send and receive dns_client packets. Domain to not audit. Relabel packets to dns_client the packet type. Domain allowed access. Send dns_server packets. Domain allowed access. Do not audit attempts to send dns_server packets. Domain to not audit. Receive dns_server packets. Domain allowed access. Do not audit attempts to receive dns_server packets. Domain allowed access. Send and receive dns_server packets. Domain allowed access. Do not audit attempts to send and receive dns_server packets. Domain to not audit. Relabel packets to dns_server the packet type. Domain allowed access. Send and receive TCP traffic on the dogtag port. Domain allowed access. Send UDP traffic on the dogtag port. Domain allowed access. Do not audit attempts to send UDP traffic on the dogtag port. Domain to not audit. Receive UDP traffic on the dogtag port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dogtag port. Domain to not audit. Send and receive UDP traffic on the dogtag port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dogtag port. Domain to not audit. Bind TCP sockets to the dogtag port. Domain allowed access. Bind UDP sockets to the dogtag port. Domain allowed access. Make a TCP connection to the dogtag port. Domain allowed access. Send dogtag_client packets. Domain allowed access. Do not audit attempts to send dogtag_client packets. Domain to not audit. Receive dogtag_client packets. Domain allowed access. Do not audit attempts to receive dogtag_client packets. Domain allowed access. Send and receive dogtag_client packets. Domain allowed access. Do not audit attempts to send and receive dogtag_client packets. Domain to not audit. Relabel packets to dogtag_client the packet type. Domain allowed access. Send dogtag_server packets. Domain allowed access. Do not audit attempts to send dogtag_server packets. Domain to not audit. Receive dogtag_server packets. Domain allowed access. Do not audit attempts to receive dogtag_server packets. Domain allowed access. Send and receive dogtag_server packets. Domain allowed access. Do not audit attempts to send and receive dogtag_server packets. Domain to not audit. Relabel packets to dogtag_server the packet type. Domain allowed access. Send and receive TCP traffic on the dspam port. Domain allowed access. Send UDP traffic on the dspam port. Domain allowed access. Do not audit attempts to send UDP traffic on the dspam port. Domain to not audit. Receive UDP traffic on the dspam port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dspam port. Domain to not audit. Send and receive UDP traffic on the dspam port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dspam port. Domain to not audit. Bind TCP sockets to the dspam port. Domain allowed access. Bind UDP sockets to the dspam port. Domain allowed access. Make a TCP connection to the dspam port. Domain allowed access. Send dspam_client packets. Domain allowed access. Do not audit attempts to send dspam_client packets. Domain to not audit. Receive dspam_client packets. Domain allowed access. Do not audit attempts to receive dspam_client packets. Domain allowed access. Send and receive dspam_client packets. Domain allowed access. Do not audit attempts to send and receive dspam_client packets. Domain to not audit. Relabel packets to dspam_client the packet type. Domain allowed access. Send dspam_server packets. Domain allowed access. Do not audit attempts to send dspam_server packets. Domain to not audit. Receive dspam_server packets. Domain allowed access. Do not audit attempts to receive dspam_server packets. Domain allowed access. Send and receive dspam_server packets. Domain allowed access. Do not audit attempts to send and receive dspam_server packets. Domain to not audit. Relabel packets to dspam_server the packet type. Domain allowed access. Send and receive TCP traffic on the epmap port. Domain allowed access. Send UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to send UDP traffic on the epmap port. Domain to not audit. Receive UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the epmap port. Domain to not audit. Send and receive UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the epmap port. Domain to not audit. Bind TCP sockets to the epmap port. Domain allowed access. Bind UDP sockets to the epmap port. Domain allowed access. Make a TCP connection to the epmap port. Domain allowed access. Send epmap_client packets. Domain allowed access. Do not audit attempts to send epmap_client packets. Domain to not audit. Receive epmap_client packets. Domain allowed access. Do not audit attempts to receive epmap_client packets. Domain allowed access. Send and receive epmap_client packets. Domain allowed access. Do not audit attempts to send and receive epmap_client packets. Domain to not audit. Relabel packets to epmap_client the packet type. Domain allowed access. Send epmap_server packets. Domain allowed access. Do not audit attempts to send epmap_server packets. Domain to not audit. Receive epmap_server packets. Domain allowed access. Do not audit attempts to receive epmap_server packets. Domain allowed access. Send and receive epmap_server packets. Domain allowed access. Do not audit attempts to send and receive epmap_server packets. Domain to not audit. Relabel packets to epmap_server the packet type. Domain allowed access. Send and receive TCP traffic on the festival port. Domain allowed access. Send UDP traffic on the festival port. Domain allowed access. Do not audit attempts to send UDP traffic on the festival port. Domain to not audit. Receive UDP traffic on the festival port. Domain allowed access. Do not audit attempts to receive UDP traffic on the festival port. Domain to not audit. Send and receive UDP traffic on the festival port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the festival port. Domain to not audit. Bind TCP sockets to the festival port. Domain allowed access. Bind UDP sockets to the festival port. Domain allowed access. Make a TCP connection to the festival port. Domain allowed access. Send festival_client packets. Domain allowed access. Do not audit attempts to send festival_client packets. Domain to not audit. Receive festival_client packets. Domain allowed access. Do not audit attempts to receive festival_client packets. Domain allowed access. Send and receive festival_client packets. Domain allowed access. Do not audit attempts to send and receive festival_client packets. Domain to not audit. Relabel packets to festival_client the packet type. Domain allowed access. Send festival_server packets. Domain allowed access. Do not audit attempts to send festival_server packets. Domain to not audit. Receive festival_server packets. Domain allowed access. Do not audit attempts to receive festival_server packets. Domain allowed access. Send and receive festival_server packets. Domain allowed access. Do not audit attempts to send and receive festival_server packets. Domain to not audit. Relabel packets to festival_server the packet type. Domain allowed access. Send and receive TCP traffic on the fingerd port. Domain allowed access. Send UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to send UDP traffic on the fingerd port. Domain to not audit. Receive UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the fingerd port. Domain to not audit. Send and receive UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the fingerd port. Domain to not audit. Bind TCP sockets to the fingerd port. Domain allowed access. Bind UDP sockets to the fingerd port. Domain allowed access. Make a TCP connection to the fingerd port. Domain allowed access. Send fingerd_client packets. Domain allowed access. Do not audit attempts to send fingerd_client packets. Domain to not audit. Receive fingerd_client packets. Domain allowed access. Do not audit attempts to receive fingerd_client packets. Domain allowed access. Send and receive fingerd_client packets. Domain allowed access. Do not audit attempts to send and receive fingerd_client packets. Domain to not audit. Relabel packets to fingerd_client the packet type. Domain allowed access. Send fingerd_server packets. Domain allowed access. Do not audit attempts to send fingerd_server packets. Domain to not audit. Receive fingerd_server packets. Domain allowed access. Do not audit attempts to receive fingerd_server packets. Domain allowed access. Send and receive fingerd_server packets. Domain allowed access. Do not audit attempts to send and receive fingerd_server packets. Domain to not audit. Relabel packets to fingerd_server the packet type. Domain allowed access. Send and receive TCP traffic on the flash port. Domain allowed access. Send UDP traffic on the flash port. Domain allowed access. Do not audit attempts to send UDP traffic on the flash port. Domain to not audit. Receive UDP traffic on the flash port. Domain allowed access. Do not audit attempts to receive UDP traffic on the flash port. Domain to not audit. Send and receive UDP traffic on the flash port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the flash port. Domain to not audit. Bind TCP sockets to the flash port. Domain allowed access. Bind UDP sockets to the flash port. Domain allowed access. Make a TCP connection to the flash port. Domain allowed access. Send flash_client packets. Domain allowed access. Do not audit attempts to send flash_client packets. Domain to not audit. Receive flash_client packets. Domain allowed access. Do not audit attempts to receive flash_client packets. Domain allowed access. Send and receive flash_client packets. Domain allowed access. Do not audit attempts to send and receive flash_client packets. Domain to not audit. Relabel packets to flash_client the packet type. Domain allowed access. Send flash_server packets. Domain allowed access. Do not audit attempts to send flash_server packets. Domain to not audit. Receive flash_server packets. Domain allowed access. Do not audit attempts to receive flash_server packets. Domain allowed access. Send and receive flash_server packets. Domain allowed access. Do not audit attempts to send and receive flash_server packets. Domain to not audit. Relabel packets to flash_server the packet type. Domain allowed access. Send and receive TCP traffic on the florence port. Domain allowed access. Send UDP traffic on the florence port. Domain allowed access. Do not audit attempts to send UDP traffic on the florence port. Domain to not audit. Receive UDP traffic on the florence port. Domain allowed access. Do not audit attempts to receive UDP traffic on the florence port. Domain to not audit. Send and receive UDP traffic on the florence port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the florence port. Domain to not audit. Bind TCP sockets to the florence port. Domain allowed access. Bind UDP sockets to the florence port. Domain allowed access. Make a TCP connection to the florence port. Domain allowed access. Send florence_client packets. Domain allowed access. Do not audit attempts to send florence_client packets. Domain to not audit. Receive florence_client packets. Domain allowed access. Do not audit attempts to receive florence_client packets. Domain allowed access. Send and receive florence_client packets. Domain allowed access. Do not audit attempts to send and receive florence_client packets. Domain to not audit. Relabel packets to florence_client the packet type. Domain allowed access. Send florence_server packets. Domain allowed access. Do not audit attempts to send florence_server packets. Domain to not audit. Receive florence_server packets. Domain allowed access. Do not audit attempts to receive florence_server packets. Domain allowed access. Send and receive florence_server packets. Domain allowed access. Do not audit attempts to send and receive florence_server packets. Domain to not audit. Relabel packets to florence_server the packet type. Domain allowed access. Send and receive TCP traffic on the freeipmi port. Domain allowed access. Send UDP traffic on the freeipmi port. Domain allowed access. Do not audit attempts to send UDP traffic on the freeipmi port. Domain to not audit. Receive UDP traffic on the freeipmi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the freeipmi port. Domain to not audit. Send and receive UDP traffic on the freeipmi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the freeipmi port. Domain to not audit. Bind TCP sockets to the freeipmi port. Domain allowed access. Bind UDP sockets to the freeipmi port. Domain allowed access. Make a TCP connection to the freeipmi port. Domain allowed access. Send freeipmi_client packets. Domain allowed access. Do not audit attempts to send freeipmi_client packets. Domain to not audit. Receive freeipmi_client packets. Domain allowed access. Do not audit attempts to receive freeipmi_client packets. Domain allowed access. Send and receive freeipmi_client packets. Domain allowed access. Do not audit attempts to send and receive freeipmi_client packets. Domain to not audit. Relabel packets to freeipmi_client the packet type. Domain allowed access. Send freeipmi_server packets. Domain allowed access. Do not audit attempts to send freeipmi_server packets. Domain to not audit. Receive freeipmi_server packets. Domain allowed access. Do not audit attempts to receive freeipmi_server packets. Domain allowed access. Send and receive freeipmi_server packets. Domain allowed access. Do not audit attempts to send and receive freeipmi_server packets. Domain to not audit. Relabel packets to freeipmi_server the packet type. Domain allowed access. Send and receive TCP traffic on the ftp port. Domain allowed access. Send UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ftp port. Domain to not audit. Receive UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ftp port. Domain to not audit. Send and receive UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ftp port. Domain to not audit. Bind TCP sockets to the ftp port. Domain allowed access. Bind UDP sockets to the ftp port. Domain allowed access. Make a TCP connection to the ftp port. Domain allowed access. Send ftp_client packets. Domain allowed access. Do not audit attempts to send ftp_client packets. Domain to not audit. Receive ftp_client packets. Domain allowed access. Do not audit attempts to receive ftp_client packets. Domain allowed access. Send and receive ftp_client packets. Domain allowed access. Do not audit attempts to send and receive ftp_client packets. Domain to not audit. Relabel packets to ftp_client the packet type. Domain allowed access. Send ftp_server packets. Domain allowed access. Do not audit attempts to send ftp_server packets. Domain to not audit. Receive ftp_server packets. Domain allowed access. Do not audit attempts to receive ftp_server packets. Domain allowed access. Send and receive ftp_server packets. Domain allowed access. Do not audit attempts to send and receive ftp_server packets. Domain to not audit. Relabel packets to ftp_server the packet type. Domain allowed access. Send and receive TCP traffic on the ftp_data port. Domain allowed access. Send UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to send UDP traffic on the ftp_data port. Domain to not audit. Receive UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ftp_data port. Domain to not audit. Send and receive UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ftp_data port. Domain to not audit. Bind TCP sockets to the ftp_data port. Domain allowed access. Bind UDP sockets to the ftp_data port. Domain allowed access. Make a TCP connection to the ftp_data port. Domain allowed access. Send ftp_data_client packets. Domain allowed access. Do not audit attempts to send ftp_data_client packets. Domain to not audit. Receive ftp_data_client packets. Domain allowed access. Do not audit attempts to receive ftp_data_client packets. Domain allowed access. Send and receive ftp_data_client packets. Domain allowed access. Do not audit attempts to send and receive ftp_data_client packets. Domain to not audit. Relabel packets to ftp_data_client the packet type. Domain allowed access. Send ftp_data_server packets. Domain allowed access. Do not audit attempts to send ftp_data_server packets. Domain to not audit. Receive ftp_data_server packets. Domain allowed access. Do not audit attempts to receive ftp_data_server packets. Domain allowed access. Send and receive ftp_data_server packets. Domain allowed access. Do not audit attempts to send and receive ftp_data_server packets. Domain to not audit. Relabel packets to ftp_data_server the packet type. Domain allowed access. Send and receive TCP traffic on the gatekeeper port. Domain allowed access. Send UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to send UDP traffic on the gatekeeper port. Domain to not audit. Receive UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gatekeeper port. Domain to not audit. Send and receive UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gatekeeper port. Domain to not audit. Bind TCP sockets to the gatekeeper port. Domain allowed access. Bind UDP sockets to the gatekeeper port. Domain allowed access. Make a TCP connection to the gatekeeper port. Domain allowed access. Send gatekeeper_client packets. Domain allowed access. Do not audit attempts to send gatekeeper_client packets. Domain to not audit. Receive gatekeeper_client packets. Domain allowed access. Do not audit attempts to receive gatekeeper_client packets. Domain allowed access. Send and receive gatekeeper_client packets. Domain allowed access. Do not audit attempts to send and receive gatekeeper_client packets. Domain to not audit. Relabel packets to gatekeeper_client the packet type. Domain allowed access. Send gatekeeper_server packets. Domain allowed access. Do not audit attempts to send gatekeeper_server packets. Domain to not audit. Receive gatekeeper_server packets. Domain allowed access. Do not audit attempts to receive gatekeeper_server packets. Domain allowed access. Send and receive gatekeeper_server packets. Domain allowed access. Do not audit attempts to send and receive gatekeeper_server packets. Domain to not audit. Relabel packets to gatekeeper_server the packet type. Domain allowed access. Send and receive TCP traffic on the giftd port. Domain allowed access. Send UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to send UDP traffic on the giftd port. Domain to not audit. Receive UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the giftd port. Domain to not audit. Send and receive UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the giftd port. Domain to not audit. Bind TCP sockets to the giftd port. Domain allowed access. Bind UDP sockets to the giftd port. Domain allowed access. Make a TCP connection to the giftd port. Domain allowed access. Send giftd_client packets. Domain allowed access. Do not audit attempts to send giftd_client packets. Domain to not audit. Receive giftd_client packets. Domain allowed access. Do not audit attempts to receive giftd_client packets. Domain allowed access. Send and receive giftd_client packets. Domain allowed access. Do not audit attempts to send and receive giftd_client packets. Domain to not audit. Relabel packets to giftd_client the packet type. Domain allowed access. Send giftd_server packets. Domain allowed access. Do not audit attempts to send giftd_server packets. Domain to not audit. Receive giftd_server packets. Domain allowed access. Do not audit attempts to receive giftd_server packets. Domain allowed access. Send and receive giftd_server packets. Domain allowed access. Do not audit attempts to send and receive giftd_server packets. Domain to not audit. Relabel packets to giftd_server the packet type. Domain allowed access. Send and receive TCP traffic on the git port. Domain allowed access. Send UDP traffic on the git port. Domain allowed access. Do not audit attempts to send UDP traffic on the git port. Domain to not audit. Receive UDP traffic on the git port. Domain allowed access. Do not audit attempts to receive UDP traffic on the git port. Domain to not audit. Send and receive UDP traffic on the git port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the git port. Domain to not audit. Bind TCP sockets to the git port. Domain allowed access. Bind UDP sockets to the git port. Domain allowed access. Make a TCP connection to the git port. Domain allowed access. Send git_client packets. Domain allowed access. Do not audit attempts to send git_client packets. Domain to not audit. Receive git_client packets. Domain allowed access. Do not audit attempts to receive git_client packets. Domain allowed access. Send and receive git_client packets. Domain allowed access. Do not audit attempts to send and receive git_client packets. Domain to not audit. Relabel packets to git_client the packet type. Domain allowed access. Send git_server packets. Domain allowed access. Do not audit attempts to send git_server packets. Domain to not audit. Receive git_server packets. Domain allowed access. Do not audit attempts to receive git_server packets. Domain allowed access. Send and receive git_server packets. Domain allowed access. Do not audit attempts to send and receive git_server packets. Domain to not audit. Relabel packets to git_server the packet type. Domain allowed access. Send and receive TCP traffic on the glance port. Domain allowed access. Send UDP traffic on the glance port. Domain allowed access. Do not audit attempts to send UDP traffic on the glance port. Domain to not audit. Receive UDP traffic on the glance port. Domain allowed access. Do not audit attempts to receive UDP traffic on the glance port. Domain to not audit. Send and receive UDP traffic on the glance port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the glance port. Domain to not audit. Bind TCP sockets to the glance port. Domain allowed access. Bind UDP sockets to the glance port. Domain allowed access. Make a TCP connection to the glance port. Domain allowed access. Send glance_client packets. Domain allowed access. Do not audit attempts to send glance_client packets. Domain to not audit. Receive glance_client packets. Domain allowed access. Do not audit attempts to receive glance_client packets. Domain allowed access. Send and receive glance_client packets. Domain allowed access. Do not audit attempts to send and receive glance_client packets. Domain to not audit. Relabel packets to glance_client the packet type. Domain allowed access. Send glance_server packets. Domain allowed access. Do not audit attempts to send glance_server packets. Domain to not audit. Receive glance_server packets. Domain allowed access. Do not audit attempts to receive glance_server packets. Domain allowed access. Send and receive glance_server packets. Domain allowed access. Do not audit attempts to send and receive glance_server packets. Domain to not audit. Relabel packets to glance_server the packet type. Domain allowed access. Send and receive TCP traffic on the glance_registry port. Domain allowed access. Send UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to send UDP traffic on the glance_registry port. Domain to not audit. Receive UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to receive UDP traffic on the glance_registry port. Domain to not audit. Send and receive UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the glance_registry port. Domain to not audit. Bind TCP sockets to the glance_registry port. Domain allowed access. Bind UDP sockets to the glance_registry port. Domain allowed access. Make a TCP connection to the glance_registry port. Domain allowed access. Send glance_registry_client packets. Domain allowed access. Do not audit attempts to send glance_registry_client packets. Domain to not audit. Receive glance_registry_client packets. Domain allowed access. Do not audit attempts to receive glance_registry_client packets. Domain allowed access. Send and receive glance_registry_client packets. Domain allowed access. Do not audit attempts to send and receive glance_registry_client packets. Domain to not audit. Relabel packets to glance_registry_client the packet type. Domain allowed access. Send glance_registry_server packets. Domain allowed access. Do not audit attempts to send glance_registry_server packets. Domain to not audit. Receive glance_registry_server packets. Domain allowed access. Do not audit attempts to receive glance_registry_server packets. Domain allowed access. Send and receive glance_registry_server packets. Domain allowed access. Do not audit attempts to send and receive glance_registry_server packets. Domain to not audit. Relabel packets to glance_registry_server the packet type. Domain allowed access. Send and receive TCP traffic on the gopher port. Domain allowed access. Send UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to send UDP traffic on the gopher port. Domain to not audit. Receive UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gopher port. Domain to not audit. Send and receive UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gopher port. Domain to not audit. Bind TCP sockets to the gopher port. Domain allowed access. Bind UDP sockets to the gopher port. Domain allowed access. Make a TCP connection to the gopher port. Domain allowed access. Send gopher_client packets. Domain allowed access. Do not audit attempts to send gopher_client packets. Domain to not audit. Receive gopher_client packets. Domain allowed access. Do not audit attempts to receive gopher_client packets. Domain allowed access. Send and receive gopher_client packets. Domain allowed access. Do not audit attempts to send and receive gopher_client packets. Domain to not audit. Relabel packets to gopher_client the packet type. Domain allowed access. Send gopher_server packets. Domain allowed access. Do not audit attempts to send gopher_server packets. Domain to not audit. Receive gopher_server packets. Domain allowed access. Do not audit attempts to receive gopher_server packets. Domain allowed access. Send and receive gopher_server packets. Domain allowed access. Do not audit attempts to send and receive gopher_server packets. Domain to not audit. Relabel packets to gopher_server the packet type. Domain allowed access. Send and receive TCP traffic on the gpsd port. Domain allowed access. Send UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to send UDP traffic on the gpsd port. Domain to not audit. Receive UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gpsd port. Domain to not audit. Send and receive UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gpsd port. Domain to not audit. Bind TCP sockets to the gpsd port. Domain allowed access. Bind UDP sockets to the gpsd port. Domain allowed access. Make a TCP connection to the gpsd port. Domain allowed access. Send gpsd_client packets. Domain allowed access. Do not audit attempts to send gpsd_client packets. Domain to not audit. Receive gpsd_client packets. Domain allowed access. Do not audit attempts to receive gpsd_client packets. Domain allowed access. Send and receive gpsd_client packets. Domain allowed access. Do not audit attempts to send and receive gpsd_client packets. Domain to not audit. Relabel packets to gpsd_client the packet type. Domain allowed access. Send gpsd_server packets. Domain allowed access. Do not audit attempts to send gpsd_server packets. Domain to not audit. Receive gpsd_server packets. Domain allowed access. Do not audit attempts to receive gpsd_server packets. Domain allowed access. Send and receive gpsd_server packets. Domain allowed access. Do not audit attempts to send and receive gpsd_server packets. Domain to not audit. Relabel packets to gpsd_server the packet type. Domain allowed access. Send and receive TCP traffic on the hddtemp port. Domain allowed access. Send UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to send UDP traffic on the hddtemp port. Domain to not audit. Receive UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hddtemp port. Domain to not audit. Send and receive UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hddtemp port. Domain to not audit. Bind TCP sockets to the hddtemp port. Domain allowed access. Bind UDP sockets to the hddtemp port. Domain allowed access. Make a TCP connection to the hddtemp port. Domain allowed access. Send hddtemp_client packets. Domain allowed access. Do not audit attempts to send hddtemp_client packets. Domain to not audit. Receive hddtemp_client packets. Domain allowed access. Do not audit attempts to receive hddtemp_client packets. Domain allowed access. Send and receive hddtemp_client packets. Domain allowed access. Do not audit attempts to send and receive hddtemp_client packets. Domain to not audit. Relabel packets to hddtemp_client the packet type. Domain allowed access. Send hddtemp_server packets. Domain allowed access. Do not audit attempts to send hddtemp_server packets. Domain to not audit. Receive hddtemp_server packets. Domain allowed access. Do not audit attempts to receive hddtemp_server packets. Domain allowed access. Send and receive hddtemp_server packets. Domain allowed access. Do not audit attempts to send and receive hddtemp_server packets. Domain to not audit. Relabel packets to hddtemp_server the packet type. Domain allowed access. Send and receive TCP traffic on the howl port. Domain allowed access. Send UDP traffic on the howl port. Domain allowed access. Do not audit attempts to send UDP traffic on the howl port. Domain to not audit. Receive UDP traffic on the howl port. Domain allowed access. Do not audit attempts to receive UDP traffic on the howl port. Domain to not audit. Send and receive UDP traffic on the howl port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the howl port. Domain to not audit. Bind TCP sockets to the howl port. Domain allowed access. Bind UDP sockets to the howl port. Domain allowed access. Make a TCP connection to the howl port. Domain allowed access. Send howl_client packets. Domain allowed access. Do not audit attempts to send howl_client packets. Domain to not audit. Receive howl_client packets. Domain allowed access. Do not audit attempts to receive howl_client packets. Domain allowed access. Send and receive howl_client packets. Domain allowed access. Do not audit attempts to send and receive howl_client packets. Domain to not audit. Relabel packets to howl_client the packet type. Domain allowed access. Send howl_server packets. Domain allowed access. Do not audit attempts to send howl_server packets. Domain to not audit. Receive howl_server packets. Domain allowed access. Do not audit attempts to receive howl_server packets. Domain allowed access. Send and receive howl_server packets. Domain allowed access. Do not audit attempts to send and receive howl_server packets. Domain to not audit. Relabel packets to howl_server the packet type. Domain allowed access. Send and receive TCP traffic on the hplip port. Domain allowed access. Send UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to send UDP traffic on the hplip port. Domain to not audit. Receive UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hplip port. Domain to not audit. Send and receive UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hplip port. Domain to not audit. Bind TCP sockets to the hplip port. Domain allowed access. Bind UDP sockets to the hplip port. Domain allowed access. Make a TCP connection to the hplip port. Domain allowed access. Send hplip_client packets. Domain allowed access. Do not audit attempts to send hplip_client packets. Domain to not audit. Receive hplip_client packets. Domain allowed access. Do not audit attempts to receive hplip_client packets. Domain allowed access. Send and receive hplip_client packets. Domain allowed access. Do not audit attempts to send and receive hplip_client packets. Domain to not audit. Relabel packets to hplip_client the packet type. Domain allowed access. Send hplip_server packets. Domain allowed access. Do not audit attempts to send hplip_server packets. Domain to not audit. Receive hplip_server packets. Domain allowed access. Do not audit attempts to receive hplip_server packets. Domain allowed access. Send and receive hplip_server packets. Domain allowed access. Do not audit attempts to send and receive hplip_server packets. Domain to not audit. Relabel packets to hplip_server the packet type. Domain allowed access. Send and receive TCP traffic on the http port. Domain allowed access. Send UDP traffic on the http port. Domain allowed access. Do not audit attempts to send UDP traffic on the http port. Domain to not audit. Receive UDP traffic on the http port. Domain allowed access. Do not audit attempts to receive UDP traffic on the http port. Domain to not audit. Send and receive UDP traffic on the http port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the http port. Domain to not audit. Bind TCP sockets to the http port. Domain allowed access. Bind UDP sockets to the http port. Domain allowed access. Make a TCP connection to the http port. Domain allowed access. Send http_client packets. Domain allowed access. Do not audit attempts to send http_client packets. Domain to not audit. Receive http_client packets. Domain allowed access. Do not audit attempts to receive http_client packets. Domain allowed access. Send and receive http_client packets. Domain allowed access. Do not audit attempts to send and receive http_client packets. Domain to not audit. Relabel packets to http_client the packet type. Domain allowed access. Send http_server packets. Domain allowed access. Do not audit attempts to send http_server packets. Domain to not audit. Receive http_server packets. Domain allowed access. Do not audit attempts to receive http_server packets. Domain allowed access. Send and receive http_server packets. Domain allowed access. Do not audit attempts to send and receive http_server packets. Domain to not audit. Relabel packets to http_server the packet type. Domain allowed access. Send and receive TCP traffic on the http_cache port. Domain allowed access. Send UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to send UDP traffic on the http_cache port. Domain to not audit. Receive UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to receive UDP traffic on the http_cache port. Domain to not audit. Send and receive UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the http_cache port. Domain to not audit. Bind TCP sockets to the http_cache port. Domain allowed access. Bind UDP sockets to the http_cache port. Domain allowed access. Make a TCP connection to the http_cache port. Domain allowed access. Send http_cache_client packets. Domain allowed access. Do not audit attempts to send http_cache_client packets. Domain to not audit. Receive http_cache_client packets. Domain allowed access. Do not audit attempts to receive http_cache_client packets. Domain allowed access. Send and receive http_cache_client packets. Domain allowed access. Do not audit attempts to send and receive http_cache_client packets. Domain to not audit. Relabel packets to http_cache_client the packet type. Domain allowed access. Send http_cache_server packets. Domain allowed access. Do not audit attempts to send http_cache_server packets. Domain to not audit. Receive http_cache_server packets. Domain allowed access. Do not audit attempts to receive http_cache_server packets. Domain allowed access. Send and receive http_cache_server packets. Domain allowed access. Do not audit attempts to send and receive http_cache_server packets. Domain to not audit. Relabel packets to http_cache_server the packet type. Domain allowed access. Send and receive TCP traffic on the i18n_input port. Domain allowed access. Send UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to send UDP traffic on the i18n_input port. Domain to not audit. Receive UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to receive UDP traffic on the i18n_input port. Domain to not audit. Send and receive UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the i18n_input port. Domain to not audit. Bind TCP sockets to the i18n_input port. Domain allowed access. Bind UDP sockets to the i18n_input port. Domain allowed access. Make a TCP connection to the i18n_input port. Domain allowed access. Send i18n_input_client packets. Domain allowed access. Do not audit attempts to send i18n_input_client packets. Domain to not audit. Receive i18n_input_client packets. Domain allowed access. Do not audit attempts to receive i18n_input_client packets. Domain allowed access. Send and receive i18n_input_client packets. Domain allowed access. Do not audit attempts to send and receive i18n_input_client packets. Domain to not audit. Relabel packets to i18n_input_client the packet type. Domain allowed access. Send i18n_input_server packets. Domain allowed access. Do not audit attempts to send i18n_input_server packets. Domain to not audit. Receive i18n_input_server packets. Domain allowed access. Do not audit attempts to receive i18n_input_server packets. Domain allowed access. Send and receive i18n_input_server packets. Domain allowed access. Do not audit attempts to send and receive i18n_input_server packets. Domain to not audit. Relabel packets to i18n_input_server the packet type. Domain allowed access. Send and receive TCP traffic on the imaze port. Domain allowed access. Send UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to send UDP traffic on the imaze port. Domain to not audit. Receive UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to receive UDP traffic on the imaze port. Domain to not audit. Send and receive UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the imaze port. Domain to not audit. Bind TCP sockets to the imaze port. Domain allowed access. Bind UDP sockets to the imaze port. Domain allowed access. Make a TCP connection to the imaze port. Domain allowed access. Send imaze_client packets. Domain allowed access. Do not audit attempts to send imaze_client packets. Domain to not audit. Receive imaze_client packets. Domain allowed access. Do not audit attempts to receive imaze_client packets. Domain allowed access. Send and receive imaze_client packets. Domain allowed access. Do not audit attempts to send and receive imaze_client packets. Domain to not audit. Relabel packets to imaze_client the packet type. Domain allowed access. Send imaze_server packets. Domain allowed access. Do not audit attempts to send imaze_server packets. Domain to not audit. Receive imaze_server packets. Domain allowed access. Do not audit attempts to receive imaze_server packets. Domain allowed access. Send and receive imaze_server packets. Domain allowed access. Do not audit attempts to send and receive imaze_server packets. Domain to not audit. Relabel packets to imaze_server the packet type. Domain allowed access. Send and receive TCP traffic on the inetd_child port. Domain allowed access. Send UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to send UDP traffic on the inetd_child port. Domain to not audit. Receive UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to receive UDP traffic on the inetd_child port. Domain to not audit. Send and receive UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the inetd_child port. Domain to not audit. Bind TCP sockets to the inetd_child port. Domain allowed access. Bind UDP sockets to the inetd_child port. Domain allowed access. Make a TCP connection to the inetd_child port. Domain allowed access. Send inetd_child_client packets. Domain allowed access. Do not audit attempts to send inetd_child_client packets. Domain to not audit. Receive inetd_child_client packets. Domain allowed access. Do not audit attempts to receive inetd_child_client packets. Domain allowed access. Send and receive inetd_child_client packets. Domain allowed access. Do not audit attempts to send and receive inetd_child_client packets. Domain to not audit. Relabel packets to inetd_child_client the packet type. Domain allowed access. Send inetd_child_server packets. Domain allowed access. Do not audit attempts to send inetd_child_server packets. Domain to not audit. Receive inetd_child_server packets. Domain allowed access. Do not audit attempts to receive inetd_child_server packets. Domain allowed access. Send and receive inetd_child_server packets. Domain allowed access. Do not audit attempts to send and receive inetd_child_server packets. Domain to not audit. Relabel packets to inetd_child_server the packet type. Domain allowed access. Send and receive TCP traffic on the innd port. Domain allowed access. Send UDP traffic on the innd port. Domain allowed access. Do not audit attempts to send UDP traffic on the innd port. Domain to not audit. Receive UDP traffic on the innd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the innd port. Domain to not audit. Send and receive UDP traffic on the innd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the innd port. Domain to not audit. Bind TCP sockets to the innd port. Domain allowed access. Bind UDP sockets to the innd port. Domain allowed access. Make a TCP connection to the innd port. Domain allowed access. Send innd_client packets. Domain allowed access. Do not audit attempts to send innd_client packets. Domain to not audit. Receive innd_client packets. Domain allowed access. Do not audit attempts to receive innd_client packets. Domain allowed access. Send and receive innd_client packets. Domain allowed access. Do not audit attempts to send and receive innd_client packets. Domain to not audit. Relabel packets to innd_client the packet type. Domain allowed access. Send innd_server packets. Domain allowed access. Do not audit attempts to send innd_server packets. Domain to not audit. Receive innd_server packets. Domain allowed access. Do not audit attempts to receive innd_server packets. Domain allowed access. Send and receive innd_server packets. Domain allowed access. Do not audit attempts to send and receive innd_server packets. Domain to not audit. Relabel packets to innd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ionixnetmon port. Domain allowed access. Send UDP traffic on the ionixnetmon port. Domain allowed access. Do not audit attempts to send UDP traffic on the ionixnetmon port. Domain to not audit. Receive UDP traffic on the ionixnetmon port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ionixnetmon port. Domain to not audit. Send and receive UDP traffic on the ionixnetmon port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ionixnetmon port. Domain to not audit. Bind TCP sockets to the ionixnetmon port. Domain allowed access. Bind UDP sockets to the ionixnetmon port. Domain allowed access. Make a TCP connection to the ionixnetmon port. Domain allowed access. Send ionixnetmon_client packets. Domain allowed access. Do not audit attempts to send ionixnetmon_client packets. Domain to not audit. Receive ionixnetmon_client packets. Domain allowed access. Do not audit attempts to receive ionixnetmon_client packets. Domain allowed access. Send and receive ionixnetmon_client packets. Domain allowed access. Do not audit attempts to send and receive ionixnetmon_client packets. Domain to not audit. Relabel packets to ionixnetmon_client the packet type. Domain allowed access. Send ionixnetmon_server packets. Domain allowed access. Do not audit attempts to send ionixnetmon_server packets. Domain to not audit. Receive ionixnetmon_server packets. Domain allowed access. Do not audit attempts to receive ionixnetmon_server packets. Domain allowed access. Send and receive ionixnetmon_server packets. Domain allowed access. Do not audit attempts to send and receive ionixnetmon_server packets. Domain to not audit. Relabel packets to ionixnetmon_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipmi port. Domain allowed access. Send UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipmi port. Domain to not audit. Receive UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipmi port. Domain to not audit. Send and receive UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipmi port. Domain to not audit. Bind TCP sockets to the ipmi port. Domain allowed access. Bind UDP sockets to the ipmi port. Domain allowed access. Make a TCP connection to the ipmi port. Domain allowed access. Send ipmi_client packets. Domain allowed access. Do not audit attempts to send ipmi_client packets. Domain to not audit. Receive ipmi_client packets. Domain allowed access. Do not audit attempts to receive ipmi_client packets. Domain allowed access. Send and receive ipmi_client packets. Domain allowed access. Do not audit attempts to send and receive ipmi_client packets. Domain to not audit. Relabel packets to ipmi_client the packet type. Domain allowed access. Send ipmi_server packets. Domain allowed access. Do not audit attempts to send ipmi_server packets. Domain to not audit. Receive ipmi_server packets. Domain allowed access. Do not audit attempts to receive ipmi_server packets. Domain allowed access. Send and receive ipmi_server packets. Domain allowed access. Do not audit attempts to send and receive ipmi_server packets. Domain to not audit. Relabel packets to ipmi_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipp port. Domain allowed access. Send UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipp port. Domain to not audit. Receive UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipp port. Domain to not audit. Send and receive UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipp port. Domain to not audit. Bind TCP sockets to the ipp port. Domain allowed access. Bind UDP sockets to the ipp port. Domain allowed access. Make a TCP connection to the ipp port. Domain allowed access. Send ipp_client packets. Domain allowed access. Do not audit attempts to send ipp_client packets. Domain to not audit. Receive ipp_client packets. Domain allowed access. Do not audit attempts to receive ipp_client packets. Domain allowed access. Send and receive ipp_client packets. Domain allowed access. Do not audit attempts to send and receive ipp_client packets. Domain to not audit. Relabel packets to ipp_client the packet type. Domain allowed access. Send ipp_server packets. Domain allowed access. Do not audit attempts to send ipp_server packets. Domain to not audit. Receive ipp_server packets. Domain allowed access. Do not audit attempts to receive ipp_server packets. Domain allowed access. Send and receive ipp_server packets. Domain allowed access. Do not audit attempts to send and receive ipp_server packets. Domain to not audit. Relabel packets to ipp_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipsecnat port. Domain allowed access. Send UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipsecnat port. Domain to not audit. Receive UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipsecnat port. Domain to not audit. Send and receive UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipsecnat port. Domain to not audit. Bind TCP sockets to the ipsecnat port. Domain allowed access. Bind UDP sockets to the ipsecnat port. Domain allowed access. Make a TCP connection to the ipsecnat port. Domain allowed access. Send ipsecnat_client packets. Domain allowed access. Do not audit attempts to send ipsecnat_client packets. Domain to not audit. Receive ipsecnat_client packets. Domain allowed access. Do not audit attempts to receive ipsecnat_client packets. Domain allowed access. Send and receive ipsecnat_client packets. Domain allowed access. Do not audit attempts to send and receive ipsecnat_client packets. Domain to not audit. Relabel packets to ipsecnat_client the packet type. Domain allowed access. Send ipsecnat_server packets. Domain allowed access. Do not audit attempts to send ipsecnat_server packets. Domain to not audit. Receive ipsecnat_server packets. Domain allowed access. Do not audit attempts to receive ipsecnat_server packets. Domain allowed access. Send and receive ipsecnat_server packets. Domain allowed access. Do not audit attempts to send and receive ipsecnat_server packets. Domain to not audit. Relabel packets to ipsecnat_server the packet type. Domain allowed access. Send and receive TCP traffic on the ircd port. Domain allowed access. Send UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to send UDP traffic on the ircd port. Domain to not audit. Receive UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ircd port. Domain to not audit. Send and receive UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ircd port. Domain to not audit. Bind TCP sockets to the ircd port. Domain allowed access. Bind UDP sockets to the ircd port. Domain allowed access. Make a TCP connection to the ircd port. Domain allowed access. Send ircd_client packets. Domain allowed access. Do not audit attempts to send ircd_client packets. Domain to not audit. Receive ircd_client packets. Domain allowed access. Do not audit attempts to receive ircd_client packets. Domain allowed access. Send and receive ircd_client packets. Domain allowed access. Do not audit attempts to send and receive ircd_client packets. Domain to not audit. Relabel packets to ircd_client the packet type. Domain allowed access. Send ircd_server packets. Domain allowed access. Do not audit attempts to send ircd_server packets. Domain to not audit. Receive ircd_server packets. Domain allowed access. Do not audit attempts to receive ircd_server packets. Domain allowed access. Send and receive ircd_server packets. Domain allowed access. Do not audit attempts to send and receive ircd_server packets. Domain to not audit. Relabel packets to ircd_server the packet type. Domain allowed access. Send and receive TCP traffic on the isakmp port. Domain allowed access. Send UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to send UDP traffic on the isakmp port. Domain to not audit. Receive UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the isakmp port. Domain to not audit. Send and receive UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the isakmp port. Domain to not audit. Bind TCP sockets to the isakmp port. Domain allowed access. Bind UDP sockets to the isakmp port. Domain allowed access. Make a TCP connection to the isakmp port. Domain allowed access. Send isakmp_client packets. Domain allowed access. Do not audit attempts to send isakmp_client packets. Domain to not audit. Receive isakmp_client packets. Domain allowed access. Do not audit attempts to receive isakmp_client packets. Domain allowed access. Send and receive isakmp_client packets. Domain allowed access. Do not audit attempts to send and receive isakmp_client packets. Domain to not audit. Relabel packets to isakmp_client the packet type. Domain allowed access. Send isakmp_server packets. Domain allowed access. Do not audit attempts to send isakmp_server packets. Domain to not audit. Receive isakmp_server packets. Domain allowed access. Do not audit attempts to receive isakmp_server packets. Domain allowed access. Send and receive isakmp_server packets. Domain allowed access. Do not audit attempts to send and receive isakmp_server packets. Domain to not audit. Relabel packets to isakmp_server the packet type. Domain allowed access. Send and receive TCP traffic on the iscsi port. Domain allowed access. Send UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to send UDP traffic on the iscsi port. Domain to not audit. Receive UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the iscsi port. Domain to not audit. Send and receive UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the iscsi port. Domain to not audit. Bind TCP sockets to the iscsi port. Domain allowed access. Bind UDP sockets to the iscsi port. Domain allowed access. Make a TCP connection to the iscsi port. Domain allowed access. Send iscsi_client packets. Domain allowed access. Do not audit attempts to send iscsi_client packets. Domain to not audit. Receive iscsi_client packets. Domain allowed access. Do not audit attempts to receive iscsi_client packets. Domain allowed access. Send and receive iscsi_client packets. Domain allowed access. Do not audit attempts to send and receive iscsi_client packets. Domain to not audit. Relabel packets to iscsi_client the packet type. Domain allowed access. Send iscsi_server packets. Domain allowed access. Do not audit attempts to send iscsi_server packets. Domain to not audit. Receive iscsi_server packets. Domain allowed access. Do not audit attempts to receive iscsi_server packets. Domain allowed access. Send and receive iscsi_server packets. Domain allowed access. Do not audit attempts to send and receive iscsi_server packets. Domain to not audit. Relabel packets to iscsi_server the packet type. Domain allowed access. Send and receive TCP traffic on the isns port. Domain allowed access. Send UDP traffic on the isns port. Domain allowed access. Do not audit attempts to send UDP traffic on the isns port. Domain to not audit. Receive UDP traffic on the isns port. Domain allowed access. Do not audit attempts to receive UDP traffic on the isns port. Domain to not audit. Send and receive UDP traffic on the isns port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the isns port. Domain to not audit. Bind TCP sockets to the isns port. Domain allowed access. Bind UDP sockets to the isns port. Domain allowed access. Make a TCP connection to the isns port. Domain allowed access. Send isns_client packets. Domain allowed access. Do not audit attempts to send isns_client packets. Domain to not audit. Receive isns_client packets. Domain allowed access. Do not audit attempts to receive isns_client packets. Domain allowed access. Send and receive isns_client packets. Domain allowed access. Do not audit attempts to send and receive isns_client packets. Domain to not audit. Relabel packets to isns_client the packet type. Domain allowed access. Send isns_server packets. Domain allowed access. Do not audit attempts to send isns_server packets. Domain to not audit. Receive isns_server packets. Domain allowed access. Do not audit attempts to receive isns_server packets. Domain allowed access. Send and receive isns_server packets. Domain allowed access. Do not audit attempts to send and receive isns_server packets. Domain to not audit. Relabel packets to isns_server the packet type. Domain allowed access. Send and receive TCP traffic on the jabber_client port. Domain allowed access. Send UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to send UDP traffic on the jabber_client port. Domain to not audit. Receive UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jabber_client port. Domain to not audit. Send and receive UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jabber_client port. Domain to not audit. Bind TCP sockets to the jabber_client port. Domain allowed access. Bind UDP sockets to the jabber_client port. Domain allowed access. Make a TCP connection to the jabber_client port. Domain allowed access. Send jabber_client_client packets. Domain allowed access. Do not audit attempts to send jabber_client_client packets. Domain to not audit. Receive jabber_client_client packets. Domain allowed access. Do not audit attempts to receive jabber_client_client packets. Domain allowed access. Send and receive jabber_client_client packets. Domain allowed access. Do not audit attempts to send and receive jabber_client_client packets. Domain to not audit. Relabel packets to jabber_client_client the packet type. Domain allowed access. Send jabber_client_server packets. Domain allowed access. Do not audit attempts to send jabber_client_server packets. Domain to not audit. Receive jabber_client_server packets. Domain allowed access. Do not audit attempts to receive jabber_client_server packets. Domain allowed access. Send and receive jabber_client_server packets. Domain allowed access. Do not audit attempts to send and receive jabber_client_server packets. Domain to not audit. Relabel packets to jabber_client_server the packet type. Domain allowed access. Send and receive TCP traffic on the jabber_interserver port. Domain allowed access. Send UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the jabber_interserver port. Domain to not audit. Receive UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jabber_interserver port. Domain to not audit. Send and receive UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jabber_interserver port. Domain to not audit. Bind TCP sockets to the jabber_interserver port. Domain allowed access. Bind UDP sockets to the jabber_interserver port. Domain allowed access. Make a TCP connection to the jabber_interserver port. Domain allowed access. Send jabber_interserver_client packets. Domain allowed access. Do not audit attempts to send jabber_interserver_client packets. Domain to not audit. Receive jabber_interserver_client packets. Domain allowed access. Do not audit attempts to receive jabber_interserver_client packets. Domain allowed access. Send and receive jabber_interserver_client packets. Domain allowed access. Do not audit attempts to send and receive jabber_interserver_client packets. Domain to not audit. Relabel packets to jabber_interserver_client the packet type. Domain allowed access. Send jabber_interserver_server packets. Domain allowed access. Do not audit attempts to send jabber_interserver_server packets. Domain to not audit. Receive jabber_interserver_server packets. Domain allowed access. Do not audit attempts to receive jabber_interserver_server packets. Domain allowed access. Send and receive jabber_interserver_server packets. Domain allowed access. Do not audit attempts to send and receive jabber_interserver_server packets. Domain to not audit. Relabel packets to jabber_interserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the jabber_router port. Domain allowed access. Send UDP traffic on the jabber_router port. Domain allowed access. Do not audit attempts to send UDP traffic on the jabber_router port. Domain to not audit. Receive UDP traffic on the jabber_router port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jabber_router port. Domain to not audit. Send and receive UDP traffic on the jabber_router port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jabber_router port. Domain to not audit. Bind TCP sockets to the jabber_router port. Domain allowed access. Bind UDP sockets to the jabber_router port. Domain allowed access. Make a TCP connection to the jabber_router port. Domain allowed access. Send jabber_router_client packets. Domain allowed access. Do not audit attempts to send jabber_router_client packets. Domain to not audit. Receive jabber_router_client packets. Domain allowed access. Do not audit attempts to receive jabber_router_client packets. Domain allowed access. Send and receive jabber_router_client packets. Domain allowed access. Do not audit attempts to send and receive jabber_router_client packets. Domain to not audit. Relabel packets to jabber_router_client the packet type. Domain allowed access. Send jabber_router_server packets. Domain allowed access. Do not audit attempts to send jabber_router_server packets. Domain to not audit. Receive jabber_router_server packets. Domain allowed access. Do not audit attempts to receive jabber_router_server packets. Domain allowed access. Send and receive jabber_router_server packets. Domain allowed access. Do not audit attempts to send and receive jabber_router_server packets. Domain to not audit. Relabel packets to jabber_router_server the packet type. Domain allowed access. Send and receive TCP traffic on the jacorb port. Domain allowed access. Send UDP traffic on the jacorb port. Domain allowed access. Do not audit attempts to send UDP traffic on the jacorb port. Domain to not audit. Receive UDP traffic on the jacorb port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jacorb port. Domain to not audit. Send and receive UDP traffic on the jacorb port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jacorb port. Domain to not audit. Bind TCP sockets to the jacorb port. Domain allowed access. Bind UDP sockets to the jacorb port. Domain allowed access. Make a TCP connection to the jacorb port. Domain allowed access. Send jacorb_client packets. Domain allowed access. Do not audit attempts to send jacorb_client packets. Domain to not audit. Receive jacorb_client packets. Domain allowed access. Do not audit attempts to receive jacorb_client packets. Domain allowed access. Send and receive jacorb_client packets. Domain allowed access. Do not audit attempts to send and receive jacorb_client packets. Domain to not audit. Relabel packets to jacorb_client the packet type. Domain allowed access. Send jacorb_server packets. Domain allowed access. Do not audit attempts to send jacorb_server packets. Domain to not audit. Receive jacorb_server packets. Domain allowed access. Do not audit attempts to receive jacorb_server packets. Domain allowed access. Send and receive jacorb_server packets. Domain allowed access. Do not audit attempts to send and receive jacorb_server packets. Domain to not audit. Relabel packets to jacorb_server the packet type. Domain allowed access. Send and receive TCP traffic on the jboss_debug port. Domain allowed access. Send UDP traffic on the jboss_debug port. Domain allowed access. Do not audit attempts to send UDP traffic on the jboss_debug port. Domain to not audit. Receive UDP traffic on the jboss_debug port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jboss_debug port. Domain to not audit. Send and receive UDP traffic on the jboss_debug port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jboss_debug port. Domain to not audit. Bind TCP sockets to the jboss_debug port. Domain allowed access. Bind UDP sockets to the jboss_debug port. Domain allowed access. Make a TCP connection to the jboss_debug port. Domain allowed access. Send jboss_debug_client packets. Domain allowed access. Do not audit attempts to send jboss_debug_client packets. Domain to not audit. Receive jboss_debug_client packets. Domain allowed access. Do not audit attempts to receive jboss_debug_client packets. Domain allowed access. Send and receive jboss_debug_client packets. Domain allowed access. Do not audit attempts to send and receive jboss_debug_client packets. Domain to not audit. Relabel packets to jboss_debug_client the packet type. Domain allowed access. Send jboss_debug_server packets. Domain allowed access. Do not audit attempts to send jboss_debug_server packets. Domain to not audit. Receive jboss_debug_server packets. Domain allowed access. Do not audit attempts to receive jboss_debug_server packets. Domain allowed access. Send and receive jboss_debug_server packets. Domain allowed access. Do not audit attempts to send and receive jboss_debug_server packets. Domain to not audit. Relabel packets to jboss_debug_server the packet type. Domain allowed access. Send and receive TCP traffic on the jboss_messaging port. Domain allowed access. Send UDP traffic on the jboss_messaging port. Domain allowed access. Do not audit attempts to send UDP traffic on the jboss_messaging port. Domain to not audit. Receive UDP traffic on the jboss_messaging port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jboss_messaging port. Domain to not audit. Send and receive UDP traffic on the jboss_messaging port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jboss_messaging port. Domain to not audit. Bind TCP sockets to the jboss_messaging port. Domain allowed access. Bind UDP sockets to the jboss_messaging port. Domain allowed access. Make a TCP connection to the jboss_messaging port. Domain allowed access. Send jboss_messaging_client packets. Domain allowed access. Do not audit attempts to send jboss_messaging_client packets. Domain to not audit. Receive jboss_messaging_client packets. Domain allowed access. Do not audit attempts to receive jboss_messaging_client packets. Domain allowed access. Send and receive jboss_messaging_client packets. Domain allowed access. Do not audit attempts to send and receive jboss_messaging_client packets. Domain to not audit. Relabel packets to jboss_messaging_client the packet type. Domain allowed access. Send jboss_messaging_server packets. Domain allowed access. Do not audit attempts to send jboss_messaging_server packets. Domain to not audit. Receive jboss_messaging_server packets. Domain allowed access. Do not audit attempts to receive jboss_messaging_server packets. Domain allowed access. Send and receive jboss_messaging_server packets. Domain allowed access. Do not audit attempts to send and receive jboss_messaging_server packets. Domain to not audit. Relabel packets to jboss_messaging_server the packet type. Domain allowed access. Send and receive TCP traffic on the jboss_management port. Domain allowed access. Send UDP traffic on the jboss_management port. Domain allowed access. Do not audit attempts to send UDP traffic on the jboss_management port. Domain to not audit. Receive UDP traffic on the jboss_management port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jboss_management port. Domain to not audit. Send and receive UDP traffic on the jboss_management port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jboss_management port. Domain to not audit. Bind TCP sockets to the jboss_management port. Domain allowed access. Bind UDP sockets to the jboss_management port. Domain allowed access. Make a TCP connection to the jboss_management port. Domain allowed access. Send jboss_management_client packets. Domain allowed access. Do not audit attempts to send jboss_management_client packets. Domain to not audit. Receive jboss_management_client packets. Domain allowed access. Do not audit attempts to receive jboss_management_client packets. Domain allowed access. Send and receive jboss_management_client packets. Domain allowed access. Do not audit attempts to send and receive jboss_management_client packets. Domain to not audit. Relabel packets to jboss_management_client the packet type. Domain allowed access. Send jboss_management_server packets. Domain allowed access. Do not audit attempts to send jboss_management_server packets. Domain to not audit. Receive jboss_management_server packets. Domain allowed access. Do not audit attempts to receive jboss_management_server packets. Domain allowed access. Send and receive jboss_management_server packets. Domain allowed access. Do not audit attempts to send and receive jboss_management_server packets. Domain to not audit. Relabel packets to jboss_management_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos port. Domain allowed access. Send UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos port. Domain to not audit. Receive UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos port. Domain to not audit. Send and receive UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos port. Domain to not audit. Bind TCP sockets to the kerberos port. Domain allowed access. Bind UDP sockets to the kerberos port. Domain allowed access. Make a TCP connection to the kerberos port. Domain allowed access. Send kerberos_client packets. Domain allowed access. Do not audit attempts to send kerberos_client packets. Domain to not audit. Receive kerberos_client packets. Domain allowed access. Do not audit attempts to receive kerberos_client packets. Domain allowed access. Send and receive kerberos_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_client packets. Domain to not audit. Relabel packets to kerberos_client the packet type. Domain allowed access. Send kerberos_server packets. Domain allowed access. Do not audit attempts to send kerberos_server packets. Domain to not audit. Receive kerberos_server packets. Domain allowed access. Do not audit attempts to receive kerberos_server packets. Domain allowed access. Send and receive kerberos_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_server packets. Domain to not audit. Relabel packets to kerberos_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos_admin port. Domain allowed access. Send UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos_admin port. Domain to not audit. Receive UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos_admin port. Domain to not audit. Send and receive UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos_admin port. Domain to not audit. Bind TCP sockets to the kerberos_admin port. Domain allowed access. Bind UDP sockets to the kerberos_admin port. Domain allowed access. Make a TCP connection to the kerberos_admin port. Domain allowed access. Send kerberos_admin_client packets. Domain allowed access. Do not audit attempts to send kerberos_admin_client packets. Domain to not audit. Receive kerberos_admin_client packets. Domain allowed access. Do not audit attempts to receive kerberos_admin_client packets. Domain allowed access. Send and receive kerberos_admin_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_admin_client packets. Domain to not audit. Relabel packets to kerberos_admin_client the packet type. Domain allowed access. Send kerberos_admin_server packets. Domain allowed access. Do not audit attempts to send kerberos_admin_server packets. Domain to not audit. Receive kerberos_admin_server packets. Domain allowed access. Do not audit attempts to receive kerberos_admin_server packets. Domain allowed access. Send and receive kerberos_admin_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_admin_server packets. Domain to not audit. Relabel packets to kerberos_admin_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos_master port. Domain allowed access. Send UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos_master port. Domain to not audit. Receive UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos_master port. Domain to not audit. Send and receive UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos_master port. Domain to not audit. Bind TCP sockets to the kerberos_master port. Domain allowed access. Bind UDP sockets to the kerberos_master port. Domain allowed access. Make a TCP connection to the kerberos_master port. Domain allowed access. Send kerberos_master_client packets. Domain allowed access. Do not audit attempts to send kerberos_master_client packets. Domain to not audit. Receive kerberos_master_client packets. Domain allowed access. Do not audit attempts to receive kerberos_master_client packets. Domain allowed access. Send and receive kerberos_master_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_master_client packets. Domain to not audit. Relabel packets to kerberos_master_client the packet type. Domain allowed access. Send kerberos_master_server packets. Domain allowed access. Do not audit attempts to send kerberos_master_server packets. Domain to not audit. Receive kerberos_master_server packets. Domain allowed access. Do not audit attempts to receive kerberos_master_server packets. Domain allowed access. Send and receive kerberos_master_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_master_server packets. Domain to not audit. Relabel packets to kerberos_master_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos_password port. Domain allowed access. Send UDP traffic on the kerberos_password port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos_password port. Domain to not audit. Receive UDP traffic on the kerberos_password port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos_password port. Domain to not audit. Send and receive UDP traffic on the kerberos_password port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos_password port. Domain to not audit. Bind TCP sockets to the kerberos_password port. Domain allowed access. Bind UDP sockets to the kerberos_password port. Domain allowed access. Make a TCP connection to the kerberos_password port. Domain allowed access. Send kerberos_password_client packets. Domain allowed access. Do not audit attempts to send kerberos_password_client packets. Domain to not audit. Receive kerberos_password_client packets. Domain allowed access. Do not audit attempts to receive kerberos_password_client packets. Domain allowed access. Send and receive kerberos_password_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_password_client packets. Domain to not audit. Relabel packets to kerberos_password_client the packet type. Domain allowed access. Send kerberos_password_server packets. Domain allowed access. Do not audit attempts to send kerberos_password_server packets. Domain to not audit. Receive kerberos_password_server packets. Domain allowed access. Do not audit attempts to receive kerberos_password_server packets. Domain allowed access. Send and receive kerberos_password_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_password_server packets. Domain to not audit. Relabel packets to kerberos_password_server the packet type. Domain allowed access. Send and receive TCP traffic on the kismet port. Domain allowed access. Send UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to send UDP traffic on the kismet port. Domain to not audit. Receive UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kismet port. Domain to not audit. Send and receive UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kismet port. Domain to not audit. Bind TCP sockets to the kismet port. Domain allowed access. Bind UDP sockets to the kismet port. Domain allowed access. Make a TCP connection to the kismet port. Domain allowed access. Send kismet_client packets. Domain allowed access. Do not audit attempts to send kismet_client packets. Domain to not audit. Receive kismet_client packets. Domain allowed access. Do not audit attempts to receive kismet_client packets. Domain allowed access. Send and receive kismet_client packets. Domain allowed access. Do not audit attempts to send and receive kismet_client packets. Domain to not audit. Relabel packets to kismet_client the packet type. Domain allowed access. Send kismet_server packets. Domain allowed access. Do not audit attempts to send kismet_server packets. Domain to not audit. Receive kismet_server packets. Domain allowed access. Do not audit attempts to receive kismet_server packets. Domain allowed access. Send and receive kismet_server packets. Domain allowed access. Do not audit attempts to send and receive kismet_server packets. Domain to not audit. Relabel packets to kismet_server the packet type. Domain allowed access. Send and receive TCP traffic on the kprop port. Domain allowed access. Send UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to send UDP traffic on the kprop port. Domain to not audit. Receive UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kprop port. Domain to not audit. Send and receive UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kprop port. Domain to not audit. Bind TCP sockets to the kprop port. Domain allowed access. Bind UDP sockets to the kprop port. Domain allowed access. Make a TCP connection to the kprop port. Domain allowed access. Send kprop_client packets. Domain allowed access. Do not audit attempts to send kprop_client packets. Domain to not audit. Receive kprop_client packets. Domain allowed access. Do not audit attempts to receive kprop_client packets. Domain allowed access. Send and receive kprop_client packets. Domain allowed access. Do not audit attempts to send and receive kprop_client packets. Domain to not audit. Relabel packets to kprop_client the packet type. Domain allowed access. Send kprop_server packets. Domain allowed access. Do not audit attempts to send kprop_server packets. Domain to not audit. Receive kprop_server packets. Domain allowed access. Do not audit attempts to receive kprop_server packets. Domain allowed access. Send and receive kprop_server packets. Domain allowed access. Do not audit attempts to send and receive kprop_server packets. Domain to not audit. Relabel packets to kprop_server the packet type. Domain allowed access. Send and receive TCP traffic on the ktalkd port. Domain allowed access. Send UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to send UDP traffic on the ktalkd port. Domain to not audit. Receive UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ktalkd port. Domain to not audit. Send and receive UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ktalkd port. Domain to not audit. Bind TCP sockets to the ktalkd port. Domain allowed access. Bind UDP sockets to the ktalkd port. Domain allowed access. Make a TCP connection to the ktalkd port. Domain allowed access. Send ktalkd_client packets. Domain allowed access. Do not audit attempts to send ktalkd_client packets. Domain to not audit. Receive ktalkd_client packets. Domain allowed access. Do not audit attempts to receive ktalkd_client packets. Domain allowed access. Send and receive ktalkd_client packets. Domain allowed access. Do not audit attempts to send and receive ktalkd_client packets. Domain to not audit. Relabel packets to ktalkd_client the packet type. Domain allowed access. Send ktalkd_server packets. Domain allowed access. Do not audit attempts to send ktalkd_server packets. Domain to not audit. Receive ktalkd_server packets. Domain allowed access. Do not audit attempts to receive ktalkd_server packets. Domain allowed access. Send and receive ktalkd_server packets. Domain allowed access. Do not audit attempts to send and receive ktalkd_server packets. Domain to not audit. Relabel packets to ktalkd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ldap port. Domain allowed access. Send UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to send UDP traffic on the ldap port. Domain to not audit. Receive UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ldap port. Domain to not audit. Send and receive UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ldap port. Domain to not audit. Bind TCP sockets to the ldap port. Domain allowed access. Bind UDP sockets to the ldap port. Domain allowed access. Make a TCP connection to the ldap port. Domain allowed access. Send ldap_client packets. Domain allowed access. Do not audit attempts to send ldap_client packets. Domain to not audit. Receive ldap_client packets. Domain allowed access. Do not audit attempts to receive ldap_client packets. Domain allowed access. Send and receive ldap_client packets. Domain allowed access. Do not audit attempts to send and receive ldap_client packets. Domain to not audit. Relabel packets to ldap_client the packet type. Domain allowed access. Send ldap_server packets. Domain allowed access. Do not audit attempts to send ldap_server packets. Domain to not audit. Receive ldap_server packets. Domain allowed access. Do not audit attempts to receive ldap_server packets. Domain allowed access. Send and receive ldap_server packets. Domain allowed access. Do not audit attempts to send and receive ldap_server packets. Domain to not audit. Relabel packets to ldap_server the packet type. Domain allowed access. Send and receive TCP traffic on the lmtp port. Domain allowed access. Send UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to send UDP traffic on the lmtp port. Domain to not audit. Receive UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the lmtp port. Domain to not audit. Send and receive UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the lmtp port. Domain to not audit. Bind TCP sockets to the lmtp port. Domain allowed access. Bind UDP sockets to the lmtp port. Domain allowed access. Make a TCP connection to the lmtp port. Domain allowed access. Send lmtp_client packets. Domain allowed access. Do not audit attempts to send lmtp_client packets. Domain to not audit. Receive lmtp_client packets. Domain allowed access. Do not audit attempts to receive lmtp_client packets. Domain allowed access. Send and receive lmtp_client packets. Domain allowed access. Do not audit attempts to send and receive lmtp_client packets. Domain to not audit. Relabel packets to lmtp_client the packet type. Domain allowed access. Send lmtp_server packets. Domain allowed access. Do not audit attempts to send lmtp_server packets. Domain to not audit. Receive lmtp_server packets. Domain allowed access. Do not audit attempts to receive lmtp_server packets. Domain allowed access. Send and receive lmtp_server packets. Domain allowed access. Do not audit attempts to send and receive lmtp_server packets. Domain to not audit. Relabel packets to lmtp_server the packet type. Domain allowed access. Send and receive TCP traffic on the lirc port. Domain allowed access. Send UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to send UDP traffic on the lirc port. Domain to not audit. Receive UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the lirc port. Domain to not audit. Send and receive UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the lirc port. Domain to not audit. Bind TCP sockets to the lirc port. Domain allowed access. Bind UDP sockets to the lirc port. Domain allowed access. Make a TCP connection to the lirc port. Domain allowed access. Send lirc_client packets. Domain allowed access. Do not audit attempts to send lirc_client packets. Domain to not audit. Receive lirc_client packets. Domain allowed access. Do not audit attempts to receive lirc_client packets. Domain allowed access. Send and receive lirc_client packets. Domain allowed access. Do not audit attempts to send and receive lirc_client packets. Domain to not audit. Relabel packets to lirc_client the packet type. Domain allowed access. Send lirc_server packets. Domain allowed access. Do not audit attempts to send lirc_server packets. Domain to not audit. Receive lirc_server packets. Domain allowed access. Do not audit attempts to receive lirc_server packets. Domain allowed access. Send and receive lirc_server packets. Domain allowed access. Do not audit attempts to send and receive lirc_server packets. Domain to not audit. Relabel packets to lirc_server the packet type. Domain allowed access. Send and receive TCP traffic on the luci port. Domain allowed access. Send UDP traffic on the luci port. Domain allowed access. Do not audit attempts to send UDP traffic on the luci port. Domain to not audit. Receive UDP traffic on the luci port. Domain allowed access. Do not audit attempts to receive UDP traffic on the luci port. Domain to not audit. Send and receive UDP traffic on the luci port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the luci port. Domain to not audit. Bind TCP sockets to the luci port. Domain allowed access. Bind UDP sockets to the luci port. Domain allowed access. Make a TCP connection to the luci port. Domain allowed access. Send luci_client packets. Domain allowed access. Do not audit attempts to send luci_client packets. Domain to not audit. Receive luci_client packets. Domain allowed access. Do not audit attempts to receive luci_client packets. Domain allowed access. Send and receive luci_client packets. Domain allowed access. Do not audit attempts to send and receive luci_client packets. Domain to not audit. Relabel packets to luci_client the packet type. Domain allowed access. Send luci_server packets. Domain allowed access. Do not audit attempts to send luci_server packets. Domain to not audit. Receive luci_server packets. Domain allowed access. Do not audit attempts to receive luci_server packets. Domain allowed access. Send and receive luci_server packets. Domain allowed access. Do not audit attempts to send and receive luci_server packets. Domain to not audit. Relabel packets to luci_server the packet type. Domain allowed access. Send and receive TCP traffic on the l2tp port. Domain allowed access. Send UDP traffic on the l2tp port. Domain allowed access. Do not audit attempts to send UDP traffic on the l2tp port. Domain to not audit. Receive UDP traffic on the l2tp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the l2tp port. Domain to not audit. Send and receive UDP traffic on the l2tp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the l2tp port. Domain to not audit. Bind TCP sockets to the l2tp port. Domain allowed access. Bind UDP sockets to the l2tp port. Domain allowed access. Make a TCP connection to the l2tp port. Domain allowed access. Send l2tp_client packets. Domain allowed access. Do not audit attempts to send l2tp_client packets. Domain to not audit. Receive l2tp_client packets. Domain allowed access. Do not audit attempts to receive l2tp_client packets. Domain allowed access. Send and receive l2tp_client packets. Domain allowed access. Do not audit attempts to send and receive l2tp_client packets. Domain to not audit. Relabel packets to l2tp_client the packet type. Domain allowed access. Send l2tp_server packets. Domain allowed access. Do not audit attempts to send l2tp_server packets. Domain to not audit. Receive l2tp_server packets. Domain allowed access. Do not audit attempts to receive l2tp_server packets. Domain allowed access. Send and receive l2tp_server packets. Domain allowed access. Do not audit attempts to send and receive l2tp_server packets. Domain to not audit. Relabel packets to l2tp_server the packet type. Domain allowed access. Send and receive TCP traffic on the mail port. Domain allowed access. Send UDP traffic on the mail port. Domain allowed access. Do not audit attempts to send UDP traffic on the mail port. Domain to not audit. Receive UDP traffic on the mail port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mail port. Domain to not audit. Send and receive UDP traffic on the mail port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mail port. Domain to not audit. Bind TCP sockets to the mail port. Domain allowed access. Bind UDP sockets to the mail port. Domain allowed access. Make a TCP connection to the mail port. Domain allowed access. Send mail_client packets. Domain allowed access. Do not audit attempts to send mail_client packets. Domain to not audit. Receive mail_client packets. Domain allowed access. Do not audit attempts to receive mail_client packets. Domain allowed access. Send and receive mail_client packets. Domain allowed access. Do not audit attempts to send and receive mail_client packets. Domain to not audit. Relabel packets to mail_client the packet type. Domain allowed access. Send mail_server packets. Domain allowed access. Do not audit attempts to send mail_server packets. Domain to not audit. Receive mail_server packets. Domain allowed access. Do not audit attempts to receive mail_server packets. Domain allowed access. Send and receive mail_server packets. Domain allowed access. Do not audit attempts to send and receive mail_server packets. Domain to not audit. Relabel packets to mail_server the packet type. Domain allowed access. Send and receive TCP traffic on the matahari port. Domain allowed access. Send UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to send UDP traffic on the matahari port. Domain to not audit. Receive UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to receive UDP traffic on the matahari port. Domain to not audit. Send and receive UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the matahari port. Domain to not audit. Bind TCP sockets to the matahari port. Domain allowed access. Bind UDP sockets to the matahari port. Domain allowed access. Make a TCP connection to the matahari port. Domain allowed access. Send matahari_client packets. Domain allowed access. Do not audit attempts to send matahari_client packets. Domain to not audit. Receive matahari_client packets. Domain allowed access. Do not audit attempts to receive matahari_client packets. Domain allowed access. Send and receive matahari_client packets. Domain allowed access. Do not audit attempts to send and receive matahari_client packets. Domain to not audit. Relabel packets to matahari_client the packet type. Domain allowed access. Send matahari_server packets. Domain allowed access. Do not audit attempts to send matahari_server packets. Domain to not audit. Receive matahari_server packets. Domain allowed access. Do not audit attempts to receive matahari_server packets. Domain allowed access. Send and receive matahari_server packets. Domain allowed access. Do not audit attempts to send and receive matahari_server packets. Domain to not audit. Relabel packets to matahari_server the packet type. Domain allowed access. Send and receive TCP traffic on the memcache port. Domain allowed access. Send UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to send UDP traffic on the memcache port. Domain to not audit. Receive UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to receive UDP traffic on the memcache port. Domain to not audit. Send and receive UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the memcache port. Domain to not audit. Bind TCP sockets to the memcache port. Domain allowed access. Bind UDP sockets to the memcache port. Domain allowed access. Make a TCP connection to the memcache port. Domain allowed access. Send memcache_client packets. Domain allowed access. Do not audit attempts to send memcache_client packets. Domain to not audit. Receive memcache_client packets. Domain allowed access. Do not audit attempts to receive memcache_client packets. Domain allowed access. Send and receive memcache_client packets. Domain allowed access. Do not audit attempts to send and receive memcache_client packets. Domain to not audit. Relabel packets to memcache_client the packet type. Domain allowed access. Send memcache_server packets. Domain allowed access. Do not audit attempts to send memcache_server packets. Domain to not audit. Receive memcache_server packets. Domain allowed access. Do not audit attempts to receive memcache_server packets. Domain allowed access. Send and receive memcache_server packets. Domain allowed access. Do not audit attempts to send and receive memcache_server packets. Domain to not audit. Relabel packets to memcache_server the packet type. Domain allowed access. Send and receive TCP traffic on the milter port. Domain allowed access. Send UDP traffic on the milter port. Domain allowed access. Do not audit attempts to send UDP traffic on the milter port. Domain to not audit. Receive UDP traffic on the milter port. Domain allowed access. Do not audit attempts to receive UDP traffic on the milter port. Domain to not audit. Send and receive UDP traffic on the milter port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the milter port. Domain to not audit. Bind TCP sockets to the milter port. Domain allowed access. Bind UDP sockets to the milter port. Domain allowed access. Make a TCP connection to the milter port. Domain allowed access. Send milter_client packets. Domain allowed access. Do not audit attempts to send milter_client packets. Domain to not audit. Receive milter_client packets. Domain allowed access. Do not audit attempts to receive milter_client packets. Domain allowed access. Send and receive milter_client packets. Domain allowed access. Do not audit attempts to send and receive milter_client packets. Domain to not audit. Relabel packets to milter_client the packet type. Domain allowed access. Send milter_server packets. Domain allowed access. Do not audit attempts to send milter_server packets. Domain to not audit. Receive milter_server packets. Domain allowed access. Do not audit attempts to receive milter_server packets. Domain allowed access. Send and receive milter_server packets. Domain allowed access. Do not audit attempts to send and receive milter_server packets. Domain to not audit. Relabel packets to milter_server the packet type. Domain allowed access. Send and receive TCP traffic on the mmcc port. Domain allowed access. Send UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to send UDP traffic on the mmcc port. Domain to not audit. Receive UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mmcc port. Domain to not audit. Send and receive UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mmcc port. Domain to not audit. Bind TCP sockets to the mmcc port. Domain allowed access. Bind UDP sockets to the mmcc port. Domain allowed access. Make a TCP connection to the mmcc port. Domain allowed access. Send mmcc_client packets. Domain allowed access. Do not audit attempts to send mmcc_client packets. Domain to not audit. Receive mmcc_client packets. Domain allowed access. Do not audit attempts to receive mmcc_client packets. Domain allowed access. Send and receive mmcc_client packets. Domain allowed access. Do not audit attempts to send and receive mmcc_client packets. Domain to not audit. Relabel packets to mmcc_client the packet type. Domain allowed access. Send mmcc_server packets. Domain allowed access. Do not audit attempts to send mmcc_server packets. Domain to not audit. Receive mmcc_server packets. Domain allowed access. Do not audit attempts to receive mmcc_server packets. Domain allowed access. Send and receive mmcc_server packets. Domain allowed access. Do not audit attempts to send and receive mmcc_server packets. Domain to not audit. Relabel packets to mmcc_server the packet type. Domain allowed access. Send and receive TCP traffic on the mongod port. Domain allowed access. Send UDP traffic on the mongod port. Domain allowed access. Do not audit attempts to send UDP traffic on the mongod port. Domain to not audit. Receive UDP traffic on the mongod port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mongod port. Domain to not audit. Send and receive UDP traffic on the mongod port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mongod port. Domain to not audit. Bind TCP sockets to the mongod port. Domain allowed access. Bind UDP sockets to the mongod port. Domain allowed access. Make a TCP connection to the mongod port. Domain allowed access. Send mongod_client packets. Domain allowed access. Do not audit attempts to send mongod_client packets. Domain to not audit. Receive mongod_client packets. Domain allowed access. Do not audit attempts to receive mongod_client packets. Domain allowed access. Send and receive mongod_client packets. Domain allowed access. Do not audit attempts to send and receive mongod_client packets. Domain to not audit. Relabel packets to mongod_client the packet type. Domain allowed access. Send mongod_server packets. Domain allowed access. Do not audit attempts to send mongod_server packets. Domain to not audit. Receive mongod_server packets. Domain allowed access. Do not audit attempts to receive mongod_server packets. Domain allowed access. Send and receive mongod_server packets. Domain allowed access. Do not audit attempts to send and receive mongod_server packets. Domain to not audit. Relabel packets to mongod_server the packet type. Domain allowed access. Send and receive TCP traffic on the monopd port. Domain allowed access. Send UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to send UDP traffic on the monopd port. Domain to not audit. Receive UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the monopd port. Domain to not audit. Send and receive UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the monopd port. Domain to not audit. Bind TCP sockets to the monopd port. Domain allowed access. Bind UDP sockets to the monopd port. Domain allowed access. Make a TCP connection to the monopd port. Domain allowed access. Send monopd_client packets. Domain allowed access. Do not audit attempts to send monopd_client packets. Domain to not audit. Receive monopd_client packets. Domain allowed access. Do not audit attempts to receive monopd_client packets. Domain allowed access. Send and receive monopd_client packets. Domain allowed access. Do not audit attempts to send and receive monopd_client packets. Domain to not audit. Relabel packets to monopd_client the packet type. Domain allowed access. Send monopd_server packets. Domain allowed access. Do not audit attempts to send monopd_server packets. Domain to not audit. Receive monopd_server packets. Domain allowed access. Do not audit attempts to receive monopd_server packets. Domain allowed access. Send and receive monopd_server packets. Domain allowed access. Do not audit attempts to send and receive monopd_server packets. Domain to not audit. Relabel packets to monopd_server the packet type. Domain allowed access. Send and receive TCP traffic on the mpd port. Domain allowed access. Send UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the mpd port. Domain to not audit. Receive UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mpd port. Domain to not audit. Send and receive UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mpd port. Domain to not audit. Bind TCP sockets to the mpd port. Domain allowed access. Bind UDP sockets to the mpd port. Domain allowed access. Make a TCP connection to the mpd port. Domain allowed access. Send mpd_client packets. Domain allowed access. Do not audit attempts to send mpd_client packets. Domain to not audit. Receive mpd_client packets. Domain allowed access. Do not audit attempts to receive mpd_client packets. Domain allowed access. Send and receive mpd_client packets. Domain allowed access. Do not audit attempts to send and receive mpd_client packets. Domain to not audit. Relabel packets to mpd_client the packet type. Domain allowed access. Send mpd_server packets. Domain allowed access. Do not audit attempts to send mpd_server packets. Domain to not audit. Receive mpd_server packets. Domain allowed access. Do not audit attempts to receive mpd_server packets. Domain allowed access. Send and receive mpd_server packets. Domain allowed access. Do not audit attempts to send and receive mpd_server packets. Domain to not audit. Relabel packets to mpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the msnp port. Domain allowed access. Send UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to send UDP traffic on the msnp port. Domain to not audit. Receive UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the msnp port. Domain to not audit. Send and receive UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the msnp port. Domain to not audit. Bind TCP sockets to the msnp port. Domain allowed access. Bind UDP sockets to the msnp port. Domain allowed access. Make a TCP connection to the msnp port. Domain allowed access. Send msnp_client packets. Domain allowed access. Do not audit attempts to send msnp_client packets. Domain to not audit. Receive msnp_client packets. Domain allowed access. Do not audit attempts to receive msnp_client packets. Domain allowed access. Send and receive msnp_client packets. Domain allowed access. Do not audit attempts to send and receive msnp_client packets. Domain to not audit. Relabel packets to msnp_client the packet type. Domain allowed access. Send msnp_server packets. Domain allowed access. Do not audit attempts to send msnp_server packets. Domain to not audit. Receive msnp_server packets. Domain allowed access. Do not audit attempts to receive msnp_server packets. Domain allowed access. Send and receive msnp_server packets. Domain allowed access. Do not audit attempts to send and receive msnp_server packets. Domain to not audit. Relabel packets to msnp_server the packet type. Domain allowed access. Send and receive TCP traffic on the mssql port. Domain allowed access. Send UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to send UDP traffic on the mssql port. Domain to not audit. Receive UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mssql port. Domain to not audit. Send and receive UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mssql port. Domain to not audit. Bind TCP sockets to the mssql port. Domain allowed access. Bind UDP sockets to the mssql port. Domain allowed access. Make a TCP connection to the mssql port. Domain allowed access. Send mssql_client packets. Domain allowed access. Do not audit attempts to send mssql_client packets. Domain to not audit. Receive mssql_client packets. Domain allowed access. Do not audit attempts to receive mssql_client packets. Domain allowed access. Send and receive mssql_client packets. Domain allowed access. Do not audit attempts to send and receive mssql_client packets. Domain to not audit. Relabel packets to mssql_client the packet type. Domain allowed access. Send mssql_server packets. Domain allowed access. Do not audit attempts to send mssql_server packets. Domain to not audit. Receive mssql_server packets. Domain allowed access. Do not audit attempts to receive mssql_server packets. Domain allowed access. Send and receive mssql_server packets. Domain allowed access. Do not audit attempts to send and receive mssql_server packets. Domain to not audit. Relabel packets to mssql_server the packet type. Domain allowed access. Send and receive TCP traffic on the munin port. Domain allowed access. Send UDP traffic on the munin port. Domain allowed access. Do not audit attempts to send UDP traffic on the munin port. Domain to not audit. Receive UDP traffic on the munin port. Domain allowed access. Do not audit attempts to receive UDP traffic on the munin port. Domain to not audit. Send and receive UDP traffic on the munin port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the munin port. Domain to not audit. Bind TCP sockets to the munin port. Domain allowed access. Bind UDP sockets to the munin port. Domain allowed access. Make a TCP connection to the munin port. Domain allowed access. Send munin_client packets. Domain allowed access. Do not audit attempts to send munin_client packets. Domain to not audit. Receive munin_client packets. Domain allowed access. Do not audit attempts to receive munin_client packets. Domain allowed access. Send and receive munin_client packets. Domain allowed access. Do not audit attempts to send and receive munin_client packets. Domain to not audit. Relabel packets to munin_client the packet type. Domain allowed access. Send munin_server packets. Domain allowed access. Do not audit attempts to send munin_server packets. Domain to not audit. Receive munin_server packets. Domain allowed access. Do not audit attempts to receive munin_server packets. Domain allowed access. Send and receive munin_server packets. Domain allowed access. Do not audit attempts to send and receive munin_server packets. Domain to not audit. Relabel packets to munin_server the packet type. Domain allowed access. Send and receive TCP traffic on the mysqld port. Domain allowed access. Send UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to send UDP traffic on the mysqld port. Domain to not audit. Receive UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mysqld port. Domain to not audit. Send and receive UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mysqld port. Domain to not audit. Bind TCP sockets to the mysqld port. Domain allowed access. Bind UDP sockets to the mysqld port. Domain allowed access. Make a TCP connection to the mysqld port. Domain allowed access. Send mysqld_client packets. Domain allowed access. Do not audit attempts to send mysqld_client packets. Domain to not audit. Receive mysqld_client packets. Domain allowed access. Do not audit attempts to receive mysqld_client packets. Domain allowed access. Send and receive mysqld_client packets. Domain allowed access. Do not audit attempts to send and receive mysqld_client packets. Domain to not audit. Relabel packets to mysqld_client the packet type. Domain allowed access. Send mysqld_server packets. Domain allowed access. Do not audit attempts to send mysqld_server packets. Domain to not audit. Receive mysqld_server packets. Domain allowed access. Do not audit attempts to receive mysqld_server packets. Domain allowed access. Send and receive mysqld_server packets. Domain allowed access. Do not audit attempts to send and receive mysqld_server packets. Domain to not audit. Relabel packets to mysqld_server the packet type. Domain allowed access. Send and receive TCP traffic on the mysqlmanagerd port. Domain allowed access. Send UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to send UDP traffic on the mysqlmanagerd port. Domain to not audit. Receive UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. Domain to not audit. Send and receive UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mysqlmanagerd port. Domain to not audit. Bind TCP sockets to the mysqlmanagerd port. Domain allowed access. Bind UDP sockets to the mysqlmanagerd port. Domain allowed access. Make a TCP connection to the mysqlmanagerd port. Domain allowed access. Send mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to send mysqlmanagerd_client packets. Domain to not audit. Receive mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to receive mysqlmanagerd_client packets. Domain allowed access. Send and receive mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to send and receive mysqlmanagerd_client packets. Domain to not audit. Relabel packets to mysqlmanagerd_client the packet type. Domain allowed access. Send mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to send mysqlmanagerd_server packets. Domain to not audit. Receive mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to receive mysqlmanagerd_server packets. Domain allowed access. Send and receive mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to send and receive mysqlmanagerd_server packets. Domain to not audit. Relabel packets to mysqlmanagerd_server the packet type. Domain allowed access. Send and receive TCP traffic on the movaz_ssc port. Domain allowed access. Send UDP traffic on the movaz_ssc port. Domain allowed access. Do not audit attempts to send UDP traffic on the movaz_ssc port. Domain to not audit. Receive UDP traffic on the movaz_ssc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the movaz_ssc port. Domain to not audit. Send and receive UDP traffic on the movaz_ssc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the movaz_ssc port. Domain to not audit. Bind TCP sockets to the movaz_ssc port. Domain allowed access. Bind UDP sockets to the movaz_ssc port. Domain allowed access. Make a TCP connection to the movaz_ssc port. Domain allowed access. Send movaz_ssc_client packets. Domain allowed access. Do not audit attempts to send movaz_ssc_client packets. Domain to not audit. Receive movaz_ssc_client packets. Domain allowed access. Do not audit attempts to receive movaz_ssc_client packets. Domain allowed access. Send and receive movaz_ssc_client packets. Domain allowed access. Do not audit attempts to send and receive movaz_ssc_client packets. Domain to not audit. Relabel packets to movaz_ssc_client the packet type. Domain allowed access. Send movaz_ssc_server packets. Domain allowed access. Do not audit attempts to send movaz_ssc_server packets. Domain to not audit. Receive movaz_ssc_server packets. Domain allowed access. Do not audit attempts to receive movaz_ssc_server packets. Domain allowed access. Send and receive movaz_ssc_server packets. Domain allowed access. Do not audit attempts to send and receive movaz_ssc_server packets. Domain to not audit. Relabel packets to movaz_ssc_server the packet type. Domain allowed access. Send and receive TCP traffic on the mountd port. Domain allowed access. Send UDP traffic on the mountd port. Domain allowed access. Do not audit attempts to send UDP traffic on the mountd port. Domain to not audit. Receive UDP traffic on the mountd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mountd port. Domain to not audit. Send and receive UDP traffic on the mountd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mountd port. Domain to not audit. Bind TCP sockets to the mountd port. Domain allowed access. Bind UDP sockets to the mountd port. Domain allowed access. Make a TCP connection to the mountd port. Domain allowed access. Send mountd_client packets. Domain allowed access. Do not audit attempts to send mountd_client packets. Domain to not audit. Receive mountd_client packets. Domain allowed access. Do not audit attempts to receive mountd_client packets. Domain allowed access. Send and receive mountd_client packets. Domain allowed access. Do not audit attempts to send and receive mountd_client packets. Domain to not audit. Relabel packets to mountd_client the packet type. Domain allowed access. Send mountd_server packets. Domain allowed access. Do not audit attempts to send mountd_server packets. Domain to not audit. Receive mountd_server packets. Domain allowed access. Do not audit attempts to receive mountd_server packets. Domain allowed access. Send and receive mountd_server packets. Domain allowed access. Do not audit attempts to send and receive mountd_server packets. Domain to not audit. Relabel packets to mountd_server the packet type. Domain allowed access. Send and receive TCP traffic on the nessus port. Domain allowed access. Send UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to send UDP traffic on the nessus port. Domain to not audit. Receive UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nessus port. Domain to not audit. Send and receive UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nessus port. Domain to not audit. Bind TCP sockets to the nessus port. Domain allowed access. Bind UDP sockets to the nessus port. Domain allowed access. Make a TCP connection to the nessus port. Domain allowed access. Send nessus_client packets. Domain allowed access. Do not audit attempts to send nessus_client packets. Domain to not audit. Receive nessus_client packets. Domain allowed access. Do not audit attempts to receive nessus_client packets. Domain allowed access. Send and receive nessus_client packets. Domain allowed access. Do not audit attempts to send and receive nessus_client packets. Domain to not audit. Relabel packets to nessus_client the packet type. Domain allowed access. Send nessus_server packets. Domain allowed access. Do not audit attempts to send nessus_server packets. Domain to not audit. Receive nessus_server packets. Domain allowed access. Do not audit attempts to receive nessus_server packets. Domain allowed access. Send and receive nessus_server packets. Domain allowed access. Do not audit attempts to send and receive nessus_server packets. Domain to not audit. Relabel packets to nessus_server the packet type. Domain allowed access. Send and receive TCP traffic on the netport port. Domain allowed access. Send UDP traffic on the netport port. Domain allowed access. Do not audit attempts to send UDP traffic on the netport port. Domain to not audit. Receive UDP traffic on the netport port. Domain allowed access. Do not audit attempts to receive UDP traffic on the netport port. Domain to not audit. Send and receive UDP traffic on the netport port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the netport port. Domain to not audit. Bind TCP sockets to the netport port. Domain allowed access. Bind UDP sockets to the netport port. Domain allowed access. Make a TCP connection to the netport port. Domain allowed access. Send netport_client packets. Domain allowed access. Do not audit attempts to send netport_client packets. Domain to not audit. Receive netport_client packets. Domain allowed access. Do not audit attempts to receive netport_client packets. Domain allowed access. Send and receive netport_client packets. Domain allowed access. Do not audit attempts to send and receive netport_client packets. Domain to not audit. Relabel packets to netport_client the packet type. Domain allowed access. Send netport_server packets. Domain allowed access. Do not audit attempts to send netport_server packets. Domain to not audit. Receive netport_server packets. Domain allowed access. Do not audit attempts to receive netport_server packets. Domain allowed access. Send and receive netport_server packets. Domain allowed access. Do not audit attempts to send and receive netport_server packets. Domain to not audit. Relabel packets to netport_server the packet type. Domain allowed access. Send and receive TCP traffic on the netsupport port. Domain allowed access. Send UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to send UDP traffic on the netsupport port. Domain to not audit. Receive UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to receive UDP traffic on the netsupport port. Domain to not audit. Send and receive UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the netsupport port. Domain to not audit. Bind TCP sockets to the netsupport port. Domain allowed access. Bind UDP sockets to the netsupport port. Domain allowed access. Make a TCP connection to the netsupport port. Domain allowed access. Send netsupport_client packets. Domain allowed access. Do not audit attempts to send netsupport_client packets. Domain to not audit. Receive netsupport_client packets. Domain allowed access. Do not audit attempts to receive netsupport_client packets. Domain allowed access. Send and receive netsupport_client packets. Domain allowed access. Do not audit attempts to send and receive netsupport_client packets. Domain to not audit. Relabel packets to netsupport_client the packet type. Domain allowed access. Send netsupport_server packets. Domain allowed access. Do not audit attempts to send netsupport_server packets. Domain to not audit. Receive netsupport_server packets. Domain allowed access. Do not audit attempts to receive netsupport_server packets. Domain allowed access. Send and receive netsupport_server packets. Domain allowed access. Do not audit attempts to send and receive netsupport_server packets. Domain to not audit. Relabel packets to netsupport_server the packet type. Domain allowed access. Send and receive TCP traffic on the nfs port. Domain allowed access. Send UDP traffic on the nfs port. Domain allowed access. Do not audit attempts to send UDP traffic on the nfs port. Domain to not audit. Receive UDP traffic on the nfs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nfs port. Domain to not audit. Send and receive UDP traffic on the nfs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nfs port. Domain to not audit. Bind TCP sockets to the nfs port. Domain allowed access. Bind UDP sockets to the nfs port. Domain allowed access. Make a TCP connection to the nfs port. Domain allowed access. Send nfs_client packets. Domain allowed access. Do not audit attempts to send nfs_client packets. Domain to not audit. Receive nfs_client packets. Domain allowed access. Do not audit attempts to receive nfs_client packets. Domain allowed access. Send and receive nfs_client packets. Domain allowed access. Do not audit attempts to send and receive nfs_client packets. Domain to not audit. Relabel packets to nfs_client the packet type. Domain allowed access. Send nfs_server packets. Domain allowed access. Do not audit attempts to send nfs_server packets. Domain to not audit. Receive nfs_server packets. Domain allowed access. Do not audit attempts to receive nfs_server packets. Domain allowed access. Send and receive nfs_server packets. Domain allowed access. Do not audit attempts to send and receive nfs_server packets. Domain to not audit. Relabel packets to nfs_server the packet type. Domain allowed access. Send and receive TCP traffic on the nmbd port. Domain allowed access. Send UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to send UDP traffic on the nmbd port. Domain to not audit. Receive UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nmbd port. Domain to not audit. Send and receive UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nmbd port. Domain to not audit. Bind TCP sockets to the nmbd port. Domain allowed access. Bind UDP sockets to the nmbd port. Domain allowed access. Make a TCP connection to the nmbd port. Domain allowed access. Send nmbd_client packets. Domain allowed access. Do not audit attempts to send nmbd_client packets. Domain to not audit. Receive nmbd_client packets. Domain allowed access. Do not audit attempts to receive nmbd_client packets. Domain allowed access. Send and receive nmbd_client packets. Domain allowed access. Do not audit attempts to send and receive nmbd_client packets. Domain to not audit. Relabel packets to nmbd_client the packet type. Domain allowed access. Send nmbd_server packets. Domain allowed access. Do not audit attempts to send nmbd_server packets. Domain to not audit. Receive nmbd_server packets. Domain allowed access. Do not audit attempts to receive nmbd_server packets. Domain allowed access. Send and receive nmbd_server packets. Domain allowed access. Do not audit attempts to send and receive nmbd_server packets. Domain to not audit. Relabel packets to nmbd_server the packet type. Domain allowed access. Send and receive TCP traffic on the nodejs_debug port. Domain allowed access. Send UDP traffic on the nodejs_debug port. Domain allowed access. Do not audit attempts to send UDP traffic on the nodejs_debug port. Domain to not audit. Receive UDP traffic on the nodejs_debug port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nodejs_debug port. Domain to not audit. Send and receive UDP traffic on the nodejs_debug port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nodejs_debug port. Domain to not audit. Bind TCP sockets to the nodejs_debug port. Domain allowed access. Bind UDP sockets to the nodejs_debug port. Domain allowed access. Make a TCP connection to the nodejs_debug port. Domain allowed access. Send nodejs_debug_client packets. Domain allowed access. Do not audit attempts to send nodejs_debug_client packets. Domain to not audit. Receive nodejs_debug_client packets. Domain allowed access. Do not audit attempts to receive nodejs_debug_client packets. Domain allowed access. Send and receive nodejs_debug_client packets. Domain allowed access. Do not audit attempts to send and receive nodejs_debug_client packets. Domain to not audit. Relabel packets to nodejs_debug_client the packet type. Domain allowed access. Send nodejs_debug_server packets. Domain allowed access. Do not audit attempts to send nodejs_debug_server packets. Domain to not audit. Receive nodejs_debug_server packets. Domain allowed access. Do not audit attempts to receive nodejs_debug_server packets. Domain allowed access. Send and receive nodejs_debug_server packets. Domain allowed access. Do not audit attempts to send and receive nodejs_debug_server packets. Domain to not audit. Relabel packets to nodejs_debug_server the packet type. Domain allowed access. Send and receive TCP traffic on the ntp port. Domain allowed access. Send UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ntp port. Domain to not audit. Receive UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ntp port. Domain to not audit. Send and receive UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ntp port. Domain to not audit. Bind TCP sockets to the ntp port. Domain allowed access. Bind UDP sockets to the ntp port. Domain allowed access. Make a TCP connection to the ntp port. Domain allowed access. Send ntp_client packets. Domain allowed access. Do not audit attempts to send ntp_client packets. Domain to not audit. Receive ntp_client packets. Domain allowed access. Do not audit attempts to receive ntp_client packets. Domain allowed access. Send and receive ntp_client packets. Domain allowed access. Do not audit attempts to send and receive ntp_client packets. Domain to not audit. Relabel packets to ntp_client the packet type. Domain allowed access. Send ntp_server packets. Domain allowed access. Do not audit attempts to send ntp_server packets. Domain to not audit. Receive ntp_server packets. Domain allowed access. Do not audit attempts to receive ntp_server packets. Domain allowed access. Send and receive ntp_server packets. Domain allowed access. Do not audit attempts to send and receive ntp_server packets. Domain to not audit. Relabel packets to ntp_server the packet type. Domain allowed access. Send and receive TCP traffic on the ntop port. Domain allowed access. Send UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to send UDP traffic on the ntop port. Domain to not audit. Receive UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ntop port. Domain to not audit. Send and receive UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ntop port. Domain to not audit. Bind TCP sockets to the ntop port. Domain allowed access. Bind UDP sockets to the ntop port. Domain allowed access. Make a TCP connection to the ntop port. Domain allowed access. Send ntop_client packets. Domain allowed access. Do not audit attempts to send ntop_client packets. Domain to not audit. Receive ntop_client packets. Domain allowed access. Do not audit attempts to receive ntop_client packets. Domain allowed access. Send and receive ntop_client packets. Domain allowed access. Do not audit attempts to send and receive ntop_client packets. Domain to not audit. Relabel packets to ntop_client the packet type. Domain allowed access. Send ntop_server packets. Domain allowed access. Do not audit attempts to send ntop_server packets. Domain to not audit. Receive ntop_server packets. Domain allowed access. Do not audit attempts to receive ntop_server packets. Domain allowed access. Send and receive ntop_server packets. Domain allowed access. Do not audit attempts to send and receive ntop_server packets. Domain to not audit. Relabel packets to ntop_server the packet type. Domain allowed access. Send and receive TCP traffic on the oracle port. Domain allowed access. Send UDP traffic on the oracle port. Domain allowed access. Do not audit attempts to send UDP traffic on the oracle port. Domain to not audit. Receive UDP traffic on the oracle port. Domain allowed access. Do not audit attempts to receive UDP traffic on the oracle port. Domain to not audit. Send and receive UDP traffic on the oracle port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the oracle port. Domain to not audit. Bind TCP sockets to the oracle port. Domain allowed access. Bind UDP sockets to the oracle port. Domain allowed access. Make a TCP connection to the oracle port. Domain allowed access. Send oracle_client packets. Domain allowed access. Do not audit attempts to send oracle_client packets. Domain to not audit. Receive oracle_client packets. Domain allowed access. Do not audit attempts to receive oracle_client packets. Domain allowed access. Send and receive oracle_client packets. Domain allowed access. Do not audit attempts to send and receive oracle_client packets. Domain to not audit. Relabel packets to oracle_client the packet type. Domain allowed access. Send oracle_server packets. Domain allowed access. Do not audit attempts to send oracle_server packets. Domain to not audit. Receive oracle_server packets. Domain allowed access. Do not audit attempts to receive oracle_server packets. Domain allowed access. Send and receive oracle_server packets. Domain allowed access. Do not audit attempts to send and receive oracle_server packets. Domain to not audit. Relabel packets to oracle_server the packet type. Domain allowed access. Send and receive TCP traffic on the ocsp port. Domain allowed access. Send UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ocsp port. Domain to not audit. Receive UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ocsp port. Domain to not audit. Send and receive UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ocsp port. Domain to not audit. Bind TCP sockets to the ocsp port. Domain allowed access. Bind UDP sockets to the ocsp port. Domain allowed access. Make a TCP connection to the ocsp port. Domain allowed access. Send ocsp_client packets. Domain allowed access. Do not audit attempts to send ocsp_client packets. Domain to not audit. Receive ocsp_client packets. Domain allowed access. Do not audit attempts to receive ocsp_client packets. Domain allowed access. Send and receive ocsp_client packets. Domain allowed access. Do not audit attempts to send and receive ocsp_client packets. Domain to not audit. Relabel packets to ocsp_client the packet type. Domain allowed access. Send ocsp_server packets. Domain allowed access. Do not audit attempts to send ocsp_server packets. Domain to not audit. Receive ocsp_server packets. Domain allowed access. Do not audit attempts to receive ocsp_server packets. Domain allowed access. Send and receive ocsp_server packets. Domain allowed access. Do not audit attempts to send and receive ocsp_server packets. Domain to not audit. Relabel packets to ocsp_server the packet type. Domain allowed access. Send and receive TCP traffic on the openhpid port. Domain allowed access. Send UDP traffic on the openhpid port. Domain allowed access. Do not audit attempts to send UDP traffic on the openhpid port. Domain to not audit. Receive UDP traffic on the openhpid port. Domain allowed access. Do not audit attempts to receive UDP traffic on the openhpid port. Domain to not audit. Send and receive UDP traffic on the openhpid port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the openhpid port. Domain to not audit. Bind TCP sockets to the openhpid port. Domain allowed access. Bind UDP sockets to the openhpid port. Domain allowed access. Make a TCP connection to the openhpid port. Domain allowed access. Send openhpid_client packets. Domain allowed access. Do not audit attempts to send openhpid_client packets. Domain to not audit. Receive openhpid_client packets. Domain allowed access. Do not audit attempts to receive openhpid_client packets. Domain allowed access. Send and receive openhpid_client packets. Domain allowed access. Do not audit attempts to send and receive openhpid_client packets. Domain to not audit. Relabel packets to openhpid_client the packet type. Domain allowed access. Send openhpid_server packets. Domain allowed access. Do not audit attempts to send openhpid_server packets. Domain to not audit. Receive openhpid_server packets. Domain allowed access. Do not audit attempts to receive openhpid_server packets. Domain allowed access. Send and receive openhpid_server packets. Domain allowed access. Do not audit attempts to send and receive openhpid_server packets. Domain to not audit. Relabel packets to openhpid_server the packet type. Domain allowed access. Send and receive TCP traffic on the openvpn port. Domain allowed access. Send UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to send UDP traffic on the openvpn port. Domain to not audit. Receive UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to receive UDP traffic on the openvpn port. Domain to not audit. Send and receive UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the openvpn port. Domain to not audit. Bind TCP sockets to the openvpn port. Domain allowed access. Bind UDP sockets to the openvpn port. Domain allowed access. Make a TCP connection to the openvpn port. Domain allowed access. Send openvpn_client packets. Domain allowed access. Do not audit attempts to send openvpn_client packets. Domain to not audit. Receive openvpn_client packets. Domain allowed access. Do not audit attempts to receive openvpn_client packets. Domain allowed access. Send and receive openvpn_client packets. Domain allowed access. Do not audit attempts to send and receive openvpn_client packets. Domain to not audit. Relabel packets to openvpn_client the packet type. Domain allowed access. Send openvpn_server packets. Domain allowed access. Do not audit attempts to send openvpn_server packets. Domain to not audit. Receive openvpn_server packets. Domain allowed access. Do not audit attempts to receive openvpn_server packets. Domain allowed access. Send and receive openvpn_server packets. Domain allowed access. Do not audit attempts to send and receive openvpn_server packets. Domain to not audit. Relabel packets to openvpn_server the packet type. Domain allowed access. Send and receive TCP traffic on the pktcable port. Domain allowed access. Send UDP traffic on the pktcable port. Domain allowed access. Do not audit attempts to send UDP traffic on the pktcable port. Domain to not audit. Receive UDP traffic on the pktcable port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pktcable port. Domain to not audit. Send and receive UDP traffic on the pktcable port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pktcable port. Domain to not audit. Bind TCP sockets to the pktcable port. Domain allowed access. Bind UDP sockets to the pktcable port. Domain allowed access. Make a TCP connection to the pktcable port. Domain allowed access. Send pktcable_client packets. Domain allowed access. Do not audit attempts to send pktcable_client packets. Domain to not audit. Receive pktcable_client packets. Domain allowed access. Do not audit attempts to receive pktcable_client packets. Domain allowed access. Send and receive pktcable_client packets. Domain allowed access. Do not audit attempts to send and receive pktcable_client packets. Domain to not audit. Relabel packets to pktcable_client the packet type. Domain allowed access. Send pktcable_server packets. Domain allowed access. Do not audit attempts to send pktcable_server packets. Domain to not audit. Receive pktcable_server packets. Domain allowed access. Do not audit attempts to receive pktcable_server packets. Domain allowed access. Send and receive pktcable_server packets. Domain allowed access. Do not audit attempts to send and receive pktcable_server packets. Domain to not audit. Relabel packets to pktcable_server the packet type. Domain allowed access. Send and receive TCP traffic on the pegasus_http port. Domain allowed access. Send UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to send UDP traffic on the pegasus_http port. Domain to not audit. Receive UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pegasus_http port. Domain to not audit. Send and receive UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pegasus_http port. Domain to not audit. Bind TCP sockets to the pegasus_http port. Domain allowed access. Bind UDP sockets to the pegasus_http port. Domain allowed access. Make a TCP connection to the pegasus_http port. Domain allowed access. Send pegasus_http_client packets. Domain allowed access. Do not audit attempts to send pegasus_http_client packets. Domain to not audit. Receive pegasus_http_client packets. Domain allowed access. Do not audit attempts to receive pegasus_http_client packets. Domain allowed access. Send and receive pegasus_http_client packets. Domain allowed access. Do not audit attempts to send and receive pegasus_http_client packets. Domain to not audit. Relabel packets to pegasus_http_client the packet type. Domain allowed access. Send pegasus_http_server packets. Domain allowed access. Do not audit attempts to send pegasus_http_server packets. Domain to not audit. Receive pegasus_http_server packets. Domain allowed access. Do not audit attempts to receive pegasus_http_server packets. Domain allowed access. Send and receive pegasus_http_server packets. Domain allowed access. Do not audit attempts to send and receive pegasus_http_server packets. Domain to not audit. Relabel packets to pegasus_http_server the packet type. Domain allowed access. Send and receive TCP traffic on the pegasus_https port. Domain allowed access. Send UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to send UDP traffic on the pegasus_https port. Domain to not audit. Receive UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pegasus_https port. Domain to not audit. Send and receive UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pegasus_https port. Domain to not audit. Bind TCP sockets to the pegasus_https port. Domain allowed access. Bind UDP sockets to the pegasus_https port. Domain allowed access. Make a TCP connection to the pegasus_https port. Domain allowed access. Send pegasus_https_client packets. Domain allowed access. Do not audit attempts to send pegasus_https_client packets. Domain to not audit. Receive pegasus_https_client packets. Domain allowed access. Do not audit attempts to receive pegasus_https_client packets. Domain allowed access. Send and receive pegasus_https_client packets. Domain allowed access. Do not audit attempts to send and receive pegasus_https_client packets. Domain to not audit. Relabel packets to pegasus_https_client the packet type. Domain allowed access. Send pegasus_https_server packets. Domain allowed access. Do not audit attempts to send pegasus_https_server packets. Domain to not audit. Receive pegasus_https_server packets. Domain allowed access. Do not audit attempts to receive pegasus_https_server packets. Domain allowed access. Send and receive pegasus_https_server packets. Domain allowed access. Do not audit attempts to send and receive pegasus_https_server packets. Domain to not audit. Relabel packets to pegasus_https_server the packet type. Domain allowed access. Send and receive TCP traffic on the pgpkeyserver port. Domain allowed access. Send UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the pgpkeyserver port. Domain to not audit. Receive UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pgpkeyserver port. Domain to not audit. Send and receive UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pgpkeyserver port. Domain to not audit. Bind TCP sockets to the pgpkeyserver port. Domain allowed access. Bind UDP sockets to the pgpkeyserver port. Domain allowed access. Make a TCP connection to the pgpkeyserver port. Domain allowed access. Send pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to send pgpkeyserver_client packets. Domain to not audit. Receive pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to receive pgpkeyserver_client packets. Domain allowed access. Send and receive pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to send and receive pgpkeyserver_client packets. Domain to not audit. Relabel packets to pgpkeyserver_client the packet type. Domain allowed access. Send pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to send pgpkeyserver_server packets. Domain to not audit. Receive pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to receive pgpkeyserver_server packets. Domain allowed access. Send and receive pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to send and receive pgpkeyserver_server packets. Domain to not audit. Relabel packets to pgpkeyserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the pingd port. Domain allowed access. Send UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to send UDP traffic on the pingd port. Domain to not audit. Receive UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pingd port. Domain to not audit. Send and receive UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pingd port. Domain to not audit. Bind TCP sockets to the pingd port. Domain allowed access. Bind UDP sockets to the pingd port. Domain allowed access. Make a TCP connection to the pingd port. Domain allowed access. Send pingd_client packets. Domain allowed access. Do not audit attempts to send pingd_client packets. Domain to not audit. Receive pingd_client packets. Domain allowed access. Do not audit attempts to receive pingd_client packets. Domain allowed access. Send and receive pingd_client packets. Domain allowed access. Do not audit attempts to send and receive pingd_client packets. Domain to not audit. Relabel packets to pingd_client the packet type. Domain allowed access. Send pingd_server packets. Domain allowed access. Do not audit attempts to send pingd_server packets. Domain to not audit. Receive pingd_server packets. Domain allowed access. Do not audit attempts to receive pingd_server packets. Domain allowed access. Send and receive pingd_server packets. Domain allowed access. Do not audit attempts to send and receive pingd_server packets. Domain to not audit. Relabel packets to pingd_server the packet type. Domain allowed access. Send and receive TCP traffic on the piranha port. Domain allowed access. Send UDP traffic on the piranha port. Domain allowed access. Do not audit attempts to send UDP traffic on the piranha port. Domain to not audit. Receive UDP traffic on the piranha port. Domain allowed access. Do not audit attempts to receive UDP traffic on the piranha port. Domain to not audit. Send and receive UDP traffic on the piranha port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the piranha port. Domain to not audit. Bind TCP sockets to the piranha port. Domain allowed access. Bind UDP sockets to the piranha port. Domain allowed access. Make a TCP connection to the piranha port. Domain allowed access. Send piranha_client packets. Domain allowed access. Do not audit attempts to send piranha_client packets. Domain to not audit. Receive piranha_client packets. Domain allowed access. Do not audit attempts to receive piranha_client packets. Domain allowed access. Send and receive piranha_client packets. Domain allowed access. Do not audit attempts to send and receive piranha_client packets. Domain to not audit. Relabel packets to piranha_client the packet type. Domain allowed access. Send piranha_server packets. Domain allowed access. Do not audit attempts to send piranha_server packets. Domain to not audit. Receive piranha_server packets. Domain allowed access. Do not audit attempts to receive piranha_server packets. Domain allowed access. Send and receive piranha_server packets. Domain allowed access. Do not audit attempts to send and receive piranha_server packets. Domain to not audit. Relabel packets to piranha_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_ca port. Domain allowed access. Send UDP traffic on the pki_ca port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_ca port. Domain to not audit. Receive UDP traffic on the pki_ca port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_ca port. Domain to not audit. Send and receive UDP traffic on the pki_ca port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_ca port. Domain to not audit. Bind TCP sockets to the pki_ca port. Domain allowed access. Bind UDP sockets to the pki_ca port. Domain allowed access. Make a TCP connection to the pki_ca port. Domain allowed access. Send pki_ca_client packets. Domain allowed access. Do not audit attempts to send pki_ca_client packets. Domain to not audit. Receive pki_ca_client packets. Domain allowed access. Do not audit attempts to receive pki_ca_client packets. Domain allowed access. Send and receive pki_ca_client packets. Domain allowed access. Do not audit attempts to send and receive pki_ca_client packets. Domain to not audit. Relabel packets to pki_ca_client the packet type. Domain allowed access. Send pki_ca_server packets. Domain allowed access. Do not audit attempts to send pki_ca_server packets. Domain to not audit. Receive pki_ca_server packets. Domain allowed access. Do not audit attempts to receive pki_ca_server packets. Domain allowed access. Send and receive pki_ca_server packets. Domain allowed access. Do not audit attempts to send and receive pki_ca_server packets. Domain to not audit. Relabel packets to pki_ca_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_kra port. Domain allowed access. Send UDP traffic on the pki_kra port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_kra port. Domain to not audit. Receive UDP traffic on the pki_kra port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_kra port. Domain to not audit. Send and receive UDP traffic on the pki_kra port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_kra port. Domain to not audit. Bind TCP sockets to the pki_kra port. Domain allowed access. Bind UDP sockets to the pki_kra port. Domain allowed access. Make a TCP connection to the pki_kra port. Domain allowed access. Send pki_kra_client packets. Domain allowed access. Do not audit attempts to send pki_kra_client packets. Domain to not audit. Receive pki_kra_client packets. Domain allowed access. Do not audit attempts to receive pki_kra_client packets. Domain allowed access. Send and receive pki_kra_client packets. Domain allowed access. Do not audit attempts to send and receive pki_kra_client packets. Domain to not audit. Relabel packets to pki_kra_client the packet type. Domain allowed access. Send pki_kra_server packets. Domain allowed access. Do not audit attempts to send pki_kra_server packets. Domain to not audit. Receive pki_kra_server packets. Domain allowed access. Do not audit attempts to receive pki_kra_server packets. Domain allowed access. Send and receive pki_kra_server packets. Domain allowed access. Do not audit attempts to send and receive pki_kra_server packets. Domain to not audit. Relabel packets to pki_kra_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_ocsp port. Domain allowed access. Send UDP traffic on the pki_ocsp port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_ocsp port. Domain to not audit. Receive UDP traffic on the pki_ocsp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_ocsp port. Domain to not audit. Send and receive UDP traffic on the pki_ocsp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_ocsp port. Domain to not audit. Bind TCP sockets to the pki_ocsp port. Domain allowed access. Bind UDP sockets to the pki_ocsp port. Domain allowed access. Make a TCP connection to the pki_ocsp port. Domain allowed access. Send pki_ocsp_client packets. Domain allowed access. Do not audit attempts to send pki_ocsp_client packets. Domain to not audit. Receive pki_ocsp_client packets. Domain allowed access. Do not audit attempts to receive pki_ocsp_client packets. Domain allowed access. Send and receive pki_ocsp_client packets. Domain allowed access. Do not audit attempts to send and receive pki_ocsp_client packets. Domain to not audit. Relabel packets to pki_ocsp_client the packet type. Domain allowed access. Send pki_ocsp_server packets. Domain allowed access. Do not audit attempts to send pki_ocsp_server packets. Domain to not audit. Receive pki_ocsp_server packets. Domain allowed access. Do not audit attempts to receive pki_ocsp_server packets. Domain allowed access. Send and receive pki_ocsp_server packets. Domain allowed access. Do not audit attempts to send and receive pki_ocsp_server packets. Domain to not audit. Relabel packets to pki_ocsp_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_tks port. Domain allowed access. Send UDP traffic on the pki_tks port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_tks port. Domain to not audit. Receive UDP traffic on the pki_tks port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_tks port. Domain to not audit. Send and receive UDP traffic on the pki_tks port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_tks port. Domain to not audit. Bind TCP sockets to the pki_tks port. Domain allowed access. Bind UDP sockets to the pki_tks port. Domain allowed access. Make a TCP connection to the pki_tks port. Domain allowed access. Send pki_tks_client packets. Domain allowed access. Do not audit attempts to send pki_tks_client packets. Domain to not audit. Receive pki_tks_client packets. Domain allowed access. Do not audit attempts to receive pki_tks_client packets. Domain allowed access. Send and receive pki_tks_client packets. Domain allowed access. Do not audit attempts to send and receive pki_tks_client packets. Domain to not audit. Relabel packets to pki_tks_client the packet type. Domain allowed access. Send pki_tks_server packets. Domain allowed access. Do not audit attempts to send pki_tks_server packets. Domain to not audit. Receive pki_tks_server packets. Domain allowed access. Do not audit attempts to receive pki_tks_server packets. Domain allowed access. Send and receive pki_tks_server packets. Domain allowed access. Do not audit attempts to send and receive pki_tks_server packets. Domain to not audit. Relabel packets to pki_tks_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_ra port. Domain allowed access. Send UDP traffic on the pki_ra port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_ra port. Domain to not audit. Receive UDP traffic on the pki_ra port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_ra port. Domain to not audit. Send and receive UDP traffic on the pki_ra port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_ra port. Domain to not audit. Bind TCP sockets to the pki_ra port. Domain allowed access. Bind UDP sockets to the pki_ra port. Domain allowed access. Make a TCP connection to the pki_ra port. Domain allowed access. Send pki_ra_client packets. Domain allowed access. Do not audit attempts to send pki_ra_client packets. Domain to not audit. Receive pki_ra_client packets. Domain allowed access. Do not audit attempts to receive pki_ra_client packets. Domain allowed access. Send and receive pki_ra_client packets. Domain allowed access. Do not audit attempts to send and receive pki_ra_client packets. Domain to not audit. Relabel packets to pki_ra_client the packet type. Domain allowed access. Send pki_ra_server packets. Domain allowed access. Do not audit attempts to send pki_ra_server packets. Domain to not audit. Receive pki_ra_server packets. Domain allowed access. Do not audit attempts to receive pki_ra_server packets. Domain allowed access. Send and receive pki_ra_server packets. Domain allowed access. Do not audit attempts to send and receive pki_ra_server packets. Domain to not audit. Relabel packets to pki_ra_server the packet type. Domain allowed access. Send and receive TCP traffic on the pki_tps port. Domain allowed access. Send UDP traffic on the pki_tps port. Domain allowed access. Do not audit attempts to send UDP traffic on the pki_tps port. Domain to not audit. Receive UDP traffic on the pki_tps port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pki_tps port. Domain to not audit. Send and receive UDP traffic on the pki_tps port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pki_tps port. Domain to not audit. Bind TCP sockets to the pki_tps port. Domain allowed access. Bind UDP sockets to the pki_tps port. Domain allowed access. Make a TCP connection to the pki_tps port. Domain allowed access. Send pki_tps_client packets. Domain allowed access. Do not audit attempts to send pki_tps_client packets. Domain to not audit. Receive pki_tps_client packets. Domain allowed access. Do not audit attempts to receive pki_tps_client packets. Domain allowed access. Send and receive pki_tps_client packets. Domain allowed access. Do not audit attempts to send and receive pki_tps_client packets. Domain to not audit. Relabel packets to pki_tps_client the packet type. Domain allowed access. Send pki_tps_server packets. Domain allowed access. Do not audit attempts to send pki_tps_server packets. Domain to not audit. Receive pki_tps_server packets. Domain allowed access. Do not audit attempts to receive pki_tps_server packets. Domain allowed access. Send and receive pki_tps_server packets. Domain allowed access. Do not audit attempts to send and receive pki_tps_server packets. Domain to not audit. Relabel packets to pki_tps_server the packet type. Domain allowed access. Send and receive TCP traffic on the pop port. Domain allowed access. Send UDP traffic on the pop port. Domain allowed access. Do not audit attempts to send UDP traffic on the pop port. Domain to not audit. Receive UDP traffic on the pop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pop port. Domain to not audit. Send and receive UDP traffic on the pop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pop port. Domain to not audit. Bind TCP sockets to the pop port. Domain allowed access. Bind UDP sockets to the pop port. Domain allowed access. Make a TCP connection to the pop port. Domain allowed access. Send pop_client packets. Domain allowed access. Do not audit attempts to send pop_client packets. Domain to not audit. Receive pop_client packets. Domain allowed access. Do not audit attempts to receive pop_client packets. Domain allowed access. Send and receive pop_client packets. Domain allowed access. Do not audit attempts to send and receive pop_client packets. Domain to not audit. Relabel packets to pop_client the packet type. Domain allowed access. Send pop_server packets. Domain allowed access. Do not audit attempts to send pop_server packets. Domain to not audit. Receive pop_server packets. Domain allowed access. Do not audit attempts to receive pop_server packets. Domain allowed access. Send and receive pop_server packets. Domain allowed access. Do not audit attempts to send and receive pop_server packets. Domain to not audit. Relabel packets to pop_server the packet type. Domain allowed access. Send and receive TCP traffic on the portmap port. Domain allowed access. Send UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to send UDP traffic on the portmap port. Domain to not audit. Receive UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the portmap port. Domain to not audit. Send and receive UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the portmap port. Domain to not audit. Bind TCP sockets to the portmap port. Domain allowed access. Bind UDP sockets to the portmap port. Domain allowed access. Make a TCP connection to the portmap port. Domain allowed access. Send portmap_client packets. Domain allowed access. Do not audit attempts to send portmap_client packets. Domain to not audit. Receive portmap_client packets. Domain allowed access. Do not audit attempts to receive portmap_client packets. Domain allowed access. Send and receive portmap_client packets. Domain allowed access. Do not audit attempts to send and receive portmap_client packets. Domain to not audit. Relabel packets to portmap_client the packet type. Domain allowed access. Send portmap_server packets. Domain allowed access. Do not audit attempts to send portmap_server packets. Domain to not audit. Receive portmap_server packets. Domain allowed access. Do not audit attempts to receive portmap_server packets. Domain allowed access. Send and receive portmap_server packets. Domain allowed access. Do not audit attempts to send and receive portmap_server packets. Domain to not audit. Relabel packets to portmap_server the packet type. Domain allowed access. Send and receive TCP traffic on the postfix_policyd port. Domain allowed access. Send UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to send UDP traffic on the postfix_policyd port. Domain to not audit. Receive UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postfix_policyd port. Domain to not audit. Send and receive UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postfix_policyd port. Domain to not audit. Bind TCP sockets to the postfix_policyd port. Domain allowed access. Bind UDP sockets to the postfix_policyd port. Domain allowed access. Make a TCP connection to the postfix_policyd port. Domain allowed access. Send postfix_policyd_client packets. Domain allowed access. Do not audit attempts to send postfix_policyd_client packets. Domain to not audit. Receive postfix_policyd_client packets. Domain allowed access. Do not audit attempts to receive postfix_policyd_client packets. Domain allowed access. Send and receive postfix_policyd_client packets. Domain allowed access. Do not audit attempts to send and receive postfix_policyd_client packets. Domain to not audit. Relabel packets to postfix_policyd_client the packet type. Domain allowed access. Send postfix_policyd_server packets. Domain allowed access. Do not audit attempts to send postfix_policyd_server packets. Domain to not audit. Receive postfix_policyd_server packets. Domain allowed access. Do not audit attempts to receive postfix_policyd_server packets. Domain allowed access. Send and receive postfix_policyd_server packets. Domain allowed access. Do not audit attempts to send and receive postfix_policyd_server packets. Domain to not audit. Relabel packets to postfix_policyd_server the packet type. Domain allowed access. Send and receive TCP traffic on the postgresql port. Domain allowed access. Send UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to send UDP traffic on the postgresql port. Domain to not audit. Receive UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postgresql port. Domain to not audit. Send and receive UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postgresql port. Domain to not audit. Bind TCP sockets to the postgresql port. Domain allowed access. Bind UDP sockets to the postgresql port. Domain allowed access. Make a TCP connection to the postgresql port. Domain allowed access. Send postgresql_client packets. Domain allowed access. Do not audit attempts to send postgresql_client packets. Domain to not audit. Receive postgresql_client packets. Domain allowed access. Do not audit attempts to receive postgresql_client packets. Domain allowed access. Send and receive postgresql_client packets. Domain allowed access. Do not audit attempts to send and receive postgresql_client packets. Domain to not audit. Relabel packets to postgresql_client the packet type. Domain allowed access. Send postgresql_server packets. Domain allowed access. Do not audit attempts to send postgresql_server packets. Domain to not audit. Receive postgresql_server packets. Domain allowed access. Do not audit attempts to receive postgresql_server packets. Domain allowed access. Send and receive postgresql_server packets. Domain allowed access. Do not audit attempts to send and receive postgresql_server packets. Domain to not audit. Relabel packets to postgresql_server the packet type. Domain allowed access. Send and receive TCP traffic on the postgrey port. Domain allowed access. Send UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to send UDP traffic on the postgrey port. Domain to not audit. Receive UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postgrey port. Domain to not audit. Send and receive UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postgrey port. Domain to not audit. Bind TCP sockets to the postgrey port. Domain allowed access. Bind UDP sockets to the postgrey port. Domain allowed access. Make a TCP connection to the postgrey port. Domain allowed access. Send postgrey_client packets. Domain allowed access. Do not audit attempts to send postgrey_client packets. Domain to not audit. Receive postgrey_client packets. Domain allowed access. Do not audit attempts to receive postgrey_client packets. Domain allowed access. Send and receive postgrey_client packets. Domain allowed access. Do not audit attempts to send and receive postgrey_client packets. Domain to not audit. Relabel packets to postgrey_client the packet type. Domain allowed access. Send postgrey_server packets. Domain allowed access. Do not audit attempts to send postgrey_server packets. Domain to not audit. Receive postgrey_server packets. Domain allowed access. Do not audit attempts to receive postgrey_server packets. Domain allowed access. Send and receive postgrey_server packets. Domain allowed access. Do not audit attempts to send and receive postgrey_server packets. Domain to not audit. Relabel packets to postgrey_server the packet type. Domain allowed access. Send and receive TCP traffic on the prelude port. Domain allowed access. Send UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to send UDP traffic on the prelude port. Domain to not audit. Receive UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to receive UDP traffic on the prelude port. Domain to not audit. Send and receive UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the prelude port. Domain to not audit. Bind TCP sockets to the prelude port. Domain allowed access. Bind UDP sockets to the prelude port. Domain allowed access. Make a TCP connection to the prelude port. Domain allowed access. Send prelude_client packets. Domain allowed access. Do not audit attempts to send prelude_client packets. Domain to not audit. Receive prelude_client packets. Domain allowed access. Do not audit attempts to receive prelude_client packets. Domain allowed access. Send and receive prelude_client packets. Domain allowed access. Do not audit attempts to send and receive prelude_client packets. Domain to not audit. Relabel packets to prelude_client the packet type. Domain allowed access. Send prelude_server packets. Domain allowed access. Do not audit attempts to send prelude_server packets. Domain to not audit. Receive prelude_server packets. Domain allowed access. Do not audit attempts to receive prelude_server packets. Domain allowed access. Send and receive prelude_server packets. Domain allowed access. Do not audit attempts to send and receive prelude_server packets. Domain to not audit. Relabel packets to prelude_server the packet type. Domain allowed access. Send and receive TCP traffic on the presence port. Domain allowed access. Send UDP traffic on the presence port. Domain allowed access. Do not audit attempts to send UDP traffic on the presence port. Domain to not audit. Receive UDP traffic on the presence port. Domain allowed access. Do not audit attempts to receive UDP traffic on the presence port. Domain to not audit. Send and receive UDP traffic on the presence port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the presence port. Domain to not audit. Bind TCP sockets to the presence port. Domain allowed access. Bind UDP sockets to the presence port. Domain allowed access. Make a TCP connection to the presence port. Domain allowed access. Send presence_client packets. Domain allowed access. Do not audit attempts to send presence_client packets. Domain to not audit. Receive presence_client packets. Domain allowed access. Do not audit attempts to receive presence_client packets. Domain allowed access. Send and receive presence_client packets. Domain allowed access. Do not audit attempts to send and receive presence_client packets. Domain to not audit. Relabel packets to presence_client the packet type. Domain allowed access. Send presence_server packets. Domain allowed access. Do not audit attempts to send presence_server packets. Domain to not audit. Receive presence_server packets. Domain allowed access. Do not audit attempts to receive presence_server packets. Domain allowed access. Send and receive presence_server packets. Domain allowed access. Do not audit attempts to send and receive presence_server packets. Domain to not audit. Relabel packets to presence_server the packet type. Domain allowed access. Send and receive TCP traffic on the preupgrade port. Domain allowed access. Send UDP traffic on the preupgrade port. Domain allowed access. Do not audit attempts to send UDP traffic on the preupgrade port. Domain to not audit. Receive UDP traffic on the preupgrade port. Domain allowed access. Do not audit attempts to receive UDP traffic on the preupgrade port. Domain to not audit. Send and receive UDP traffic on the preupgrade port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the preupgrade port. Domain to not audit. Bind TCP sockets to the preupgrade port. Domain allowed access. Bind UDP sockets to the preupgrade port. Domain allowed access. Make a TCP connection to the preupgrade port. Domain allowed access. Send preupgrade_client packets. Domain allowed access. Do not audit attempts to send preupgrade_client packets. Domain to not audit. Receive preupgrade_client packets. Domain allowed access. Do not audit attempts to receive preupgrade_client packets. Domain allowed access. Send and receive preupgrade_client packets. Domain allowed access. Do not audit attempts to send and receive preupgrade_client packets. Domain to not audit. Relabel packets to preupgrade_client the packet type. Domain allowed access. Send preupgrade_server packets. Domain allowed access. Do not audit attempts to send preupgrade_server packets. Domain to not audit. Receive preupgrade_server packets. Domain allowed access. Do not audit attempts to receive preupgrade_server packets. Domain allowed access. Send and receive preupgrade_server packets. Domain allowed access. Do not audit attempts to send and receive preupgrade_server packets. Domain to not audit. Relabel packets to preupgrade_server the packet type. Domain allowed access. Send and receive TCP traffic on the printer port. Domain allowed access. Send UDP traffic on the printer port. Domain allowed access. Do not audit attempts to send UDP traffic on the printer port. Domain to not audit. Receive UDP traffic on the printer port. Domain allowed access. Do not audit attempts to receive UDP traffic on the printer port. Domain to not audit. Send and receive UDP traffic on the printer port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the printer port. Domain to not audit. Bind TCP sockets to the printer port. Domain allowed access. Bind UDP sockets to the printer port. Domain allowed access. Make a TCP connection to the printer port. Domain allowed access. Send printer_client packets. Domain allowed access. Do not audit attempts to send printer_client packets. Domain to not audit. Receive printer_client packets. Domain allowed access. Do not audit attempts to receive printer_client packets. Domain allowed access. Send and receive printer_client packets. Domain allowed access. Do not audit attempts to send and receive printer_client packets. Domain to not audit. Relabel packets to printer_client the packet type. Domain allowed access. Send printer_server packets. Domain allowed access. Do not audit attempts to send printer_server packets. Domain to not audit. Receive printer_server packets. Domain allowed access. Do not audit attempts to receive printer_server packets. Domain allowed access. Send and receive printer_server packets. Domain allowed access. Do not audit attempts to send and receive printer_server packets. Domain to not audit. Relabel packets to printer_server the packet type. Domain allowed access. Send and receive TCP traffic on the ptal port. Domain allowed access. Send UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to send UDP traffic on the ptal port. Domain to not audit. Receive UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ptal port. Domain to not audit. Send and receive UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ptal port. Domain to not audit. Bind TCP sockets to the ptal port. Domain allowed access. Bind UDP sockets to the ptal port. Domain allowed access. Make a TCP connection to the ptal port. Domain allowed access. Send ptal_client packets. Domain allowed access. Do not audit attempts to send ptal_client packets. Domain to not audit. Receive ptal_client packets. Domain allowed access. Do not audit attempts to receive ptal_client packets. Domain allowed access. Send and receive ptal_client packets. Domain allowed access. Do not audit attempts to send and receive ptal_client packets. Domain to not audit. Relabel packets to ptal_client the packet type. Domain allowed access. Send ptal_server packets. Domain allowed access. Do not audit attempts to send ptal_server packets. Domain to not audit. Receive ptal_server packets. Domain allowed access. Do not audit attempts to receive ptal_server packets. Domain allowed access. Send and receive ptal_server packets. Domain allowed access. Do not audit attempts to send and receive ptal_server packets. Domain to not audit. Relabel packets to ptal_server the packet type. Domain allowed access. Send and receive TCP traffic on the pulseaudio port. Domain allowed access. Send UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to send UDP traffic on the pulseaudio port. Domain to not audit. Receive UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pulseaudio port. Domain to not audit. Send and receive UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pulseaudio port. Domain to not audit. Bind TCP sockets to the pulseaudio port. Domain allowed access. Bind UDP sockets to the pulseaudio port. Domain allowed access. Make a TCP connection to the pulseaudio port. Domain allowed access. Send pulseaudio_client packets. Domain allowed access. Do not audit attempts to send pulseaudio_client packets. Domain to not audit. Receive pulseaudio_client packets. Domain allowed access. Do not audit attempts to receive pulseaudio_client packets. Domain allowed access. Send and receive pulseaudio_client packets. Domain allowed access. Do not audit attempts to send and receive pulseaudio_client packets. Domain to not audit. Relabel packets to pulseaudio_client the packet type. Domain allowed access. Send pulseaudio_server packets. Domain allowed access. Do not audit attempts to send pulseaudio_server packets. Domain to not audit. Receive pulseaudio_server packets. Domain allowed access. Do not audit attempts to receive pulseaudio_server packets. Domain allowed access. Send and receive pulseaudio_server packets. Domain allowed access. Do not audit attempts to send and receive pulseaudio_server packets. Domain to not audit. Relabel packets to pulseaudio_server the packet type. Domain allowed access. Send and receive TCP traffic on the puppet port. Domain allowed access. Send UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to send UDP traffic on the puppet port. Domain to not audit. Receive UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to receive UDP traffic on the puppet port. Domain to not audit. Send and receive UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the puppet port. Domain to not audit. Bind TCP sockets to the puppet port. Domain allowed access. Bind UDP sockets to the puppet port. Domain allowed access. Make a TCP connection to the puppet port. Domain allowed access. Send puppet_client packets. Domain allowed access. Do not audit attempts to send puppet_client packets. Domain to not audit. Receive puppet_client packets. Domain allowed access. Do not audit attempts to receive puppet_client packets. Domain allowed access. Send and receive puppet_client packets. Domain allowed access. Do not audit attempts to send and receive puppet_client packets. Domain to not audit. Relabel packets to puppet_client the packet type. Domain allowed access. Send puppet_server packets. Domain allowed access. Do not audit attempts to send puppet_server packets. Domain to not audit. Receive puppet_server packets. Domain allowed access. Do not audit attempts to receive puppet_server packets. Domain allowed access. Send and receive puppet_server packets. Domain allowed access. Do not audit attempts to send and receive puppet_server packets. Domain to not audit. Relabel packets to puppet_server the packet type. Domain allowed access. Send and receive TCP traffic on the pxe port. Domain allowed access. Send UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to send UDP traffic on the pxe port. Domain to not audit. Receive UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pxe port. Domain to not audit. Send and receive UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pxe port. Domain to not audit. Bind TCP sockets to the pxe port. Domain allowed access. Bind UDP sockets to the pxe port. Domain allowed access. Make a TCP connection to the pxe port. Domain allowed access. Send pxe_client packets. Domain allowed access. Do not audit attempts to send pxe_client packets. Domain to not audit. Receive pxe_client packets. Domain allowed access. Do not audit attempts to receive pxe_client packets. Domain allowed access. Send and receive pxe_client packets. Domain allowed access. Do not audit attempts to send and receive pxe_client packets. Domain to not audit. Relabel packets to pxe_client the packet type. Domain allowed access. Send pxe_server packets. Domain allowed access. Do not audit attempts to send pxe_server packets. Domain to not audit. Receive pxe_server packets. Domain allowed access. Do not audit attempts to receive pxe_server packets. Domain allowed access. Send and receive pxe_server packets. Domain allowed access. Do not audit attempts to send and receive pxe_server packets. Domain to not audit. Relabel packets to pxe_server the packet type. Domain allowed access. Send and receive TCP traffic on the pyzor port. Domain allowed access. Send UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to send UDP traffic on the pyzor port. Domain to not audit. Receive UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pyzor port. Domain to not audit. Send and receive UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pyzor port. Domain to not audit. Bind TCP sockets to the pyzor port. Domain allowed access. Bind UDP sockets to the pyzor port. Domain allowed access. Make a TCP connection to the pyzor port. Domain allowed access. Send pyzor_client packets. Domain allowed access. Do not audit attempts to send pyzor_client packets. Domain to not audit. Receive pyzor_client packets. Domain allowed access. Do not audit attempts to receive pyzor_client packets. Domain allowed access. Send and receive pyzor_client packets. Domain allowed access. Do not audit attempts to send and receive pyzor_client packets. Domain to not audit. Relabel packets to pyzor_client the packet type. Domain allowed access. Send pyzor_server packets. Domain allowed access. Do not audit attempts to send pyzor_server packets. Domain to not audit. Receive pyzor_server packets. Domain allowed access. Do not audit attempts to receive pyzor_server packets. Domain allowed access. Send and receive pyzor_server packets. Domain allowed access. Do not audit attempts to send and receive pyzor_server packets. Domain to not audit. Relabel packets to pyzor_server the packet type. Domain allowed access. Send and receive TCP traffic on the neutron port. Domain allowed access. Send UDP traffic on the neutron port. Domain allowed access. Do not audit attempts to send UDP traffic on the neutron port. Domain to not audit. Receive UDP traffic on the neutron port. Domain allowed access. Do not audit attempts to receive UDP traffic on the neutron port. Domain to not audit. Send and receive UDP traffic on the neutron port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the neutron port. Domain to not audit. Bind TCP sockets to the neutron port. Domain allowed access. Bind UDP sockets to the neutron port. Domain allowed access. Make a TCP connection to the neutron port. Domain allowed access. Send neutron_client packets. Domain allowed access. Do not audit attempts to send neutron_client packets. Domain to not audit. Receive neutron_client packets. Domain allowed access. Do not audit attempts to receive neutron_client packets. Domain allowed access. Send and receive neutron_client packets. Domain allowed access. Do not audit attempts to send and receive neutron_client packets. Domain to not audit. Relabel packets to neutron_client the packet type. Domain allowed access. Send neutron_server packets. Domain allowed access. Do not audit attempts to send neutron_server packets. Domain to not audit. Receive neutron_server packets. Domain allowed access. Do not audit attempts to receive neutron_server packets. Domain allowed access. Send and receive neutron_server packets. Domain allowed access. Do not audit attempts to send and receive neutron_server packets. Domain to not audit. Relabel packets to neutron_server the packet type. Domain allowed access. Send and receive TCP traffic on the radacct port. Domain allowed access. Send UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to send UDP traffic on the radacct port. Domain to not audit. Receive UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radacct port. Domain to not audit. Send and receive UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radacct port. Domain to not audit. Bind TCP sockets to the radacct port. Domain allowed access. Bind UDP sockets to the radacct port. Domain allowed access. Make a TCP connection to the radacct port. Domain allowed access. Send radacct_client packets. Domain allowed access. Do not audit attempts to send radacct_client packets. Domain to not audit. Receive radacct_client packets. Domain allowed access. Do not audit attempts to receive radacct_client packets. Domain allowed access. Send and receive radacct_client packets. Domain allowed access. Do not audit attempts to send and receive radacct_client packets. Domain to not audit. Relabel packets to radacct_client the packet type. Domain allowed access. Send radacct_server packets. Domain allowed access. Do not audit attempts to send radacct_server packets. Domain to not audit. Receive radacct_server packets. Domain allowed access. Do not audit attempts to receive radacct_server packets. Domain allowed access. Send and receive radacct_server packets. Domain allowed access. Do not audit attempts to send and receive radacct_server packets. Domain to not audit. Relabel packets to radacct_server the packet type. Domain allowed access. Send and receive TCP traffic on the radius port. Domain allowed access. Send UDP traffic on the radius port. Domain allowed access. Do not audit attempts to send UDP traffic on the radius port. Domain to not audit. Receive UDP traffic on the radius port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radius port. Domain to not audit. Send and receive UDP traffic on the radius port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radius port. Domain to not audit. Bind TCP sockets to the radius port. Domain allowed access. Bind UDP sockets to the radius port. Domain allowed access. Make a TCP connection to the radius port. Domain allowed access. Send radius_client packets. Domain allowed access. Do not audit attempts to send radius_client packets. Domain to not audit. Receive radius_client packets. Domain allowed access. Do not audit attempts to receive radius_client packets. Domain allowed access. Send and receive radius_client packets. Domain allowed access. Do not audit attempts to send and receive radius_client packets. Domain to not audit. Relabel packets to radius_client the packet type. Domain allowed access. Send radius_server packets. Domain allowed access. Do not audit attempts to send radius_server packets. Domain to not audit. Receive radius_server packets. Domain allowed access. Do not audit attempts to receive radius_server packets. Domain allowed access. Send and receive radius_server packets. Domain allowed access. Do not audit attempts to send and receive radius_server packets. Domain to not audit. Relabel packets to radius_server the packet type. Domain allowed access. Send and receive TCP traffic on the radsec port. Domain allowed access. Send UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to send UDP traffic on the radsec port. Domain to not audit. Receive UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radsec port. Domain to not audit. Send and receive UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radsec port. Domain to not audit. Bind TCP sockets to the radsec port. Domain allowed access. Bind UDP sockets to the radsec port. Domain allowed access. Make a TCP connection to the radsec port. Domain allowed access. Send radsec_client packets. Domain allowed access. Do not audit attempts to send radsec_client packets. Domain to not audit. Receive radsec_client packets. Domain allowed access. Do not audit attempts to receive radsec_client packets. Domain allowed access. Send and receive radsec_client packets. Domain allowed access. Do not audit attempts to send and receive radsec_client packets. Domain to not audit. Relabel packets to radsec_client the packet type. Domain allowed access. Send radsec_server packets. Domain allowed access. Do not audit attempts to send radsec_server packets. Domain to not audit. Receive radsec_server packets. Domain allowed access. Do not audit attempts to receive radsec_server packets. Domain allowed access. Send and receive radsec_server packets. Domain allowed access. Do not audit attempts to send and receive radsec_server packets. Domain to not audit. Relabel packets to radsec_server the packet type. Domain allowed access. Send and receive TCP traffic on the razor port. Domain allowed access. Send UDP traffic on the razor port. Domain allowed access. Do not audit attempts to send UDP traffic on the razor port. Domain to not audit. Receive UDP traffic on the razor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the razor port. Domain to not audit. Send and receive UDP traffic on the razor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the razor port. Domain to not audit. Bind TCP sockets to the razor port. Domain allowed access. Bind UDP sockets to the razor port. Domain allowed access. Make a TCP connection to the razor port. Domain allowed access. Send razor_client packets. Domain allowed access. Do not audit attempts to send razor_client packets. Domain to not audit. Receive razor_client packets. Domain allowed access. Do not audit attempts to receive razor_client packets. Domain allowed access. Send and receive razor_client packets. Domain allowed access. Do not audit attempts to send and receive razor_client packets. Domain to not audit. Relabel packets to razor_client the packet type. Domain allowed access. Send razor_server packets. Domain allowed access. Do not audit attempts to send razor_server packets. Domain to not audit. Receive razor_server packets. Domain allowed access. Do not audit attempts to receive razor_server packets. Domain allowed access. Send and receive razor_server packets. Domain allowed access. Do not audit attempts to send and receive razor_server packets. Domain to not audit. Relabel packets to razor_server the packet type. Domain allowed access. Send and receive TCP traffic on the redis port. Domain allowed access. Send UDP traffic on the redis port. Domain allowed access. Do not audit attempts to send UDP traffic on the redis port. Domain to not audit. Receive UDP traffic on the redis port. Domain allowed access. Do not audit attempts to receive UDP traffic on the redis port. Domain to not audit. Send and receive UDP traffic on the redis port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the redis port. Domain to not audit. Bind TCP sockets to the redis port. Domain allowed access. Bind UDP sockets to the redis port. Domain allowed access. Make a TCP connection to the redis port. Domain allowed access. Send redis_client packets. Domain allowed access. Do not audit attempts to send redis_client packets. Domain to not audit. Receive redis_client packets. Domain allowed access. Do not audit attempts to receive redis_client packets. Domain allowed access. Send and receive redis_client packets. Domain allowed access. Do not audit attempts to send and receive redis_client packets. Domain to not audit. Relabel packets to redis_client the packet type. Domain allowed access. Send redis_server packets. Domain allowed access. Do not audit attempts to send redis_server packets. Domain to not audit. Receive redis_server packets. Domain allowed access. Do not audit attempts to receive redis_server packets. Domain allowed access. Send and receive redis_server packets. Domain allowed access. Do not audit attempts to send and receive redis_server packets. Domain to not audit. Relabel packets to redis_server the packet type. Domain allowed access. Send and receive TCP traffic on the repository port. Domain allowed access. Send UDP traffic on the repository port. Domain allowed access. Do not audit attempts to send UDP traffic on the repository port. Domain to not audit. Receive UDP traffic on the repository port. Domain allowed access. Do not audit attempts to receive UDP traffic on the repository port. Domain to not audit. Send and receive UDP traffic on the repository port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the repository port. Domain to not audit. Bind TCP sockets to the repository port. Domain allowed access. Bind UDP sockets to the repository port. Domain allowed access. Make a TCP connection to the repository port. Domain allowed access. Send repository_client packets. Domain allowed access. Do not audit attempts to send repository_client packets. Domain to not audit. Receive repository_client packets. Domain allowed access. Do not audit attempts to receive repository_client packets. Domain allowed access. Send and receive repository_client packets. Domain allowed access. Do not audit attempts to send and receive repository_client packets. Domain to not audit. Relabel packets to repository_client the packet type. Domain allowed access. Send repository_server packets. Domain allowed access. Do not audit attempts to send repository_server packets. Domain to not audit. Receive repository_server packets. Domain allowed access. Do not audit attempts to receive repository_server packets. Domain allowed access. Send and receive repository_server packets. Domain allowed access. Do not audit attempts to send and receive repository_server packets. Domain to not audit. Relabel packets to repository_server the packet type. Domain allowed access. Send and receive TCP traffic on the ricci port. Domain allowed access. Send UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to send UDP traffic on the ricci port. Domain to not audit. Receive UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ricci port. Domain to not audit. Send and receive UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ricci port. Domain to not audit. Bind TCP sockets to the ricci port. Domain allowed access. Bind UDP sockets to the ricci port. Domain allowed access. Make a TCP connection to the ricci port. Domain allowed access. Send ricci_client packets. Domain allowed access. Do not audit attempts to send ricci_client packets. Domain to not audit. Receive ricci_client packets. Domain allowed access. Do not audit attempts to receive ricci_client packets. Domain allowed access. Send and receive ricci_client packets. Domain allowed access. Do not audit attempts to send and receive ricci_client packets. Domain to not audit. Relabel packets to ricci_client the packet type. Domain allowed access. Send ricci_server packets. Domain allowed access. Do not audit attempts to send ricci_server packets. Domain to not audit. Receive ricci_server packets. Domain allowed access. Do not audit attempts to receive ricci_server packets. Domain allowed access. Send and receive ricci_server packets. Domain allowed access. Do not audit attempts to send and receive ricci_server packets. Domain to not audit. Relabel packets to ricci_server the packet type. Domain allowed access. Send and receive TCP traffic on the ricci_modcluster port. Domain allowed access. Send UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to send UDP traffic on the ricci_modcluster port. Domain to not audit. Receive UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ricci_modcluster port. Domain to not audit. Send and receive UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ricci_modcluster port. Domain to not audit. Bind TCP sockets to the ricci_modcluster port. Domain allowed access. Bind UDP sockets to the ricci_modcluster port. Domain allowed access. Make a TCP connection to the ricci_modcluster port. Domain allowed access. Send ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to send ricci_modcluster_client packets. Domain to not audit. Receive ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to receive ricci_modcluster_client packets. Domain allowed access. Send and receive ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to send and receive ricci_modcluster_client packets. Domain to not audit. Relabel packets to ricci_modcluster_client the packet type. Domain allowed access. Send ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to send ricci_modcluster_server packets. Domain to not audit. Receive ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to receive ricci_modcluster_server packets. Domain allowed access. Send and receive ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to send and receive ricci_modcluster_server packets. Domain to not audit. Relabel packets to ricci_modcluster_server the packet type. Domain allowed access. Send and receive TCP traffic on the rlogind port. Domain allowed access. Send UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to send UDP traffic on the rlogind port. Domain to not audit. Receive UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rlogind port. Domain to not audit. Send and receive UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rlogind port. Domain to not audit. Bind TCP sockets to the rlogind port. Domain allowed access. Bind UDP sockets to the rlogind port. Domain allowed access. Make a TCP connection to the rlogind port. Domain allowed access. Send rlogind_client packets. Domain allowed access. Do not audit attempts to send rlogind_client packets. Domain to not audit. Receive rlogind_client packets. Domain allowed access. Do not audit attempts to receive rlogind_client packets. Domain allowed access. Send and receive rlogind_client packets. Domain allowed access. Do not audit attempts to send and receive rlogind_client packets. Domain to not audit. Relabel packets to rlogind_client the packet type. Domain allowed access. Send rlogind_server packets. Domain allowed access. Do not audit attempts to send rlogind_server packets. Domain to not audit. Receive rlogind_server packets. Domain allowed access. Do not audit attempts to receive rlogind_server packets. Domain allowed access. Send and receive rlogind_server packets. Domain allowed access. Do not audit attempts to send and receive rlogind_server packets. Domain to not audit. Relabel packets to rlogind_server the packet type. Domain allowed access. Send and receive TCP traffic on the rndc port. Domain allowed access. Send UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to send UDP traffic on the rndc port. Domain to not audit. Receive UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rndc port. Domain to not audit. Send and receive UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rndc port. Domain to not audit. Bind TCP sockets to the rndc port. Domain allowed access. Bind UDP sockets to the rndc port. Domain allowed access. Make a TCP connection to the rndc port. Domain allowed access. Send rndc_client packets. Domain allowed access. Do not audit attempts to send rndc_client packets. Domain to not audit. Receive rndc_client packets. Domain allowed access. Do not audit attempts to receive rndc_client packets. Domain allowed access. Send and receive rndc_client packets. Domain allowed access. Do not audit attempts to send and receive rndc_client packets. Domain to not audit. Relabel packets to rndc_client the packet type. Domain allowed access. Send rndc_server packets. Domain allowed access. Do not audit attempts to send rndc_server packets. Domain to not audit. Receive rndc_server packets. Domain allowed access. Do not audit attempts to receive rndc_server packets. Domain allowed access. Send and receive rndc_server packets. Domain allowed access. Do not audit attempts to send and receive rndc_server packets. Domain to not audit. Relabel packets to rndc_server the packet type. Domain allowed access. Send and receive TCP traffic on the router port. Domain allowed access. Send UDP traffic on the router port. Domain allowed access. Do not audit attempts to send UDP traffic on the router port. Domain to not audit. Receive UDP traffic on the router port. Domain allowed access. Do not audit attempts to receive UDP traffic on the router port. Domain to not audit. Send and receive UDP traffic on the router port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the router port. Domain to not audit. Bind TCP sockets to the router port. Domain allowed access. Bind UDP sockets to the router port. Domain allowed access. Make a TCP connection to the router port. Domain allowed access. Send router_client packets. Domain allowed access. Do not audit attempts to send router_client packets. Domain to not audit. Receive router_client packets. Domain allowed access. Do not audit attempts to receive router_client packets. Domain allowed access. Send and receive router_client packets. Domain allowed access. Do not audit attempts to send and receive router_client packets. Domain to not audit. Relabel packets to router_client the packet type. Domain allowed access. Send router_server packets. Domain allowed access. Do not audit attempts to send router_server packets. Domain to not audit. Receive router_server packets. Domain allowed access. Do not audit attempts to receive router_server packets. Domain allowed access. Send and receive router_server packets. Domain allowed access. Do not audit attempts to send and receive router_server packets. Domain to not audit. Relabel packets to router_server the packet type. Domain allowed access. Send and receive TCP traffic on the rsh port. Domain allowed access. Send UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to send UDP traffic on the rsh port. Domain to not audit. Receive UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rsh port. Domain to not audit. Send and receive UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rsh port. Domain to not audit. Bind TCP sockets to the rsh port. Domain allowed access. Bind UDP sockets to the rsh port. Domain allowed access. Make a TCP connection to the rsh port. Domain allowed access. Send rsh_client packets. Domain allowed access. Do not audit attempts to send rsh_client packets. Domain to not audit. Receive rsh_client packets. Domain allowed access. Do not audit attempts to receive rsh_client packets. Domain allowed access. Send and receive rsh_client packets. Domain allowed access. Do not audit attempts to send and receive rsh_client packets. Domain to not audit. Relabel packets to rsh_client the packet type. Domain allowed access. Send rsh_server packets. Domain allowed access. Do not audit attempts to send rsh_server packets. Domain to not audit. Receive rsh_server packets. Domain allowed access. Do not audit attempts to receive rsh_server packets. Domain allowed access. Send and receive rsh_server packets. Domain allowed access. Do not audit attempts to send and receive rsh_server packets. Domain to not audit. Relabel packets to rsh_server the packet type. Domain allowed access. Send and receive TCP traffic on the rsync port. Domain allowed access. Send UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to send UDP traffic on the rsync port. Domain to not audit. Receive UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rsync port. Domain to not audit. Send and receive UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rsync port. Domain to not audit. Bind TCP sockets to the rsync port. Domain allowed access. Bind UDP sockets to the rsync port. Domain allowed access. Make a TCP connection to the rsync port. Domain allowed access. Send rsync_client packets. Domain allowed access. Do not audit attempts to send rsync_client packets. Domain to not audit. Receive rsync_client packets. Domain allowed access. Do not audit attempts to receive rsync_client packets. Domain allowed access. Send and receive rsync_client packets. Domain allowed access. Do not audit attempts to send and receive rsync_client packets. Domain to not audit. Relabel packets to rsync_client the packet type. Domain allowed access. Send rsync_server packets. Domain allowed access. Do not audit attempts to send rsync_server packets. Domain to not audit. Receive rsync_server packets. Domain allowed access. Do not audit attempts to receive rsync_server packets. Domain allowed access. Send and receive rsync_server packets. Domain allowed access. Do not audit attempts to send and receive rsync_server packets. Domain to not audit. Relabel packets to rsync_server the packet type. Domain allowed access. Send and receive TCP traffic on the rwho port. Domain allowed access. Send UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to send UDP traffic on the rwho port. Domain to not audit. Receive UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rwho port. Domain to not audit. Send and receive UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rwho port. Domain to not audit. Bind TCP sockets to the rwho port. Domain allowed access. Bind UDP sockets to the rwho port. Domain allowed access. Make a TCP connection to the rwho port. Domain allowed access. Send rwho_client packets. Domain allowed access. Do not audit attempts to send rwho_client packets. Domain to not audit. Receive rwho_client packets. Domain allowed access. Do not audit attempts to receive rwho_client packets. Domain allowed access. Send and receive rwho_client packets. Domain allowed access. Do not audit attempts to send and receive rwho_client packets. Domain to not audit. Relabel packets to rwho_client the packet type. Domain allowed access. Send rwho_server packets. Domain allowed access. Do not audit attempts to send rwho_server packets. Domain to not audit. Receive rwho_server packets. Domain allowed access. Do not audit attempts to receive rwho_server packets. Domain allowed access. Send and receive rwho_server packets. Domain allowed access. Do not audit attempts to send and receive rwho_server packets. Domain to not audit. Relabel packets to rwho_server the packet type. Domain allowed access. Send and receive TCP traffic on the sap port. Domain allowed access. Send UDP traffic on the sap port. Domain allowed access. Do not audit attempts to send UDP traffic on the sap port. Domain to not audit. Receive UDP traffic on the sap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sap port. Domain to not audit. Send and receive UDP traffic on the sap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sap port. Domain to not audit. Bind TCP sockets to the sap port. Domain allowed access. Bind UDP sockets to the sap port. Domain allowed access. Make a TCP connection to the sap port. Domain allowed access. Send sap_client packets. Domain allowed access. Do not audit attempts to send sap_client packets. Domain to not audit. Receive sap_client packets. Domain allowed access. Do not audit attempts to receive sap_client packets. Domain allowed access. Send and receive sap_client packets. Domain allowed access. Do not audit attempts to send and receive sap_client packets. Domain to not audit. Relabel packets to sap_client the packet type. Domain allowed access. Send sap_server packets. Domain allowed access. Do not audit attempts to send sap_server packets. Domain to not audit. Receive sap_server packets. Domain allowed access. Do not audit attempts to receive sap_server packets. Domain allowed access. Send and receive sap_server packets. Domain allowed access. Do not audit attempts to send and receive sap_server packets. Domain to not audit. Relabel packets to sap_server the packet type. Domain allowed access. Send and receive TCP traffic on the saphostctrl port. Domain allowed access. Send UDP traffic on the saphostctrl port. Domain allowed access. Do not audit attempts to send UDP traffic on the saphostctrl port. Domain to not audit. Receive UDP traffic on the saphostctrl port. Domain allowed access. Do not audit attempts to receive UDP traffic on the saphostctrl port. Domain to not audit. Send and receive UDP traffic on the saphostctrl port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the saphostctrl port. Domain to not audit. Bind TCP sockets to the saphostctrl port. Domain allowed access. Bind UDP sockets to the saphostctrl port. Domain allowed access. Make a TCP connection to the saphostctrl port. Domain allowed access. Send saphostctrl_client packets. Domain allowed access. Do not audit attempts to send saphostctrl_client packets. Domain to not audit. Receive saphostctrl_client packets. Domain allowed access. Do not audit attempts to receive saphostctrl_client packets. Domain allowed access. Send and receive saphostctrl_client packets. Domain allowed access. Do not audit attempts to send and receive saphostctrl_client packets. Domain to not audit. Relabel packets to saphostctrl_client the packet type. Domain allowed access. Send saphostctrl_server packets. Domain allowed access. Do not audit attempts to send saphostctrl_server packets. Domain to not audit. Receive saphostctrl_server packets. Domain allowed access. Do not audit attempts to receive saphostctrl_server packets. Domain allowed access. Send and receive saphostctrl_server packets. Domain allowed access. Do not audit attempts to send and receive saphostctrl_server packets. Domain to not audit. Relabel packets to saphostctrl_server the packet type. Domain allowed access. Send and receive TCP traffic on the sieve port. Domain allowed access. Send UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to send UDP traffic on the sieve port. Domain to not audit. Receive UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sieve port. Domain to not audit. Send and receive UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sieve port. Domain to not audit. Bind TCP sockets to the sieve port. Domain allowed access. Bind UDP sockets to the sieve port. Domain allowed access. Make a TCP connection to the sieve port. Domain allowed access. Send sieve_client packets. Domain allowed access. Do not audit attempts to send sieve_client packets. Domain to not audit. Receive sieve_client packets. Domain allowed access. Do not audit attempts to receive sieve_client packets. Domain allowed access. Send and receive sieve_client packets. Domain allowed access. Do not audit attempts to send and receive sieve_client packets. Domain to not audit. Relabel packets to sieve_client the packet type. Domain allowed access. Send sieve_server packets. Domain allowed access. Do not audit attempts to send sieve_server packets. Domain to not audit. Receive sieve_server packets. Domain allowed access. Do not audit attempts to receive sieve_server packets. Domain allowed access. Send and receive sieve_server packets. Domain allowed access. Do not audit attempts to send and receive sieve_server packets. Domain to not audit. Relabel packets to sieve_server the packet type. Domain allowed access. Send and receive TCP traffic on the sip port. Domain allowed access. Send UDP traffic on the sip port. Domain allowed access. Do not audit attempts to send UDP traffic on the sip port. Domain to not audit. Receive UDP traffic on the sip port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sip port. Domain to not audit. Send and receive UDP traffic on the sip port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sip port. Domain to not audit. Bind TCP sockets to the sip port. Domain allowed access. Bind UDP sockets to the sip port. Domain allowed access. Make a TCP connection to the sip port. Domain allowed access. Send sip_client packets. Domain allowed access. Do not audit attempts to send sip_client packets. Domain to not audit. Receive sip_client packets. Domain allowed access. Do not audit attempts to receive sip_client packets. Domain allowed access. Send and receive sip_client packets. Domain allowed access. Do not audit attempts to send and receive sip_client packets. Domain to not audit. Relabel packets to sip_client the packet type. Domain allowed access. Send sip_server packets. Domain allowed access. Do not audit attempts to send sip_server packets. Domain to not audit. Receive sip_server packets. Domain allowed access. Do not audit attempts to receive sip_server packets. Domain allowed access. Send and receive sip_server packets. Domain allowed access. Do not audit attempts to send and receive sip_server packets. Domain to not audit. Relabel packets to sip_server the packet type. Domain allowed access. Send and receive TCP traffic on the sixxsconfig port. Domain allowed access. Send UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to send UDP traffic on the sixxsconfig port. Domain to not audit. Receive UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sixxsconfig port. Domain to not audit. Send and receive UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sixxsconfig port. Domain to not audit. Bind TCP sockets to the sixxsconfig port. Domain allowed access. Bind UDP sockets to the sixxsconfig port. Domain allowed access. Make a TCP connection to the sixxsconfig port. Domain allowed access. Send sixxsconfig_client packets. Domain allowed access. Do not audit attempts to send sixxsconfig_client packets. Domain to not audit. Receive sixxsconfig_client packets. Domain allowed access. Do not audit attempts to receive sixxsconfig_client packets. Domain allowed access. Send and receive sixxsconfig_client packets. Domain allowed access. Do not audit attempts to send and receive sixxsconfig_client packets. Domain to not audit. Relabel packets to sixxsconfig_client the packet type. Domain allowed access. Send sixxsconfig_server packets. Domain allowed access. Do not audit attempts to send sixxsconfig_server packets. Domain to not audit. Receive sixxsconfig_server packets. Domain allowed access. Do not audit attempts to receive sixxsconfig_server packets. Domain allowed access. Send and receive sixxsconfig_server packets. Domain allowed access. Do not audit attempts to send and receive sixxsconfig_server packets. Domain to not audit. Relabel packets to sixxsconfig_server the packet type. Domain allowed access. Send and receive TCP traffic on the smbd port. Domain allowed access. Send UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to send UDP traffic on the smbd port. Domain to not audit. Receive UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the smbd port. Domain to not audit. Send and receive UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the smbd port. Domain to not audit. Bind TCP sockets to the smbd port. Domain allowed access. Bind UDP sockets to the smbd port. Domain allowed access. Make a TCP connection to the smbd port. Domain allowed access. Send smbd_client packets. Domain allowed access. Do not audit attempts to send smbd_client packets. Domain to not audit. Receive smbd_client packets. Domain allowed access. Do not audit attempts to receive smbd_client packets. Domain allowed access. Send and receive smbd_client packets. Domain allowed access. Do not audit attempts to send and receive smbd_client packets. Domain to not audit. Relabel packets to smbd_client the packet type. Domain allowed access. Send smbd_server packets. Domain allowed access. Do not audit attempts to send smbd_server packets. Domain to not audit. Receive smbd_server packets. Domain allowed access. Do not audit attempts to receive smbd_server packets. Domain allowed access. Send and receive smbd_server packets. Domain allowed access. Do not audit attempts to send and receive smbd_server packets. Domain to not audit. Relabel packets to smbd_server the packet type. Domain allowed access. Send and receive TCP traffic on the smtp port. Domain allowed access. Send UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to send UDP traffic on the smtp port. Domain to not audit. Receive UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the smtp port. Domain to not audit. Send and receive UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the smtp port. Domain to not audit. Bind TCP sockets to the smtp port. Domain allowed access. Bind UDP sockets to the smtp port. Domain allowed access. Make a TCP connection to the smtp port. Domain allowed access. Send smtp_client packets. Domain allowed access. Do not audit attempts to send smtp_client packets. Domain to not audit. Receive smtp_client packets. Domain allowed access. Do not audit attempts to receive smtp_client packets. Domain allowed access. Send and receive smtp_client packets. Domain allowed access. Do not audit attempts to send and receive smtp_client packets. Domain to not audit. Relabel packets to smtp_client the packet type. Domain allowed access. Send smtp_server packets. Domain allowed access. Do not audit attempts to send smtp_server packets. Domain to not audit. Receive smtp_server packets. Domain allowed access. Do not audit attempts to receive smtp_server packets. Domain allowed access. Send and receive smtp_server packets. Domain allowed access. Do not audit attempts to send and receive smtp_server packets. Domain to not audit. Relabel packets to smtp_server the packet type. Domain allowed access. Send and receive TCP traffic on the snmp port. Domain allowed access. Send UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to send UDP traffic on the snmp port. Domain to not audit. Receive UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the snmp port. Domain to not audit. Send and receive UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the snmp port. Domain to not audit. Bind TCP sockets to the snmp port. Domain allowed access. Bind UDP sockets to the snmp port. Domain allowed access. Make a TCP connection to the snmp port. Domain allowed access. Send snmp_client packets. Domain allowed access. Do not audit attempts to send snmp_client packets. Domain to not audit. Receive snmp_client packets. Domain allowed access. Do not audit attempts to receive snmp_client packets. Domain allowed access. Send and receive snmp_client packets. Domain allowed access. Do not audit attempts to send and receive snmp_client packets. Domain to not audit. Relabel packets to snmp_client the packet type. Domain allowed access. Send snmp_server packets. Domain allowed access. Do not audit attempts to send snmp_server packets. Domain to not audit. Receive snmp_server packets. Domain allowed access. Do not audit attempts to receive snmp_server packets. Domain allowed access. Send and receive snmp_server packets. Domain allowed access. Do not audit attempts to send and receive snmp_server packets. Domain to not audit. Relabel packets to snmp_server the packet type. Domain allowed access. Send and receive TCP traffic on the soundd port. Domain allowed access. Send UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to send UDP traffic on the soundd port. Domain to not audit. Receive UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the soundd port. Domain to not audit. Send and receive UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the soundd port. Domain to not audit. Bind TCP sockets to the soundd port. Domain allowed access. Bind UDP sockets to the soundd port. Domain allowed access. Make a TCP connection to the soundd port. Domain allowed access. Send soundd_client packets. Domain allowed access. Do not audit attempts to send soundd_client packets. Domain to not audit. Receive soundd_client packets. Domain allowed access. Do not audit attempts to receive soundd_client packets. Domain allowed access. Send and receive soundd_client packets. Domain allowed access. Do not audit attempts to send and receive soundd_client packets. Domain to not audit. Relabel packets to soundd_client the packet type. Domain allowed access. Send soundd_server packets. Domain allowed access. Do not audit attempts to send soundd_server packets. Domain to not audit. Receive soundd_server packets. Domain allowed access. Do not audit attempts to receive soundd_server packets. Domain allowed access. Send and receive soundd_server packets. Domain allowed access. Do not audit attempts to send and receive soundd_server packets. Domain to not audit. Relabel packets to soundd_server the packet type. Domain allowed access. Send and receive TCP traffic on the spamd port. Domain allowed access. Send UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to send UDP traffic on the spamd port. Domain to not audit. Receive UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the spamd port. Domain to not audit. Send and receive UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the spamd port. Domain to not audit. Bind TCP sockets to the spamd port. Domain allowed access. Bind UDP sockets to the spamd port. Domain allowed access. Make a TCP connection to the spamd port. Domain allowed access. Send spamd_client packets. Domain allowed access. Do not audit attempts to send spamd_client packets. Domain to not audit. Receive spamd_client packets. Domain allowed access. Do not audit attempts to receive spamd_client packets. Domain allowed access. Send and receive spamd_client packets. Domain allowed access. Do not audit attempts to send and receive spamd_client packets. Domain to not audit. Relabel packets to spamd_client the packet type. Domain allowed access. Send spamd_server packets. Domain allowed access. Do not audit attempts to send spamd_server packets. Domain to not audit. Receive spamd_server packets. Domain allowed access. Do not audit attempts to receive spamd_server packets. Domain allowed access. Send and receive spamd_server packets. Domain allowed access. Do not audit attempts to send and receive spamd_server packets. Domain to not audit. Relabel packets to spamd_server the packet type. Domain allowed access. Send and receive TCP traffic on the speech port. Domain allowed access. Send UDP traffic on the speech port. Domain allowed access. Do not audit attempts to send UDP traffic on the speech port. Domain to not audit. Receive UDP traffic on the speech port. Domain allowed access. Do not audit attempts to receive UDP traffic on the speech port. Domain to not audit. Send and receive UDP traffic on the speech port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the speech port. Domain to not audit. Bind TCP sockets to the speech port. Domain allowed access. Bind UDP sockets to the speech port. Domain allowed access. Make a TCP connection to the speech port. Domain allowed access. Send speech_client packets. Domain allowed access. Do not audit attempts to send speech_client packets. Domain to not audit. Receive speech_client packets. Domain allowed access. Do not audit attempts to receive speech_client packets. Domain allowed access. Send and receive speech_client packets. Domain allowed access. Do not audit attempts to send and receive speech_client packets. Domain to not audit. Relabel packets to speech_client the packet type. Domain allowed access. Send speech_server packets. Domain allowed access. Do not audit attempts to send speech_server packets. Domain to not audit. Receive speech_server packets. Domain allowed access. Do not audit attempts to receive speech_server packets. Domain allowed access. Send and receive speech_server packets. Domain allowed access. Do not audit attempts to send and receive speech_server packets. Domain to not audit. Relabel packets to speech_server the packet type. Domain allowed access. Send and receive TCP traffic on the squid port. Domain allowed access. Send UDP traffic on the squid port. Domain allowed access. Do not audit attempts to send UDP traffic on the squid port. Domain to not audit. Receive UDP traffic on the squid port. Domain allowed access. Do not audit attempts to receive UDP traffic on the squid port. Domain to not audit. Send and receive UDP traffic on the squid port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the squid port. Domain to not audit. Bind TCP sockets to the squid port. Domain allowed access. Bind UDP sockets to the squid port. Domain allowed access. Make a TCP connection to the squid port. Domain allowed access. Send squid_client packets. Domain allowed access. Do not audit attempts to send squid_client packets. Domain to not audit. Receive squid_client packets. Domain allowed access. Do not audit attempts to receive squid_client packets. Domain allowed access. Send and receive squid_client packets. Domain allowed access. Do not audit attempts to send and receive squid_client packets. Domain to not audit. Relabel packets to squid_client the packet type. Domain allowed access. Send squid_server packets. Domain allowed access. Do not audit attempts to send squid_server packets. Domain to not audit. Receive squid_server packets. Domain allowed access. Do not audit attempts to receive squid_server packets. Domain allowed access. Send and receive squid_server packets. Domain allowed access. Do not audit attempts to send and receive squid_server packets. Domain to not audit. Relabel packets to squid_server the packet type. Domain allowed access. Send and receive TCP traffic on the ssh port. Domain allowed access. Send UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to send UDP traffic on the ssh port. Domain to not audit. Receive UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ssh port. Domain to not audit. Send and receive UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ssh port. Domain to not audit. Bind TCP sockets to the ssh port. Domain allowed access. Bind UDP sockets to the ssh port. Domain allowed access. Make a TCP connection to the ssh port. Domain allowed access. Send ssh_client packets. Domain allowed access. Do not audit attempts to send ssh_client packets. Domain to not audit. Receive ssh_client packets. Domain allowed access. Do not audit attempts to receive ssh_client packets. Domain allowed access. Send and receive ssh_client packets. Domain allowed access. Do not audit attempts to send and receive ssh_client packets. Domain to not audit. Relabel packets to ssh_client the packet type. Domain allowed access. Send ssh_server packets. Domain allowed access. Do not audit attempts to send ssh_server packets. Domain to not audit. Receive ssh_server packets. Domain allowed access. Do not audit attempts to receive ssh_server packets. Domain allowed access. Send and receive ssh_server packets. Domain allowed access. Do not audit attempts to send and receive ssh_server packets. Domain to not audit. Relabel packets to ssh_server the packet type. Domain allowed access. Send and receive TCP traffic on the streaming port. Domain allowed access. Send UDP traffic on the streaming port. Domain allowed access. Do not audit attempts to send UDP traffic on the streaming port. Domain to not audit. Receive UDP traffic on the streaming port. Domain allowed access. Do not audit attempts to receive UDP traffic on the streaming port. Domain to not audit. Send and receive UDP traffic on the streaming port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the streaming port. Domain to not audit. Bind TCP sockets to the streaming port. Domain allowed access. Bind UDP sockets to the streaming port. Domain allowed access. Make a TCP connection to the streaming port. Domain allowed access. Send streaming_client packets. Domain allowed access. Do not audit attempts to send streaming_client packets. Domain to not audit. Receive streaming_client packets. Domain allowed access. Do not audit attempts to receive streaming_client packets. Domain allowed access. Send and receive streaming_client packets. Domain allowed access. Do not audit attempts to send and receive streaming_client packets. Domain to not audit. Relabel packets to streaming_client the packet type. Domain allowed access. Send streaming_server packets. Domain allowed access. Do not audit attempts to send streaming_server packets. Domain to not audit. Receive streaming_server packets. Domain allowed access. Do not audit attempts to receive streaming_server packets. Domain allowed access. Send and receive streaming_server packets. Domain allowed access. Do not audit attempts to send and receive streaming_server packets. Domain to not audit. Relabel packets to streaming_server the packet type. Domain allowed access. Send and receive TCP traffic on the svn port. Domain allowed access. Send UDP traffic on the svn port. Domain allowed access. Do not audit attempts to send UDP traffic on the svn port. Domain to not audit. Receive UDP traffic on the svn port. Domain allowed access. Do not audit attempts to receive UDP traffic on the svn port. Domain to not audit. Send and receive UDP traffic on the svn port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the svn port. Domain to not audit. Bind TCP sockets to the svn port. Domain allowed access. Bind UDP sockets to the svn port. Domain allowed access. Make a TCP connection to the svn port. Domain allowed access. Send svn_client packets. Domain allowed access. Do not audit attempts to send svn_client packets. Domain to not audit. Receive svn_client packets. Domain allowed access. Do not audit attempts to receive svn_client packets. Domain allowed access. Send and receive svn_client packets. Domain allowed access. Do not audit attempts to send and receive svn_client packets. Domain to not audit. Relabel packets to svn_client the packet type. Domain allowed access. Send svn_server packets. Domain allowed access. Do not audit attempts to send svn_server packets. Domain to not audit. Receive svn_server packets. Domain allowed access. Do not audit attempts to receive svn_server packets. Domain allowed access. Send and receive svn_server packets. Domain allowed access. Do not audit attempts to send and receive svn_server packets. Domain to not audit. Relabel packets to svn_server the packet type. Domain allowed access. Send and receive TCP traffic on the swat port. Domain allowed access. Send UDP traffic on the swat port. Domain allowed access. Do not audit attempts to send UDP traffic on the swat port. Domain to not audit. Receive UDP traffic on the swat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the swat port. Domain to not audit. Send and receive UDP traffic on the swat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the swat port. Domain to not audit. Bind TCP sockets to the swat port. Domain allowed access. Bind UDP sockets to the swat port. Domain allowed access. Make a TCP connection to the swat port. Domain allowed access. Send swat_client packets. Domain allowed access. Do not audit attempts to send swat_client packets. Domain to not audit. Receive swat_client packets. Domain allowed access. Do not audit attempts to receive swat_client packets. Domain allowed access. Send and receive swat_client packets. Domain allowed access. Do not audit attempts to send and receive swat_client packets. Domain to not audit. Relabel packets to swat_client the packet type. Domain allowed access. Send swat_server packets. Domain allowed access. Do not audit attempts to send swat_server packets. Domain to not audit. Receive swat_server packets. Domain allowed access. Do not audit attempts to receive swat_server packets. Domain allowed access. Send and receive swat_server packets. Domain allowed access. Do not audit attempts to send and receive swat_server packets. Domain to not audit. Relabel packets to swat_server the packet type. Domain allowed access. Send and receive TCP traffic on the sype port. Domain allowed access. Send UDP traffic on the sype port. Domain allowed access. Do not audit attempts to send UDP traffic on the sype port. Domain to not audit. Receive UDP traffic on the sype port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sype port. Domain to not audit. Send and receive UDP traffic on the sype port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sype port. Domain to not audit. Bind TCP sockets to the sype port. Domain allowed access. Bind UDP sockets to the sype port. Domain allowed access. Make a TCP connection to the sype port. Domain allowed access. Send sype_client packets. Domain allowed access. Do not audit attempts to send sype_client packets. Domain to not audit. Receive sype_client packets. Domain allowed access. Do not audit attempts to receive sype_client packets. Domain allowed access. Send and receive sype_client packets. Domain allowed access. Do not audit attempts to send and receive sype_client packets. Domain to not audit. Relabel packets to sype_client the packet type. Domain allowed access. Send sype_server packets. Domain allowed access. Do not audit attempts to send sype_server packets. Domain to not audit. Receive sype_server packets. Domain allowed access. Do not audit attempts to receive sype_server packets. Domain allowed access. Send and receive sype_server packets. Domain allowed access. Do not audit attempts to send and receive sype_server packets. Domain to not audit. Relabel packets to sype_server the packet type. Domain allowed access. Send and receive TCP traffic on the syslogd port. Domain allowed access. Send UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to send UDP traffic on the syslogd port. Domain to not audit. Receive UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the syslogd port. Domain to not audit. Send and receive UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the syslogd port. Domain to not audit. Bind TCP sockets to the syslogd port. Domain allowed access. Bind UDP sockets to the syslogd port. Domain allowed access. Make a TCP connection to the syslogd port. Domain allowed access. Send syslogd_client packets. Domain allowed access. Do not audit attempts to send syslogd_client packets. Domain to not audit. Receive syslogd_client packets. Domain allowed access. Do not audit attempts to receive syslogd_client packets. Domain allowed access. Send and receive syslogd_client packets. Domain allowed access. Do not audit attempts to send and receive syslogd_client packets. Domain to not audit. Relabel packets to syslogd_client the packet type. Domain allowed access. Send syslogd_server packets. Domain allowed access. Do not audit attempts to send syslogd_server packets. Domain to not audit. Receive syslogd_server packets. Domain allowed access. Do not audit attempts to receive syslogd_server packets. Domain allowed access. Send and receive syslogd_server packets. Domain allowed access. Do not audit attempts to send and receive syslogd_server packets. Domain to not audit. Relabel packets to syslogd_server the packet type. Domain allowed access. Send and receive TCP traffic on the telnetd port. Domain allowed access. Send UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to send UDP traffic on the telnetd port. Domain to not audit. Receive UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the telnetd port. Domain to not audit. Send and receive UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the telnetd port. Domain to not audit. Bind TCP sockets to the telnetd port. Domain allowed access. Bind UDP sockets to the telnetd port. Domain allowed access. Make a TCP connection to the telnetd port. Domain allowed access. Send telnetd_client packets. Domain allowed access. Do not audit attempts to send telnetd_client packets. Domain to not audit. Receive telnetd_client packets. Domain allowed access. Do not audit attempts to receive telnetd_client packets. Domain allowed access. Send and receive telnetd_client packets. Domain allowed access. Do not audit attempts to send and receive telnetd_client packets. Domain to not audit. Relabel packets to telnetd_client the packet type. Domain allowed access. Send telnetd_server packets. Domain allowed access. Do not audit attempts to send telnetd_server packets. Domain to not audit. Receive telnetd_server packets. Domain allowed access. Do not audit attempts to receive telnetd_server packets. Domain allowed access. Send and receive telnetd_server packets. Domain allowed access. Do not audit attempts to send and receive telnetd_server packets. Domain to not audit. Relabel packets to telnetd_server the packet type. Domain allowed access. Send and receive TCP traffic on the tftp port. Domain allowed access. Send UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to send UDP traffic on the tftp port. Domain to not audit. Receive UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tftp port. Domain to not audit. Send and receive UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tftp port. Domain to not audit. Bind TCP sockets to the tftp port. Domain allowed access. Bind UDP sockets to the tftp port. Domain allowed access. Make a TCP connection to the tftp port. Domain allowed access. Send tftp_client packets. Domain allowed access. Do not audit attempts to send tftp_client packets. Domain to not audit. Receive tftp_client packets. Domain allowed access. Do not audit attempts to receive tftp_client packets. Domain allowed access. Send and receive tftp_client packets. Domain allowed access. Do not audit attempts to send and receive tftp_client packets. Domain to not audit. Relabel packets to tftp_client the packet type. Domain allowed access. Send tftp_server packets. Domain allowed access. Do not audit attempts to send tftp_server packets. Domain to not audit. Receive tftp_server packets. Domain allowed access. Do not audit attempts to receive tftp_server packets. Domain allowed access. Send and receive tftp_server packets. Domain allowed access. Do not audit attempts to send and receive tftp_server packets. Domain to not audit. Relabel packets to tftp_server the packet type. Domain allowed access. Send and receive TCP traffic on the tor port. Domain allowed access. Send UDP traffic on the tor port. Domain allowed access. Do not audit attempts to send UDP traffic on the tor port. Domain to not audit. Receive UDP traffic on the tor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tor port. Domain to not audit. Send and receive UDP traffic on the tor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tor port. Domain to not audit. Bind TCP sockets to the tor port. Domain allowed access. Bind UDP sockets to the tor port. Domain allowed access. Make a TCP connection to the tor port. Domain allowed access. Send tor_client packets. Domain allowed access. Do not audit attempts to send tor_client packets. Domain to not audit. Receive tor_client packets. Domain allowed access. Do not audit attempts to receive tor_client packets. Domain allowed access. Send and receive tor_client packets. Domain allowed access. Do not audit attempts to send and receive tor_client packets. Domain to not audit. Relabel packets to tor_client the packet type. Domain allowed access. Send tor_server packets. Domain allowed access. Do not audit attempts to send tor_server packets. Domain to not audit. Receive tor_server packets. Domain allowed access. Do not audit attempts to receive tor_server packets. Domain allowed access. Send and receive tor_server packets. Domain allowed access. Do not audit attempts to send and receive tor_server packets. Domain to not audit. Relabel packets to tor_server the packet type. Domain allowed access. Send and receive TCP traffic on the tor_socks port. Domain allowed access. Send UDP traffic on the tor_socks port. Domain allowed access. Do not audit attempts to send UDP traffic on the tor_socks port. Domain to not audit. Receive UDP traffic on the tor_socks port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tor_socks port. Domain to not audit. Send and receive UDP traffic on the tor_socks port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tor_socks port. Domain to not audit. Bind TCP sockets to the tor_socks port. Domain allowed access. Bind UDP sockets to the tor_socks port. Domain allowed access. Make a TCP connection to the tor_socks port. Domain allowed access. Send tor_socks_client packets. Domain allowed access. Do not audit attempts to send tor_socks_client packets. Domain to not audit. Receive tor_socks_client packets. Domain allowed access. Do not audit attempts to receive tor_socks_client packets. Domain allowed access. Send and receive tor_socks_client packets. Domain allowed access. Do not audit attempts to send and receive tor_socks_client packets. Domain to not audit. Relabel packets to tor_socks_client the packet type. Domain allowed access. Send tor_socks_server packets. Domain allowed access. Do not audit attempts to send tor_socks_server packets. Domain to not audit. Receive tor_socks_server packets. Domain allowed access. Do not audit attempts to receive tor_socks_server packets. Domain allowed access. Send and receive tor_socks_server packets. Domain allowed access. Do not audit attempts to send and receive tor_socks_server packets. Domain to not audit. Relabel packets to tor_socks_server the packet type. Domain allowed access. Send and receive TCP traffic on the traceroute port. Domain allowed access. Send UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to send UDP traffic on the traceroute port. Domain to not audit. Receive UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to receive UDP traffic on the traceroute port. Domain to not audit. Send and receive UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the traceroute port. Domain to not audit. Bind TCP sockets to the traceroute port. Domain allowed access. Bind UDP sockets to the traceroute port. Domain allowed access. Make a TCP connection to the traceroute port. Domain allowed access. Send traceroute_client packets. Domain allowed access. Do not audit attempts to send traceroute_client packets. Domain to not audit. Receive traceroute_client packets. Domain allowed access. Do not audit attempts to receive traceroute_client packets. Domain allowed access. Send and receive traceroute_client packets. Domain allowed access. Do not audit attempts to send and receive traceroute_client packets. Domain to not audit. Relabel packets to traceroute_client the packet type. Domain allowed access. Send traceroute_server packets. Domain allowed access. Do not audit attempts to send traceroute_server packets. Domain to not audit. Receive traceroute_server packets. Domain allowed access. Do not audit attempts to receive traceroute_server packets. Domain allowed access. Send and receive traceroute_server packets. Domain allowed access. Do not audit attempts to send and receive traceroute_server packets. Domain to not audit. Relabel packets to traceroute_server the packet type. Domain allowed access. Send and receive TCP traffic on the transproxy port. Domain allowed access. Send UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to send UDP traffic on the transproxy port. Domain to not audit. Receive UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to receive UDP traffic on the transproxy port. Domain to not audit. Send and receive UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the transproxy port. Domain to not audit. Bind TCP sockets to the transproxy port. Domain allowed access. Bind UDP sockets to the transproxy port. Domain allowed access. Make a TCP connection to the transproxy port. Domain allowed access. Send transproxy_client packets. Domain allowed access. Do not audit attempts to send transproxy_client packets. Domain to not audit. Receive transproxy_client packets. Domain allowed access. Do not audit attempts to receive transproxy_client packets. Domain allowed access. Send and receive transproxy_client packets. Domain allowed access. Do not audit attempts to send and receive transproxy_client packets. Domain to not audit. Relabel packets to transproxy_client the packet type. Domain allowed access. Send transproxy_server packets. Domain allowed access. Do not audit attempts to send transproxy_server packets. Domain to not audit. Receive transproxy_server packets. Domain allowed access. Do not audit attempts to receive transproxy_server packets. Domain allowed access. Send and receive transproxy_server packets. Domain allowed access. Do not audit attempts to send and receive transproxy_server packets. Domain to not audit. Relabel packets to transproxy_server the packet type. Domain allowed access. Send and receive TCP traffic on the ups port. Domain allowed access. Send UDP traffic on the ups port. Domain allowed access. Do not audit attempts to send UDP traffic on the ups port. Domain to not audit. Receive UDP traffic on the ups port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ups port. Domain to not audit. Send and receive UDP traffic on the ups port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ups port. Domain to not audit. Bind TCP sockets to the ups port. Domain allowed access. Bind UDP sockets to the ups port. Domain allowed access. Make a TCP connection to the ups port. Domain allowed access. Send ups_client packets. Domain allowed access. Do not audit attempts to send ups_client packets. Domain to not audit. Receive ups_client packets. Domain allowed access. Do not audit attempts to receive ups_client packets. Domain allowed access. Send and receive ups_client packets. Domain allowed access. Do not audit attempts to send and receive ups_client packets. Domain to not audit. Relabel packets to ups_client the packet type. Domain allowed access. Send ups_server packets. Domain allowed access. Do not audit attempts to send ups_server packets. Domain to not audit. Receive ups_server packets. Domain allowed access. Do not audit attempts to receive ups_server packets. Domain allowed access. Send and receive ups_server packets. Domain allowed access. Do not audit attempts to send and receive ups_server packets. Domain to not audit. Relabel packets to ups_server the packet type. Domain allowed access. Send and receive TCP traffic on the uucpd port. Domain allowed access. Send UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the uucpd port. Domain to not audit. Receive UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the uucpd port. Domain to not audit. Send and receive UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the uucpd port. Domain to not audit. Bind TCP sockets to the uucpd port. Domain allowed access. Bind UDP sockets to the uucpd port. Domain allowed access. Make a TCP connection to the uucpd port. Domain allowed access. Send uucpd_client packets. Domain allowed access. Do not audit attempts to send uucpd_client packets. Domain to not audit. Receive uucpd_client packets. Domain allowed access. Do not audit attempts to receive uucpd_client packets. Domain allowed access. Send and receive uucpd_client packets. Domain allowed access. Do not audit attempts to send and receive uucpd_client packets. Domain to not audit. Relabel packets to uucpd_client the packet type. Domain allowed access. Send uucpd_server packets. Domain allowed access. Do not audit attempts to send uucpd_server packets. Domain to not audit. Receive uucpd_server packets. Domain allowed access. Do not audit attempts to receive uucpd_server packets. Domain allowed access. Send and receive uucpd_server packets. Domain allowed access. Do not audit attempts to send and receive uucpd_server packets. Domain to not audit. Relabel packets to uucpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the varnishd port. Domain allowed access. Send UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to send UDP traffic on the varnishd port. Domain to not audit. Receive UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the varnishd port. Domain to not audit. Send and receive UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the varnishd port. Domain to not audit. Bind TCP sockets to the varnishd port. Domain allowed access. Bind UDP sockets to the varnishd port. Domain allowed access. Make a TCP connection to the varnishd port. Domain allowed access. Send varnishd_client packets. Domain allowed access. Do not audit attempts to send varnishd_client packets. Domain to not audit. Receive varnishd_client packets. Domain allowed access. Do not audit attempts to receive varnishd_client packets. Domain allowed access. Send and receive varnishd_client packets. Domain allowed access. Do not audit attempts to send and receive varnishd_client packets. Domain to not audit. Relabel packets to varnishd_client the packet type. Domain allowed access. Send varnishd_server packets. Domain allowed access. Do not audit attempts to send varnishd_server packets. Domain to not audit. Receive varnishd_server packets. Domain allowed access. Do not audit attempts to receive varnishd_server packets. Domain allowed access. Send and receive varnishd_server packets. Domain allowed access. Do not audit attempts to send and receive varnishd_server packets. Domain to not audit. Relabel packets to varnishd_server the packet type. Domain allowed access. Send and receive TCP traffic on the virt port. Domain allowed access. Send UDP traffic on the virt port. Domain allowed access. Do not audit attempts to send UDP traffic on the virt port. Domain to not audit. Receive UDP traffic on the virt port. Domain allowed access. Do not audit attempts to receive UDP traffic on the virt port. Domain to not audit. Send and receive UDP traffic on the virt port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the virt port. Domain to not audit. Bind TCP sockets to the virt port. Domain allowed access. Bind UDP sockets to the virt port. Domain allowed access. Make a TCP connection to the virt port. Domain allowed access. Send virt_client packets. Domain allowed access. Do not audit attempts to send virt_client packets. Domain to not audit. Receive virt_client packets. Domain allowed access. Do not audit attempts to receive virt_client packets. Domain allowed access. Send and receive virt_client packets. Domain allowed access. Do not audit attempts to send and receive virt_client packets. Domain to not audit. Relabel packets to virt_client the packet type. Domain allowed access. Send virt_server packets. Domain allowed access. Do not audit attempts to send virt_server packets. Domain to not audit. Receive virt_server packets. Domain allowed access. Do not audit attempts to receive virt_server packets. Domain allowed access. Send and receive virt_server packets. Domain allowed access. Do not audit attempts to send and receive virt_server packets. Domain to not audit. Relabel packets to virt_server the packet type. Domain allowed access. Send and receive TCP traffic on the virt_migration port. Domain allowed access. Send UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to send UDP traffic on the virt_migration port. Domain to not audit. Receive UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to receive UDP traffic on the virt_migration port. Domain to not audit. Send and receive UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the virt_migration port. Domain to not audit. Bind TCP sockets to the virt_migration port. Domain allowed access. Bind UDP sockets to the virt_migration port. Domain allowed access. Make a TCP connection to the virt_migration port. Domain allowed access. Send virt_migration_client packets. Domain allowed access. Do not audit attempts to send virt_migration_client packets. Domain to not audit. Receive virt_migration_client packets. Domain allowed access. Do not audit attempts to receive virt_migration_client packets. Domain allowed access. Send and receive virt_migration_client packets. Domain allowed access. Do not audit attempts to send and receive virt_migration_client packets. Domain to not audit. Relabel packets to virt_migration_client the packet type. Domain allowed access. Send virt_migration_server packets. Domain allowed access. Do not audit attempts to send virt_migration_server packets. Domain to not audit. Receive virt_migration_server packets. Domain allowed access. Do not audit attempts to receive virt_migration_server packets. Domain allowed access. Send and receive virt_migration_server packets. Domain allowed access. Do not audit attempts to send and receive virt_migration_server packets. Domain to not audit. Relabel packets to virt_migration_server the packet type. Domain allowed access. Send and receive TCP traffic on the vnc port. Domain allowed access. Send UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to send UDP traffic on the vnc port. Domain to not audit. Receive UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the vnc port. Domain to not audit. Send and receive UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the vnc port. Domain to not audit. Bind TCP sockets to the vnc port. Domain allowed access. Bind UDP sockets to the vnc port. Domain allowed access. Make a TCP connection to the vnc port. Domain allowed access. Send vnc_client packets. Domain allowed access. Do not audit attempts to send vnc_client packets. Domain to not audit. Receive vnc_client packets. Domain allowed access. Do not audit attempts to receive vnc_client packets. Domain allowed access. Send and receive vnc_client packets. Domain allowed access. Do not audit attempts to send and receive vnc_client packets. Domain to not audit. Relabel packets to vnc_client the packet type. Domain allowed access. Send vnc_server packets. Domain allowed access. Do not audit attempts to send vnc_server packets. Domain to not audit. Receive vnc_server packets. Domain allowed access. Do not audit attempts to receive vnc_server packets. Domain allowed access. Send and receive vnc_server packets. Domain allowed access. Do not audit attempts to send and receive vnc_server packets. Domain to not audit. Relabel packets to vnc_server the packet type. Domain allowed access. Send and receive TCP traffic on the wccp port. Domain allowed access. Send UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to send UDP traffic on the wccp port. Domain to not audit. Receive UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the wccp port. Domain to not audit. Send and receive UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the wccp port. Domain to not audit. Bind TCP sockets to the wccp port. Domain allowed access. Bind UDP sockets to the wccp port. Domain allowed access. Make a TCP connection to the wccp port. Domain allowed access. Send wccp_client packets. Domain allowed access. Do not audit attempts to send wccp_client packets. Domain to not audit. Receive wccp_client packets. Domain allowed access. Do not audit attempts to receive wccp_client packets. Domain allowed access. Send and receive wccp_client packets. Domain allowed access. Do not audit attempts to send and receive wccp_client packets. Domain to not audit. Relabel packets to wccp_client the packet type. Domain allowed access. Send wccp_server packets. Domain allowed access. Do not audit attempts to send wccp_server packets. Domain to not audit. Receive wccp_server packets. Domain allowed access. Do not audit attempts to receive wccp_server packets. Domain allowed access. Send and receive wccp_server packets. Domain allowed access. Do not audit attempts to send and receive wccp_server packets. Domain to not audit. Relabel packets to wccp_server the packet type. Domain allowed access. Send and receive TCP traffic on the websm port. Domain allowed access. Send UDP traffic on the websm port. Domain allowed access. Do not audit attempts to send UDP traffic on the websm port. Domain to not audit. Receive UDP traffic on the websm port. Domain allowed access. Do not audit attempts to receive UDP traffic on the websm port. Domain to not audit. Send and receive UDP traffic on the websm port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the websm port. Domain to not audit. Bind TCP sockets to the websm port. Domain allowed access. Bind UDP sockets to the websm port. Domain allowed access. Make a TCP connection to the websm port. Domain allowed access. Send websm_client packets. Domain allowed access. Do not audit attempts to send websm_client packets. Domain to not audit. Receive websm_client packets. Domain allowed access. Do not audit attempts to receive websm_client packets. Domain allowed access. Send and receive websm_client packets. Domain allowed access. Do not audit attempts to send and receive websm_client packets. Domain to not audit. Relabel packets to websm_client the packet type. Domain allowed access. Send websm_server packets. Domain allowed access. Do not audit attempts to send websm_server packets. Domain to not audit. Receive websm_server packets. Domain allowed access. Do not audit attempts to receive websm_server packets. Domain allowed access. Send and receive websm_server packets. Domain allowed access. Do not audit attempts to send and receive websm_server packets. Domain to not audit. Relabel packets to websm_server the packet type. Domain allowed access. Send and receive TCP traffic on the whois port. Domain allowed access. Send UDP traffic on the whois port. Domain allowed access. Do not audit attempts to send UDP traffic on the whois port. Domain to not audit. Receive UDP traffic on the whois port. Domain allowed access. Do not audit attempts to receive UDP traffic on the whois port. Domain to not audit. Send and receive UDP traffic on the whois port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the whois port. Domain to not audit. Bind TCP sockets to the whois port. Domain allowed access. Bind UDP sockets to the whois port. Domain allowed access. Make a TCP connection to the whois port. Domain allowed access. Send whois_client packets. Domain allowed access. Do not audit attempts to send whois_client packets. Domain to not audit. Receive whois_client packets. Domain allowed access. Do not audit attempts to receive whois_client packets. Domain allowed access. Send and receive whois_client packets. Domain allowed access. Do not audit attempts to send and receive whois_client packets. Domain to not audit. Relabel packets to whois_client the packet type. Domain allowed access. Send whois_server packets. Domain allowed access. Do not audit attempts to send whois_server packets. Domain to not audit. Receive whois_server packets. Domain allowed access. Do not audit attempts to receive whois_server packets. Domain allowed access. Send and receive whois_server packets. Domain allowed access. Do not audit attempts to send and receive whois_server packets. Domain to not audit. Relabel packets to whois_server the packet type. Domain allowed access. Send and receive TCP traffic on the winshadow port. Domain allowed access. Send UDP traffic on the winshadow port. Domain allowed access. Do not audit attempts to send UDP traffic on the winshadow port. Domain to not audit. Receive UDP traffic on the winshadow port. Domain allowed access. Do not audit attempts to receive UDP traffic on the winshadow port. Domain to not audit. Send and receive UDP traffic on the winshadow port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the winshadow port. Domain to not audit. Bind TCP sockets to the winshadow port. Domain allowed access. Bind UDP sockets to the winshadow port. Domain allowed access. Make a TCP connection to the winshadow port. Domain allowed access. Send winshadow_client packets. Domain allowed access. Do not audit attempts to send winshadow_client packets. Domain to not audit. Receive winshadow_client packets. Domain allowed access. Do not audit attempts to receive winshadow_client packets. Domain allowed access. Send and receive winshadow_client packets. Domain allowed access. Do not audit attempts to send and receive winshadow_client packets. Domain to not audit. Relabel packets to winshadow_client the packet type. Domain allowed access. Send winshadow_server packets. Domain allowed access. Do not audit attempts to send winshadow_server packets. Domain to not audit. Receive winshadow_server packets. Domain allowed access. Do not audit attempts to receive winshadow_server packets. Domain allowed access. Send and receive winshadow_server packets. Domain allowed access. Do not audit attempts to send and receive winshadow_server packets. Domain to not audit. Relabel packets to winshadow_server the packet type. Domain allowed access. Send and receive TCP traffic on the xdmcp port. Domain allowed access. Send UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to send UDP traffic on the xdmcp port. Domain to not audit. Receive UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xdmcp port. Domain to not audit. Send and receive UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xdmcp port. Domain to not audit. Bind TCP sockets to the xdmcp port. Domain allowed access. Bind UDP sockets to the xdmcp port. Domain allowed access. Make a TCP connection to the xdmcp port. Domain allowed access. Send xdmcp_client packets. Domain allowed access. Do not audit attempts to send xdmcp_client packets. Domain to not audit. Receive xdmcp_client packets. Domain allowed access. Do not audit attempts to receive xdmcp_client packets. Domain allowed access. Send and receive xdmcp_client packets. Domain allowed access. Do not audit attempts to send and receive xdmcp_client packets. Domain to not audit. Relabel packets to xdmcp_client the packet type. Domain allowed access. Send xdmcp_server packets. Domain allowed access. Do not audit attempts to send xdmcp_server packets. Domain to not audit. Receive xdmcp_server packets. Domain allowed access. Do not audit attempts to receive xdmcp_server packets. Domain allowed access. Send and receive xdmcp_server packets. Domain allowed access. Do not audit attempts to send and receive xdmcp_server packets. Domain to not audit. Relabel packets to xdmcp_server the packet type. Domain allowed access. Send and receive TCP traffic on the xen port. Domain allowed access. Send UDP traffic on the xen port. Domain allowed access. Do not audit attempts to send UDP traffic on the xen port. Domain to not audit. Receive UDP traffic on the xen port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xen port. Domain to not audit. Send and receive UDP traffic on the xen port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xen port. Domain to not audit. Bind TCP sockets to the xen port. Domain allowed access. Bind UDP sockets to the xen port. Domain allowed access. Make a TCP connection to the xen port. Domain allowed access. Send xen_client packets. Domain allowed access. Do not audit attempts to send xen_client packets. Domain to not audit. Receive xen_client packets. Domain allowed access. Do not audit attempts to receive xen_client packets. Domain allowed access. Send and receive xen_client packets. Domain allowed access. Do not audit attempts to send and receive xen_client packets. Domain to not audit. Relabel packets to xen_client the packet type. Domain allowed access. Send xen_server packets. Domain allowed access. Do not audit attempts to send xen_server packets. Domain to not audit. Receive xen_server packets. Domain allowed access. Do not audit attempts to receive xen_server packets. Domain allowed access. Send and receive xen_server packets. Domain allowed access. Do not audit attempts to send and receive xen_server packets. Domain to not audit. Relabel packets to xen_server the packet type. Domain allowed access. Send and receive TCP traffic on the xfs port. Domain allowed access. Send UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to send UDP traffic on the xfs port. Domain to not audit. Receive UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xfs port. Domain to not audit. Send and receive UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xfs port. Domain to not audit. Bind TCP sockets to the xfs port. Domain allowed access. Bind UDP sockets to the xfs port. Domain allowed access. Make a TCP connection to the xfs port. Domain allowed access. Send xfs_client packets. Domain allowed access. Do not audit attempts to send xfs_client packets. Domain to not audit. Receive xfs_client packets. Domain allowed access. Do not audit attempts to receive xfs_client packets. Domain allowed access. Send and receive xfs_client packets. Domain allowed access. Do not audit attempts to send and receive xfs_client packets. Domain to not audit. Relabel packets to xfs_client the packet type. Domain allowed access. Send xfs_server packets. Domain allowed access. Do not audit attempts to send xfs_server packets. Domain to not audit. Receive xfs_server packets. Domain allowed access. Do not audit attempts to receive xfs_server packets. Domain allowed access. Send and receive xfs_server packets. Domain allowed access. Do not audit attempts to send and receive xfs_server packets. Domain to not audit. Relabel packets to xfs_server the packet type. Domain allowed access. Send and receive TCP traffic on the xserver port. Domain allowed access. Send UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the xserver port. Domain to not audit. Receive UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xserver port. Domain to not audit. Send and receive UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xserver port. Domain to not audit. Bind TCP sockets to the xserver port. Domain allowed access. Bind UDP sockets to the xserver port. Domain allowed access. Make a TCP connection to the xserver port. Domain allowed access. Send xserver_client packets. Domain allowed access. Do not audit attempts to send xserver_client packets. Domain to not audit. Receive xserver_client packets. Domain allowed access. Do not audit attempts to receive xserver_client packets. Domain allowed access. Send and receive xserver_client packets. Domain allowed access. Do not audit attempts to send and receive xserver_client packets. Domain to not audit. Relabel packets to xserver_client the packet type. Domain allowed access. Send xserver_server packets. Domain allowed access. Do not audit attempts to send xserver_server packets. Domain to not audit. Receive xserver_server packets. Domain allowed access. Do not audit attempts to receive xserver_server packets. Domain allowed access. Send and receive xserver_server packets. Domain allowed access. Do not audit attempts to send and receive xserver_server packets. Domain to not audit. Relabel packets to xserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the zarafa port. Domain allowed access. Send UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to send UDP traffic on the zarafa port. Domain to not audit. Receive UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zarafa port. Domain to not audit. Send and receive UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zarafa port. Domain to not audit. Bind TCP sockets to the zarafa port. Domain allowed access. Bind UDP sockets to the zarafa port. Domain allowed access. Make a TCP connection to the zarafa port. Domain allowed access. Send zarafa_client packets. Domain allowed access. Do not audit attempts to send zarafa_client packets. Domain to not audit. Receive zarafa_client packets. Domain allowed access. Do not audit attempts to receive zarafa_client packets. Domain allowed access. Send and receive zarafa_client packets. Domain allowed access. Do not audit attempts to send and receive zarafa_client packets. Domain to not audit. Relabel packets to zarafa_client the packet type. Domain allowed access. Send zarafa_server packets. Domain allowed access. Do not audit attempts to send zarafa_server packets. Domain to not audit. Receive zarafa_server packets. Domain allowed access. Do not audit attempts to receive zarafa_server packets. Domain allowed access. Send and receive zarafa_server packets. Domain allowed access. Do not audit attempts to send and receive zarafa_server packets. Domain to not audit. Relabel packets to zarafa_server the packet type. Domain allowed access. Send and receive TCP traffic on the zabbix port. Domain allowed access. Send UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to send UDP traffic on the zabbix port. Domain to not audit. Receive UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zabbix port. Domain to not audit. Send and receive UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zabbix port. Domain to not audit. Bind TCP sockets to the zabbix port. Domain allowed access. Bind UDP sockets to the zabbix port. Domain allowed access. Make a TCP connection to the zabbix port. Domain allowed access. Send zabbix_client packets. Domain allowed access. Do not audit attempts to send zabbix_client packets. Domain to not audit. Receive zabbix_client packets. Domain allowed access. Do not audit attempts to receive zabbix_client packets. Domain allowed access. Send and receive zabbix_client packets. Domain allowed access. Do not audit attempts to send and receive zabbix_client packets. Domain to not audit. Relabel packets to zabbix_client the packet type. Domain allowed access. Send zabbix_server packets. Domain allowed access. Do not audit attempts to send zabbix_server packets. Domain to not audit. Receive zabbix_server packets. Domain allowed access. Do not audit attempts to receive zabbix_server packets. Domain allowed access. Send and receive zabbix_server packets. Domain allowed access. Do not audit attempts to send and receive zabbix_server packets. Domain to not audit. Relabel packets to zabbix_server the packet type. Domain allowed access. Send and receive TCP traffic on the zabbix_agent port. Domain allowed access. Send UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to send UDP traffic on the zabbix_agent port. Domain to not audit. Receive UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zabbix_agent port. Domain to not audit. Send and receive UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zabbix_agent port. Domain to not audit. Bind TCP sockets to the zabbix_agent port. Domain allowed access. Bind UDP sockets to the zabbix_agent port. Domain allowed access. Make a TCP connection to the zabbix_agent port. Domain allowed access. Send zabbix_agent_client packets. Domain allowed access. Do not audit attempts to send zabbix_agent_client packets. Domain to not audit. Receive zabbix_agent_client packets. Domain allowed access. Do not audit attempts to receive zabbix_agent_client packets. Domain allowed access. Send and receive zabbix_agent_client packets. Domain allowed access. Do not audit attempts to send and receive zabbix_agent_client packets. Domain to not audit. Relabel packets to zabbix_agent_client the packet type. Domain allowed access. Send zabbix_agent_server packets. Domain allowed access. Do not audit attempts to send zabbix_agent_server packets. Domain to not audit. Receive zabbix_agent_server packets. Domain allowed access. Do not audit attempts to receive zabbix_agent_server packets. Domain allowed access. Send and receive zabbix_agent_server packets. Domain allowed access. Do not audit attempts to send and receive zabbix_agent_server packets. Domain to not audit. Relabel packets to zabbix_agent_server the packet type. Domain allowed access. Send and receive TCP traffic on the zebra port. Domain allowed access. Send UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to send UDP traffic on the zebra port. Domain to not audit. Receive UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zebra port. Domain to not audit. Send and receive UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zebra port. Domain to not audit. Bind TCP sockets to the zebra port. Domain allowed access. Bind UDP sockets to the zebra port. Domain allowed access. Make a TCP connection to the zebra port. Domain allowed access. Send zebra_client packets. Domain allowed access. Do not audit attempts to send zebra_client packets. Domain to not audit. Receive zebra_client packets. Domain allowed access. Do not audit attempts to receive zebra_client packets. Domain allowed access. Send and receive zebra_client packets. Domain allowed access. Do not audit attempts to send and receive zebra_client packets. Domain to not audit. Relabel packets to zebra_client the packet type. Domain allowed access. Send zebra_server packets. Domain allowed access. Do not audit attempts to send zebra_server packets. Domain to not audit. Receive zebra_server packets. Domain allowed access. Do not audit attempts to receive zebra_server packets. Domain allowed access. Send and receive zebra_server packets. Domain allowed access. Do not audit attempts to send and receive zebra_server packets. Domain to not audit. Relabel packets to zebra_server the packet type. Domain allowed access. Send and receive TCP traffic on the zented port. Domain allowed access. Send UDP traffic on the zented port. Domain allowed access. Do not audit attempts to send UDP traffic on the zented port. Domain to not audit. Receive UDP traffic on the zented port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zented port. Domain to not audit. Send and receive UDP traffic on the zented port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zented port. Domain to not audit. Bind TCP sockets to the zented port. Domain allowed access. Bind UDP sockets to the zented port. Domain allowed access. Make a TCP connection to the zented port. Domain allowed access. Send zented_client packets. Domain allowed access. Do not audit attempts to send zented_client packets. Domain to not audit. Receive zented_client packets. Domain allowed access. Do not audit attempts to receive zented_client packets. Domain allowed access. Send and receive zented_client packets. Domain allowed access. Do not audit attempts to send and receive zented_client packets. Domain to not audit. Relabel packets to zented_client the packet type. Domain allowed access. Send zented_server packets. Domain allowed access. Do not audit attempts to send zented_server packets. Domain to not audit. Receive zented_server packets. Domain allowed access. Do not audit attempts to receive zented_server packets. Domain allowed access. Send and receive zented_server packets. Domain allowed access. Do not audit attempts to send and receive zented_server packets. Domain to not audit. Relabel packets to zented_server the packet type. Domain allowed access. Send and receive TCP traffic on the zope port. Domain allowed access. Send UDP traffic on the zope port. Domain allowed access. Do not audit attempts to send UDP traffic on the zope port. Domain to not audit. Receive UDP traffic on the zope port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zope port. Domain to not audit. Send and receive UDP traffic on the zope port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zope port. Domain to not audit. Bind TCP sockets to the zope port. Domain allowed access. Bind UDP sockets to the zope port. Domain allowed access. Make a TCP connection to the zope port. Domain allowed access. Send zope_client packets. Domain allowed access. Do not audit attempts to send zope_client packets. Domain to not audit. Receive zope_client packets. Domain allowed access. Do not audit attempts to receive zope_client packets. Domain allowed access. Send and receive zope_client packets. Domain allowed access. Do not audit attempts to send and receive zope_client packets. Domain to not audit. Relabel packets to zope_client the packet type. Domain allowed access. Send zope_server packets. Domain allowed access. Do not audit attempts to send zope_server packets. Domain to not audit. Receive zope_server packets. Domain allowed access. Do not audit attempts to receive zope_server packets. Domain allowed access. Send and receive zope_server packets. Domain allowed access. Do not audit attempts to send and receive zope_server packets. Domain to not audit. Relabel packets to zope_server the packet type. Domain allowed access. Send and receive TCP network traffic on the lo interface. Domain allowed access. Send UDP network traffic on the lo interface. Domain allowed access. Receive UDP network traffic on the lo interface. Domain allowed access. Send and receive UDP network traffic on the lo interface. Domain allowed access. Send raw IP packets on the lo interface. Domain allowed access. Receive raw IP packets on the lo interface. Domain allowed access. Send and receive raw IP packets on the lo interface. Domain allowed access.
Device nodes and interfaces for many basic system devices.

This module creates the device node concept and provides the policy for many of the device files. Notable exceptions are the mass storage and terminal devices that are covered by other modules.

This module creates the concept of a device node. That is a char or block device file, usually in /dev. All types that are used to label device nodes should use the dev_node macro.

Additionally, this module controls access to three things:

  • the device directories containing device nodes
  • device nodes as a group
  • individual access to specific device nodes covered by this module.

Depended on by other required modules. Make the specified type usable for device nodes in a filesystem.

Make the specified type usable for device nodes in a filesystem. Types used for device nodes that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running.

Example:

type mydev_t; dev_node(mydev_t) allow mydomain_t mydev_t:chr_file read_chr_file_perms;

Related interfaces:

  • term_tty()
  • term_pty()
Type to be used for device nodes.
Get attributes of device filesystems. Domain allowed access. Mount a filesystem on /dev Domain allow access. Allow full relabeling (to and from) of all device nodes. Domain allowed to relabel. List all of the device nodes in a device directory. Domain allowed to list device nodes. Set the attributes of /dev directories. Domain allowed access. Dontaudit attempts to list all device nodes. Domain to dontaudit listing of device nodes. Add entries to directories in /dev. Domain allowed to add entries. Add entries to directories in /dev. Domain allowed to add entries. Create a directory in the device directory. Domain allowed to create the directory. Delete a directory in the device directory. Domain allowed to create the directory. Manage of directories in /dev. Domain allowed to relabel. Allow full relabeling (to and from) of directories in /dev. Domain allowed to relabel. dontaudit getattr generic files in /dev. Domain to not audit. Read and write generic files in /dev. Domain allowed access. Delete generic files in /dev. Domain allowed access. Create a file in the device directory. Domain allowed to create the files. Dontaudit getattr on generic pipes. Domain to dontaudit. Allow getattr on generic block devices. Domain allowed access. Dontaudit getattr on generic block devices. Domain to dontaudit access. Dontaudit setattr on generic block devices. Domain to dontaudit access. Create generic block device files. Domain allowed access. Delete generic block device files. Domain allowed access. Allow getattr for generic character device files. Domain allowed access. Dontaudit getattr for generic character device files. Domain to dontaudit access. Dontaudit read for generic character device files. Domain to dontaudit access. Dontaudit read for generic character device files. Domain to dontaudit access. Dontaudit setattr for generic character device files. Domain to dontaudit access. Read and write generic character device files. Domain allowed access. Create generic character device files. Domain allowed access. Delete generic character device files. Domain allowed access. Do not audit attempts to set the attributes of symbolic links in device directories (/dev). Domain to not audit. Read symbolic links in device directories. Domain allowed access. Create symbolic links in device directories. Domain allowed access. Delete symbolic links in device directories. Domain allowed access. Create, delete, read, and write symbolic links in device directories. Domain allowed access. Relabel symbolic links in device directories. Domain allowed access. Create, delete, read, and write device nodes in device directories. Domain allowed access. Dontaudit getattr for generic device files. Domain to dontaudit access. Dontaudit getattr for generic device files. Domain to dontaudit access. Create, delete, read, and write block device files. Domain allowed access. Create, delete, read, and write character device files. Domain allowed access. Create, read, and write device nodes. The node will be transitioned to the type provided. Domain allowed access. Type to which the created node will be transitioned. Object class(es) (single or set including {}) for which this the transition will occur. Create, read, and write device nodes. The node will be transitioned to the type provided. This is a temporary interface until devtmpfs functionality fixed. Domain allowed access. Object class(es) (single or set including {}) for which this the transition will occur. Getattr on all block file device nodes. Domain allowed access. Dontaudit getattr on all block file device nodes. Domain to dontaudit access. Getattr on all character file device nodes. Domain allowed access. Dontaudit getattr on all character file device nodes. Domain to dontaudit access. Dontaudit getattr on all device nodes. Domain to not audit. Setattr on all block file device nodes. Domain allowed access. Setattr on all character file device nodes. Domain allowed access. Dontaudit read on all block file device nodes. Domain to not audit. Dontaudit write on all block file device nodes. Domain to not audit. Dontaudit read on all character file device nodes. Domain to not audit. Dontaudit write on all character file device nodes. Domain to not audit. Create all block device files. Domain allowed access. Create all character device files. Domain allowed access. rw all inherited character device files. Domain allowed access. rw all inherited blk device files. Domain allowed access. Delete all block device files. Domain allowed access. Delete all character device files. Domain allowed access. Rename all block device files. Domain allowed access. Rename all character device files. Domain allowed access. Read, write, create, and delete all block device files. Domain allowed access. Read, write, create, and delete all character device files. Domain allowed access. Getattr the agp devices. Domain allowed access. Read and write the agp devices. Domain allowed access. Get the attributes of the apm bios device node. Domain allowed access. Do not audit attempts to get the attributes of the apm bios device node. Domain to not audit. Set the attributes of the apm bios device node. Domain allowed access. Do not audit attempts to set the attributes of the apm bios device node. Domain to not audit. Read and write the apm bios. Domain allowed access. Get the attributes of the autofs device node. Domain allowed access. Do not audit attempts to get the attributes of the autofs device node. Domain to not audit. Set the attributes of the autofs device node. Domain allowed access. Do not audit attempts to set the attributes of the autofs device node. Domain to not audit. Read and write the autofs device. Domain allowed access. Read and write the PCMCIA card manager device. Domain allowed access. Do not audit attempts to read and write the PCMCIA card manager device. Domain to not audit. Create, read, write, and delete the PCMCIA card manager device with the correct type. Domain allowed access. Create, read, write, and delete the PCMCIA card manager device. Domain allowed access. Automatic type transition to the type for PCMCIA card manager device nodes when created in /dev. Domain allowed access. Get the attributes of the CPU microcode and id interfaces. Domain allowed access. Set the attributes of the CPU microcode and id interfaces. Domain allowed access. Read the CPU identity. Domain allowed access. Read and write the the CPU microcode device. This is required to load CPU microcode. Domain allowed access. Read the the hardware SSL accelerator. Domain allowed access. Read the kernel crash device Domain allowed access. Read and write the the hardware SSL accelerator. Domain allowed access. Set the attributes of the dlm control devices. Domain allowed access. Read and write the the dlm control device Domain allowed access. getattr the dri devices. Domain allowed access. Setattr the dri devices. Domain allowed access. Read and write the dri devices. Domain allowed access. Dontaudit read and write on the dri devices. Domain to dontaudit access. Create, read, write, and delete the dri devices. Domain allowed access. Automatic type transition to the type for DRI device nodes when created in /dev. Domain allowed access. Get the attributes of the event devices. Domain allowed access. Set the attributes of the event devices. Domain allowed access. Read input event devices (/dev/input). Domain allowed access. Read input event devices (/dev/input). Domain allowed access. Get the attributes of the framebuffer device node. Domain allowed access. Set the attributes of the framebuffer device node. Domain allowed access. Dot not audit attempts to set the attributes of the framebuffer device node. Domain to not audit. Read the framebuffer. Domain allowed access. Do not audit attempts to read the framebuffer. Domain allowed access. Write the framebuffer. Domain allowed access. Read and write the framebuffer. Domain allowed access. Read the kernel messages Domain allowed access. Do not audit attempts to read the kernel messages Domain to not audit. Write to the kernel messages device Domain allowed access. Get the attributes of the ksm devices. Domain allowed access. Set the attributes of the ksm devices. Domain allowed access. Read the ksm devices. Domain allowed access. Read and write to ksm devices. Domain allowed access. Get the attributes of the kvm devices. Domain allowed access. Set the attributes of the kvm devices. Domain allowed access. Read the kvm devices. Domain allowed access. Read and write to kvm devices. Domain allowed access. Read the lirc device. Domain allowed access. Read and write the lirc device. Domain allowed access. Automatic type transition to the type for lirc device nodes when created in /dev. Domain allowed access. Get the attributes of the lvm comtrol device. Domain allowed access. Read the lvm comtrol device. Domain allowed access. Read and write the lvm control device. Domain allowed access. Do not audit attempts to read and write lvm control device. Domain allowed access. Delete the lvm control device. Domain allowed access. dontaudit getattr raw memory devices (e.g. /dev/mem). Domain allowed access. Read raw memory devices (e.g. /dev/mem). Domain allowed access. Do not audit attempts to read raw memory devices (e.g. /dev/mem). Domain to not audit. Write raw memory devices (e.g. /dev/mem). Domain allowed access. Read and execute raw memory devices (e.g. /dev/mem). Domain allowed access. Write and execute raw memory devices (e.g. /dev/mem). Domain allowed access. Get the attributes of miscellaneous devices. Domain allowed access. Do not audit attempts to get the attributes of miscellaneous devices. Domain allowed access. Set the attributes of miscellaneous devices. Domain allowed access. Do not audit attempts to set the attributes of miscellaneous devices. Domain allowed access. Read miscellaneous devices. Domain allowed access. Read and write ipmi devices. Domain allowed access. Write miscellaneous devices. Domain allowed access. Do not audit attempts to read and write miscellaneous devices. Domain allowed access. Get the attributes of the modem devices. Domain allowed access. Set the attributes of the modem devices. Domain allowed access. Read the modem devices. Domain allowed access. Read and write to modem devices. Domain allowed access. Get the attributes of the mouse devices. Domain allowed access. Set the attributes of the mouse devices. Domain allowed access. Read the mouse devices. Domain allowed access. Read and write to mouse devices. Domain allowed access. Get the attributes of the memory type range registers (MTRR) device. Domain allowed access. Dontaudit get the attributes of the memory type range registers (MTRR) device. Domain allowed access. Read the memory type range registers (MTRR). (Deprecated)

Read the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead.

The MTRR device ioctls can be used for reading and writing; thus, read access to the device cannot be separated from write access.

Domain allowed access.
Write the memory type range registers (MTRR). (Deprecated)

Write the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead.

The MTRR device ioctls can be used for reading and writing; thus, write access to the device cannot be separated from read access.

Domain allowed access.
Do not audit attempts to write the memory type range registers (MTRR). Domain to not audit. Read and write the memory type range registers (MTRR). Domain allowed access. Get the attributes of the network control device Domain allowed access. Read the network control identity. Domain allowed access. Read and write the the network control device. Domain allowed access. Get the attributes of the null device nodes. Domain allowed access. Set the attributes of the null device nodes. Domain allowed access. Delete the null device (/dev/null). Domain allowed access. Read and write to the null device (/dev/null). Domain allowed access. Create the null device (/dev/null). Domain allowed access. Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. Domain allowed access. Read and write BIOS non-volatile RAM. Domain allowed access. Read Non-Volatile Memory Host Controller Interface. Domain allowed access. Get the attributes of the printer device nodes. Domain allowed access. Set the attributes of the printer device nodes. Domain allowed access. Append the printer device. Domain allowed access. Read and write the printer device. Domain allowed access. Get the attributes of the QEMU microcode and id interfaces. Domain allowed access. Set the attributes of the QEMU microcode and id interfaces. Domain allowed access. Read the QEMU device Domain allowed access. Read and write the the QEMU device. Domain allowed access. Read from random number generator devices (e.g., /dev/random).

Allow the specified domain to read from random number generator devices (e.g., /dev/random). Typically this is used in situations when a cryptographically secure random number is needed.

Related interface:

  • dev_read_urand()
Domain allowed access.
Do not audit attempts to read from random number generator devices (e.g., /dev/random) Domain allowed access. Do not audit attempts to append to random number generator devices (e.g., /dev/random) Domain allowed access. Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the random device. Domain allowed access. Read the realtime clock (/dev/rtc). Domain allowed access. Set the realtime clock (/dev/rtc). Domain allowed access. Read and set the realtime clock (/dev/rtc). Domain allowed access. Get the attributes of the scanner device. Domain allowed access. Do not audit attempts to get the attributes of the scanner device. Domain to not audit. Set the attributes of the scanner device. Domain allowed access. Do not audit attempts to set the attributes of the scanner device. Domain to not audit. Read and write the scanner device. Domain allowed access. Get the attributes of the sound devices. Domain allowed access. Set the attributes of the sound devices. Domain allowed access. Read the sound devices. Domain allowed access. Write the sound devices. Domain allowed access. Read the sound mixer devices. Domain allowed access. Write the sound mixer devices. Domain allowed access. Get the attributes of the the power management device. Domain allowed access. Set the attributes of the the power management device. Domain allowed access. Read and write the the power management device. Domain allowed access. Getattr on smartcard devices Domain allowed access. dontaudit getattr on smartcard devices Domain allowed access. Read and write smartcard devices. Domain allowed access. Create, read, write, and delete smartcard devices. Domain allowed access. Associate a file to a sysfs filesystem. The type of the file to be associated to sysfs. Get the attributes of sysfs directories. The type of the process performing this action. Mount a filesystem on /sys Domain allow access. Mount sysfs filesystems. Domain allowed access. Unmount sysfs filesystems. Domain allowed access. Search the sysfs directories. The type of the process performing this action. Do not audit attempts to search sysfs. The type of the process performing this action. List the contents of the sysfs directories. The type of the process performing this action. Write in a sysfs directories. The type of the process performing this action. Read hardware state information.

Allow the specified domain to read the contents of the sysfs filesystem. This filesystem contains information, parameters, and other settings on the hardware installed on the system.

Domain allowed access.
Allow caller to modify hardware state information. The process type modifying hardware state information. Read from pseudo random number generator devices (e.g., /dev/urandom).

Allow the specified domain to read from pseudo random number generator devices (e.g., /dev/urandom). Typically this is used in situations when a cryptographically secure random number is not necessarily needed. One example is the Stack Smashing Protector (SSP, formerly known as ProPolice) support that may be compiled into programs.

Related interface:

  • dev_read_rand()

Related tunable:

  • global_ssp
Domain allowed access.
Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) Domain to not audit. Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. Domain allowed access. Do not audit attempts to write to pseudo random devices (e.g., /dev/urandom) Domain to not audit. Getattr generic the USB devices. Domain allowed access. Setattr generic the USB devices. Domain allowed access. Read generic the USB devices. Domain allowed access. Read and write generic the USB devices. Domain allowed access. Allow relabeling (to and from) of generic usb device Domain allowed to relabel. Read USB monitor devices. Domain allowed access. Write USB monitor devices. Domain allowed access. Mount a usbfs filesystem. The type of the process performing this action. Associate a file to a usbfs filesystem. The type of the file to be associated to usbfs. Get the attributes of a directory in the usb filesystem. Domain allowed access. Do not audit attempts to get the attributes of a directory in the usb filesystem. Domain to not audit. Search the directory containing USB hardware information. The type of the process performing this action. Allow caller to get a list of usb hardware. The process type getting the list. Set the attributes of usbfs filesystem. Domain allowed access. Read USB hardware information using the usbfs filesystem interface. The type of the process performing this action. Allow caller to modify usb hardware configuration files. The process type modifying the options. Allow read/write the vhost net device Domain allowed access. Get the attributes of video4linux devices. Domain allowed access. Read and write userio device. Domain allowed access. Do not audit attempts to get the attributes of video4linux device nodes. Domain to not audit. Set the attributes of video4linux device nodes. Domain allowed access. Do not audit attempts to set the attributes of video4linux device nodes. Domain to not audit. Read the video4linux devices. Domain allowed access. Write the video4linux devices. Domain allowed access. Read and write VMWare devices. Domain allowed access. Read, write, and mmap VMWare devices. Domain allowed access. Read to watchdog devices. Domain allowed access. Write to watchdog devices. Domain allowed access. Read and write the the wireless device. Domain allowed access. Read and write Xen devices. Domain allowed access. Create, read, write, and delete Xen devices. Domain allowed access. Automatic type transition to the type for xen device nodes when created in /dev. Domain allowed access. Get the attributes of X server miscellaneous devices. Domain allowed access. Set the attributes of X server miscellaneous devices. Domain allowed access. Read and write X server miscellaneous devices. Domain allowed access. Read and write to the zero device (/dev/zero). Domain allowed access. Read, write, and execute the zero device (/dev/zero). Domain allowed access. Execmod the zero device (/dev/zero). Domain allowed access. Create the zero device (/dev/zero). Domain allowed access. Unconfined access to devices. Domain allowed access.
Core policy for domains. Contains the concept of a domain. Make the specified type usable as a basic domain.

Make the specified type usable as a basic domain.

This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes.

Type to be used as a basic domain type.
Make the specified type usable as a domain.

Make the specified type usable as a domain. This, or an interface that calls this interface, must be used on all types that are used as domains.

Related interfaces:

  • application_domain()
  • init_daemon_domain()
  • init_domaion()
  • init_ranged_daemon_domain()
  • init_ranged_domain()
  • init_ranged_system_domain()
  • init_script_domain()
  • init_system_domain()

Example:

type mydomain_t; domain_type(mydomain_t) type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;

Type to be used as a domain type.
Make the specified type usable as an entry point for the domain. Domain to be entered. Type of program used for entering the domain. Make the file descriptors of the specified domain for interactive use (widely inheritable) Domain allowed access. Allow the specified domain to perform dynamic transitions.

Allow the specified domain to perform dynamic transitions.

This violates process tranquility, and it is strongly suggested that this not be used.

Domain allowed access.
Makes caller and execption to the constraint preventing changing to the system user identity and system role. Domain allowed access. Makes caller an exception to the constraint preventing changing of user identity. The process type to make an exception to the constraint. Makes caller an exception to the constraint preventing changing of role. The process type to make an exception to the constraint. Makes caller an exception to the constraint preventing changing the user identity in object contexts. The process type to make an exception to the constraint. Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains.

Domain target for user exemption.
Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains.

Domain target for user exemption.
Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs.

Domain target for user exemption.
Inherit and use file descriptors from domains with interactive programs.

Allow the specified domain to inherit and use file descriptors from domains with interactive programs. This does not allow access to the objects being referenced by the file descriptors.

Domain allowed access.
Do not audit attempts to inherit file descriptors from domains with interactive programs. Domain allowed access. Send a SIGCHLD signal to domains whose file discriptors are widely inheritable. Domain allowed access. Set the nice level of all domains. Domain allowed access. Send general signals to all domains. Domain allowed access. Send a null signal to all domains. Domain allowed access. Send a null signal to all domains. Domain allowed access. Send a stop signal to all domains. Domain allowed access. Send a child terminated signal to all domains. Domain allowed access. Send a kill signal to all domains. Domain allowed access. Search the process state directory (/proc/pid) of all domains. Domain allowed access. Do not audit attempts to search the process state directory (/proc/pid) of all domains. Domain to not audit. Read the process state (/proc/pid) of all domains. Domain allowed access. Get the attributes of all domains. Domain allowed access. Dontaudit geting the attributes of all domains. Domain allowed access. Read the process state (/proc/pid) of all confined domains. Domain allowed access. Get the attributes of all confined domains. Domain allowed access. Ptrace all domains. Domain allowed access. Do not audit attempts to ptrace all domains.

Do not audit attempts to ptrace all domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Domain allowed access.
Do not audit attempts to ptrace confined domains.

Do not audit attempts to ptrace confined domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Domain allowed access.
Do not audit attempts to read the process state (/proc/pid) of all domains. Domain allowed access. Do not audit attempts to read the process state directories of all domains. Domain allowed access. Get the session ID of all domains. Domain allowed access. Do not audit attempts to get the session ID of all domains. Domain allowed access. Get the process group ID of all domains. Domain allowed access. Get the scheduler information of all domains. Domain allowed access. Get the attributes of all domains sockets, for all socket types.

Get the attributes of all domains sockets, for all socket types.

This is commonly used for domains that can use lsof on all domains.

Domain allowed access.
Do not audit attempts to get the attributes of all domains sockets, for all socket types.

Do not audit attempts to get the attributes of all domains sockets, for all socket types.

This interface was added for PCMCIA cardmgr and is probably excessive.

Domain to not audit.
Do not audit attempts to get the attributes of all domains TCP sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains UDP sockets. Domain allowed access. Do not audit attempts to read or write all domains UDP sockets. Domain allowed access. Do not audit attempts to get attribues of all domains IPSEC key management sockets. Domain allowed access. Do not audit attempts to get attribues of all domains packet sockets. Domain allowed access. Do not audit attempts to get attribues of all domains raw sockets. Domain allowed access. Do not audit attempts to read or write all domains key sockets. Domain allowed access. Do not audit attempts to read or write all domains key sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain allowed access. Get the attributes of all domains unix datagram sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain allowed access. Get the attributes of all domains unnamed pipes.

Get the attributes of all domains unnamed pipes.

This is commonly used for domains that can use lsof on all domains.

Domain allowed access.
Do not audit attempts to get the attributes of all domains unnamed pipes. Domain allowed access. Allow specified type to set context of all domains IPSEC associations. Type of subject to be allowed this. Get the attributes of entry point files for all domains. Domain allowed access. Read the entry point files for all domains. Domain allowed access. Execute the entry point files for all domains in the caller domain. Domain allowed access. dontaudit checking for execute on all entry point files Domain to not audit. Create, read, write, and delete all entrypoint files. Domain allowed access. Relabel to and from all entry point file types. Domain allowed access. Mmap all entry point files as executable. Domain allowed access. Execute an entry_type in the specified domain. Domain allowed access. The type of the new process. Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. Domain allowed to mmap low memory. Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. Domain allowed to mmap low memory. Allow specified type to receive labeled networking packets from all domains, over all protocols (TCP, UDP, etc) Domain allowed access. Send generic signals to the unconfined domain. Domain allowed access. Unconfined access to domains. Domain allowed access. Do not audit attempts to read or write all leaked sockets. Domain allowed access.

Allow all domains to use other domains file descriptors

Allow all domains to have the kernel load modules

Allow all domains to execute in fips_mode

Basic filesystem types and interfaces.

This module contains basic filesystem types and interfaces. This includes:

  • The concept of different file types including basic files, mount points, tmp files, etc.
  • Access to groups of files and all files.
  • Types and interfaces for the basic filesystem layout (/, /etc, /tmp, /usr, etc.).

Contains the concept of a file. Comains the file initial SID. Make the specified type usable for files in a filesystem.

Make the specified type usable for files in a filesystem. Types used for files that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. If the type is used for device nodes (character or block files), then the dev_node() interface is more appropriate.

Related interfaces:

  • application_domain()
  • application_executable_file()
  • corecmd_executable_file()
  • init_daemon_domain()
  • init_domaion()
  • init_ranged_daemon_domain()
  • init_ranged_domain()
  • init_ranged_system_domain()
  • init_script_file()
  • init_script_domain()
  • init_system_domain()
  • files_config_files()
  • files_lock_file()
  • files_mountpoint()
  • files_pid_file()
  • files_security_file()
  • files_security_mountpoint()
  • files_tmp_file()
  • files_tmpfs_file()
  • logging_log_file()
  • userdom_user_home_content()

Example:

type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;

Type to be used for files.
Make the specified type a file that should not be dontaudited from browsing from user domains. Type of the file to be used as a member directory. Make the specified type usable for lock files. Type to be used for lock files. Make the specified type usable for lock files. Type to be used for lock files. Make the specified type usable for filesystem mount points. Type to be used for mount points. Make the specified type usable for security file filesystem mount points. Type to be used for mount points. Make the specified type usable for runtime process ID files.

Make the specified type usable for runtime process ID files, typically found in /var/run. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a PID file type may result in problems with starting or stopping services.

Related interfaces:

  • files_pid_filetrans()

Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:

type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)

Type to be used for PID files.
Make the specified type a configuration file.

Make the specified type usable for configuration files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with configuration management tools.

Example usage with a domain that can read its configuration file /etc:

type myconffile_t; files_config_file(myconffile_t) allow mydomain_t myconffile_t:file read_file_perms; files_search_etc(mydomain_t)

Type to be used as a configuration file.
Make the specified type a base file.

Identify file type as base file type. Tools will use this attribute, to help users diagnose problems.

Type to be used as a base files.
Make the specified type a base read only file.

Make the specified type readable for all domains.

Type to be used as a base read only files.
Read all ro base files. Domain allowed access. Execute all base ro files. Domain allowed access. Make the specified type a polyinstantiated directory. Type of the file to be used as a polyinstantiated directory. Make the specified type a parent of a polyinstantiated directory. Type of the file to be used as a parent directory. Make the specified type a polyinstantiation member directory. Type of the file to be used as a member directory. Make the domain use the specified type of polyinstantiated directory. Domain using the polyinstantiated directory. Type of the file to be used as a member directory. Make the specified type a file used for temporary files.

Make the specified type usable for temporary files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with purging temporary files.

Related interfaces:

  • files_tmp_filetrans()

Example usage with a domain that can create and write its temporary file in the system temporary file directories (/tmp or /var/tmp):

type mytmpfile_t; files_tmp_file(mytmpfile_t) allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; files_tmp_filetrans(mydomain_t, mytmpfile_t, file)

Type of the file to be used as a temporary file.
Transform the type into a file, for use on a virtual memory filesystem (tmpfs). The type to be transformed. Get the attributes of all directories. Domain allowed access. Do not audit attempts to get the attributes of all directories. Domain to not audit. List all non-security directories. Domain allowed access. Do not audit attempts to list all non-security directories. Domain to not audit. Mount a filesystem on all non-security directories and files. Domain allowed access. Allow attempts to modify any directory Domain to allow Allow attempts to manage non-security directories Domain to allow Manage all non-security files. Domain allowed access. Relabel all non-security files. Domain allowed access. Search all base file dirs. Domain allowed access. Relabel all base file types. Domain allowed access. Get the attributes of all files. Domain allowed access. Do not audit attempts to get the attributes of all files. Domain to not audit. Do not audit attempts to get the attributes of non security files. Domain to not audit. Do not audit attempts to set the attributes of non security files. Domain to not audit. Do not audit attempts to set the attributes of non security directories. Domain to not audit. Read all files. Domain allowed access. Allow shared library text relocations in all files.

Allow shared library text relocations in all files.

This is added to support WINE policy.

Domain allowed access.
Read all non-security files. Domain allowed access. Read all directories on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Get the attributes of all symbolic links. Domain allowed access. Do not audit attempts to get the attributes of all symbolic links. Domain to not audit. Do not audit attempts to read all symbolic links. Domain to not audit. Do not audit attempts to get the attributes of non security symbolic links. Domain to not audit. Do not audit attempts to get the attributes of non security block devices. Domain to not audit. Do not audit attempts to get the attributes of non security character devices. Domain to not audit. Read all symbolic links. Domain allowed access. Get the attributes of all named pipes. Domain allowed access. Do not audit attempts to get the attributes of all named pipes. Domain to not audit. Do not audit attempts to get the attributes of non security named pipes. Domain to not audit. Do not audit attempts to get the attributes of non security named pipes. Domain to not audit. Get the attributes of all named sockets. Domain allowed access. Do not audit attempts to get the attributes of all named sockets. Domain to not audit. Do not audit attempts to get the attributes of non security named sockets. Domain to not audit. Read all block nodes with file types. Domain allowed access. Read all character nodes with file types. Domain allowed access. Relabel all files on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. rw all files on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except the listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Search the contents of all directories on extended attribute filesystems. Domain allowed access. List the contents of all directories on extended attribute filesystems. Domain allowed access. Do not audit attempts to search the contents of any directories on extended attribute filesystems. Domain allowed access. Get the attributes of all filesystems with the type of a file. Domain allowed access. Relabel a filesystem to the type of a file. Domain allowed access. Relabel a filesystem to the type of a file. Domain allowed access. Mount all filesystems with the type of a file. Domain allowed access. Unmount all filesystems with the type of a file. Domain allowed access. Manage all configuration directories on filesystem The type of domain performing this action Relabel configuration directories Type of domain performing this action Read config files in /etc. Domain allowed access. Manage all configuration files on filesystem The type of domain performing this action Relabel configuration files Type of domain performing this action Mount a filesystem on all mount points. Domain allowed access. Get the attributes of all mount points. Domain allowed access. Read all mountpoint symbolic links. Domain allowed access. List the attributes of all mount points. Domain allowed access. Get the attributes of all mount points. Domain allowed access. Do not audit listing of all mount points. Domain to not audit. Search all mount points. Domain allowed access. Search all mount points. Domain allowed access. Write all mount points. Domain allowed access. Write all mount points. Domain allowed access. List the contents of the root directory. Domain allowed access. Do not audit attempts to write files in the root directory. Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to read files in the root directory. Domain to not audit. Do not audit attempts to read or write files in the root directory. Domain allowed access. Do not audit attempts to read or write character device nodes in the root directory. Domain allowed access. Remove file entries from the root directory. Domain allowed access. Remove entries from the root directory. Domain allowed access. Unmount a rootfs filesystem. Domain allowed access. Mount a filesystem on the root file system Domain allowed access. Get attributes of the /boot directory. Domain allowed access. Do not audit attempts to get attributes of the /boot directory. Domain to not audit. Search the /boot directory. Domain allowed access. Do not audit attempts to search the /boot directory. Domain allowed access. List the /boot directory. Domain allowed access. Write directories in /boot Domain allowed access. Create directories in /boot Domain allowed access. manage directories in /boot Domain allowed access. Create a private type object in boot with an automatic type transition Domain allowed access. The type of the object to be created. The object class of the object being created. read files in the /boot directory. Domain allowed access. Create, read, write, and delete files in the /boot directory. Domain allowed access. Create, read, write, and delete files in the /boot directory. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. Read symbolic links in the /boot directory. Domain allowed access. Read and write symbolic links in the /boot directory. Domain allowed access. Create, read, write, and delete symbolic links in the /boot directory. Domain allowed access. Read kernel files in the /boot directory. Domain allowed access. Install a kernel into the /boot directory. Domain allowed access. Delete a kernel from /boot. Domain allowed access. Getattr of directories with the default file type. Domain allowed access. Do not audit attempts to get the attributes of directories with the default file type. Domain to not audit. Search the contents of directories with the default file type. Domain allowed access. List contents of directories with the default file type. Domain allowed access. Do not audit attempts to list contents of directories with the default file type. Domain to not audit. Create, read, write, and delete directories with the default file type. Domain allowed access. Mount a filesystem on a directory with the default file type. Domain allowed access. Do not audit attempts to get the attributes of files with the default file type. Domain to not audit. Read files with the default file type. Domain allowed access. Do not audit attempts to read files with the default file type. Domain to not audit. Create, read, write, and delete files with the default file type. Domain allowed access. Read symbolic links with the default file type. Domain allowed access. Read sockets with the default file type. Domain allowed access. Read named pipes with the default file type. Domain allowed access. Search the contents of /etc directories. Domain allowed access. Set the attributes of the /etc directories. Domain allowed access. List the contents of /etc directories. Domain allowed access. Add and remove entries from /etc directories. Domain allowed access. Do not audit attempts to write to /etc dirs. Domain allowed access. Manage generic directories in /etc Domain allowed access Read generic files in /etc.

Allow the specified domain to read generic files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:

  • /etc/fstab
  • /etc/passwd
  • /etc/services
  • /etc/shells

This interface does not include access to /etc/shadow.

Generally, it is safe for many domains to have this access. However, since this interface provides access to the /etc/passwd file, caution must be exercised, as user account names can be leaked through this access.

Related interfaces:

  • auth_read_shadow()
  • files_read_etc_runtime_files()
  • seutil_read_config()
Domain allowed access.
Do not audit attempts to write generic files in /etc. Domain allowed access. Read and write generic files in /etc. Domain allowed access. Create, read, write, and delete generic files in /etc. Domain allowed access. Delete system configuration files in /etc. Domain allowed access. Delete system configuration lnk files in /etc. Domain allowed access. Remove entries from the etc directory. Domain allowed access. Execute generic files in /etc. Domain allowed access. Relabel from and to generic files in /etc. Domain allowed access. Read symbolic links in /etc. Domain allowed access. Create, read, write, and delete symbolic links in /etc. Domain allowed access. Create objects in /etc with a private type using a type_transition. Domain allowed access. Private file type. Object classes to be created. Create a boot flag.

Create a boot flag, such as /.autorelabel and /.autofsck.

Domain allowed access.
Read files in /etc that are dynamically created on boot, such as mtab.

Allow the specified domain to read dynamically created configuration files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:

  • /etc/motd
  • /etc/mtab
  • /etc/nologin

This interface does not include access to /etc/shadow.

Domain allowed access.
Do not audit attempts to read files in /etc that are dynamically created on boot, such as mtab. Domain to not audit. Read and write files in /etc that are dynamically created on boot, such as mtab. Domain allowed access. Create, read, write, and delete files in /etc that are dynamically created on boot, such as mtab. Domain allowed access. Do not audit attempts to set the attributes of the etc_runtime files Domain to not audit. Create, etc runtime objects with an automatic type transition. Domain allowed access. The class of the object being created. Getattr of directories on new filesystems that have not yet been labeled. Domain allowed access. Do not audit attempts to search directories on new filesystems that have not yet been labeled. Domain allowed access. List the contents of directories on new filesystems that have not yet been labeled. Domain allowed access. Read and write directories on new filesystems that have not yet been labeled. Domain allowed access. Delete directories on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete directories on new filesystems that have not yet been labeled. Domain allowed access. Mount a filesystem on a directory on new filesystems that has not yet been labeled. Domain allowed access. Read files on new filesystems that have not yet been labeled. Domain allowed access. Delete files on new filesystems that have not yet been labeled. Domain allowed access. Delete lnk_files on new filesystems that have not yet been labeled. Domain allowed access. Delete fifo files on new filesystems that have not yet been labeled. Domain allowed access. Delete sock files on new filesystems that have not yet been labeled. Domain allowed access. Delete blk files on new filesystems that have not yet been labeled. Domain allowed access. Delete chr files on new filesystems that have not yet been labeled. Domain allowed access. Do not audit attempts to write to chr_files that have not yet been labeled. Domain allowed access. Create, read, write, and delete files on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete symbolic links on new filesystems that have not yet been labeled. Domain allowed access. Read and write block device nodes on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete block device nodes on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete character device nodes on new filesystems that have not yet been labeled. Domain allowed access. Get the attributes of the home directories root (/home). Domain allowed access. Do not audit attempts to get the attributes of the home directories root (/home). Domain to not audit. Search home directories root (/home). Domain allowed access. Do not audit attempts to search home directories root (/home). Domain to not audit. Do not audit attempts to list home directories root (/home). Domain to not audit. Get listing of home directories. Domain allowed access. Relabel to user home root (/home). Domain allowed access. Create objects in /home. Domain allowed access. The private type. The class of the object being created. Get the attributes of lost+found directories. Domain allowed access. Do not audit attempts to get the attributes of lost+found directories. Domain to not audit. Create, read, write, and delete objects in lost+found directories. Domain allowed access. Search the contents of /mnt. Domain allowed access. Do not audit attempts to search /mnt. Domain to not audit. List the contents of /mnt. Domain allowed access. dontaudit List the contents of /mnt. Domain allowed access. Mount a filesystem on /mnt. Domain allowed access. Create, read, write, and delete directories in /mnt. Domain allowed access. Create, read, write, and delete files in /mnt. Domain allowed access. read files in /mnt. Domain allowed access. Read symbolic links in /mnt. Domain allowed access. Create, read, write, and delete symbolic links in /mnt. Domain allowed access. Search the contents of the kernel module directories. Domain allowed access. List the contents of the kernel module directories. Domain allowed access. Get the attributes of kernel module files. Domain allowed access. Read kernel module files. Domain allowed access. Write kernel module files. Domain allowed access. Delete kernel module files. Domain allowed access. Create, read, write, and delete kernel module files. Domain allowed access. Relabel from and to kernel module files. Domain allowed access. Create objects in the kernel module directories with a private type via an automatic type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. List world-readable directories. Domain allowed access. Read world-readable files. Domain allowed access. Read world-readable symbolic links. Domain allowed access. Read world-readable named pipes. Domain allowed access. Read world-readable sockets. Domain allowed access. Read manageable system configuration files in /etc Domain allowed access. Manage manageable system configuration files in /etc. Domain allowed access. Relabel manageable system configuration files in /etc. Domain allowed access. Relabel manageable system configuration files in /etc. Domain allowed access. Create files in /etc with the type used for the manageable system config files. The type of the process performing this action. Allow the specified type to associate to a filesystem with the type of the temporary directory (/tmp). Type of the file to associate. Get the attributes of the tmp directory (/tmp). Domain allowed access. Do not audit attempts to get the attributes of the tmp directory (/tmp). Domain allowed access. Search the tmp directory (/tmp). Domain allowed access. Do not audit attempts to search the tmp directory (/tmp). Domain allowed access. Read the tmp directory (/tmp). Domain allowed access. Do not audit listing of the tmp directory (/tmp). Domain not to audit. Dontaudit write to the tmp directory (/tmp). Domain not to audit. Allow read and write to the tmp directory (/tmp). Domain not to audit. Remove entries from the tmp directory. Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Manage temporary directories in /tmp. The type of the process performing this action. Allow shared library text relocations in tmp files.

Allow shared library text relocations in tmp files.

This is added to support java policy.

Domain allowed access.
Manage temporary files and directories in /tmp. The type of the process performing this action. Read symbolic links in the tmp directory (/tmp). Domain allowed access. Read and write generic named sockets in the tmp directory (/tmp). Domain allowed access. Relabel a dir from the type used in /tmp. Domain allowed access. Set the attributes of all tmp directories. Domain allowed access. Allow caller to read inherited tmp files. Domain allowed access. Allow caller to append inherited tmp files. Domain allowed access. Allow caller to read and write inherited tmp files. Domain allowed access. List all tmp directories. Domain allowed access. Do not audit attempts to get the attributes of all tmp files. Domain not to audit. Allow attempts to get the attributes of all tmp files. Domain not to audit. Do not audit attempts to get the attributes of all tmp sock_file. Domain not to audit. Read all tmp files. Domain allowed access. Do not audit attempts to read or write all leaked tmpfiles files. Domain to not audit. Create an object in the tmp directories, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Delete the contents of /tmp. Domain allowed access. Search the content of /etc. Domain allowed access. List the contents of generic directories in /usr. Domain allowed access. Add and remove entries from /usr directories. Domain allowed access. dontaudit Add and remove entries from /usr directories. Domain allowed access. Delete generic directories in /usr in the caller domain. Domain allowed access. Set the attributes of the /usr directory. Domain allowed access. Delete generic files in /usr in the caller domain. Domain allowed access. Get the attributes of files in /usr. Domain allowed access. Read generic files in /usr.

Allow the specified domain to read generic files in /usr. These files are various program files that do not have more specific SELinux types. Some examples of these files are:

  • /usr/include/*
  • /usr/share/doc/*
  • /usr/share/info/*

Generally, it is safe for many domains to have this access.

Domain allowed access.
Execute generic programs in /usr in the caller domain. Domain allowed access. dontaudit write of /usr dirs Domain allowed access. dontaudit write of /usr files Domain allowed access. Create, read, write, and delete files in the /usr directory. Domain allowed access. Relabel a file to the type used in /usr. Domain allowed access. Relabel a file from the type used in /usr. Domain allowed access. Read symbolic links in /usr. Domain allowed access. Create objects in the /usr directory Domain allowed access. The type of the object to be created The object class. Do not audit attempts to search /usr/src. Domain to not audit. Get the attributes of files in /usr/src. Domain allowed access. Read files in /usr/src. Domain allowed access. Execute programs in /usr/src in the caller domain. Domain allowed access. Install a system.map into the /boot directory. Domain allowed access. Read system.map in the /boot directory. Domain allowed access. Delete a system.map in the /boot directory. Domain allowed access. Search the contents of /var. Domain allowed access. Do not audit attempts to write to /var. Domain to not audit. Allow attempts to write to /var.dirs Domain to not audit. Do not audit attempts to search the contents of /var. Domain to not audit. List the contents of /var. Domain allowed access. Do not audit listing of the var directory (/var). Domain to not audit. Create, read, write, and delete directories in the /var directory. Domain allowed access. Read files in the /var directory. Domain allowed access. Read and write files in the /var directory. Domain allowed access. Do not audit attempts to read and write files in the /var directory. Domain allowed access. Create, read, write, and delete files in the /var directory. Domain allowed access. Read symbolic links in the /var directory. Domain allowed access. Create, read, write, and delete symbolic links in the /var directory. Domain allowed access. Create objects in the /var directory Domain allowed access. The type of the object to be created The object class. Get the attributes of the /var/lib directory. Domain allowed access. Search the /var/lib directory.

Search the /var/lib directory. This is necessary to access files or directories under /var/lib that have a private type. For example, a domain accessing a private library file in the /var/lib directory:

allow mydomain_t mylibfile_t:file read_file_perms; files_search_var_lib(mydomain_t)

Domain allowed access.
List the contents of the /var/lib directory. Domain allowed access. Read-write /var/lib directories Domain allowed access. Read-write /var/lib directories Domain allowed access. Read-write /var/lib directories Domain allowed access. Create objects in the /var/lib directory Domain allowed access. The type of the object to be created The object class. Read generic files in /var/lib. Domain allowed access. Read generic symbolic links in /var/lib Domain allowed access. Create, read, write, and delete the pseudorandom number generator seed. Domain allowed access. Allow domain to manage mount tables necessary for rpcd, nfsd, etc. Domain allowed access. Search the locks directory (/var/lock). Domain allowed access. Do not audit attempts to search the locks directory (/var/lock). Domain to not audit. Do not audit attempts to read/write inherited locks (/var/lock). Domain to not audit. Do not audit attempts to read/write inherited locks (/var/lock). Domain to not audit. Set the attributes of the /var/lock directory. Domain allowed access. Add and remove entries in the /var/lock directories. Domain allowed access. Get the attributes of generic lock files. Domain allowed access. Create, read, write, and delete generic lock files. Domain allowed access. Delete all lock files. Domain allowed access. Read all lock files. Domain allowed access. manage all lock files. Domain allowed access. Create an object in the locks directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to get the attributes of the /var/run directory. Domain to not audit. Search the contents of runtime process ID directories (/var/run). Domain allowed access. Do not audit attempts to search the all /var/run directory. Domain to not audit. Add and remove entries from pid directories. Domain allowed access. Create generic pid directory. Domain allowed access. Do not audit attempts to search the /var/run directory. Domain to not audit. List the contents of the runtime process ID directories (/var/run). Domain allowed access. Read generic process ID files. Domain allowed access. Write named generic process ID pipes Domain allowed access. Create an object in the process ID directory, with a private type.

Create an object in the process ID directory (e.g., /var/run) with a private type. Typically this is used for creating private PID files in /var/run with the private type instead of the general PID file type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.

Related interfaces:

  • files_pid_file()

Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:

type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)

Domain allowed access. The type of the object to be created. The object class of the object being created.
Read and write generic process ID files. Domain allowed access. Do not audit attempts to get the attributes of daemon runtime data files. Domain allowed access. Do not audit attempts to write to daemon runtime data files. Domain allowed access. Do not audit attempts to ioctl daemon runtime data files. Domain allowed access. Read all process ID files. Domain allowed access. Mount filesystems on all polyinstantiation member directories. Domain allowed access. Delete all process IDs. Domain allowed access. Delete all process ID directories. Domain allowed access. Set the attributes of the /var/run directory. Domain allowed access. Search the contents of generic spool directories (/var/spool). Domain allowed access. Do not audit attempts to search generic spool directories. Domain to not audit. List the contents of generic spool (/var/spool) directories. Domain allowed access. Create, read, write, and delete generic spool directories (/var/spool). Domain allowed access. Read generic spool files. Domain allowed access. Create, read, write, and delete generic spool files. Domain allowed access. Create objects in the spool directory with a private type with a type transition. Domain allowed access. Type to which the created node will be transitioned. Object class(es) (single or set including {}) for which this the transition will occur. Allow access to manage all polyinstantiated directories on the system. Domain allowed access. Unconfined access to files. Domain allowed access. Create a core files in /

Create a core file in /,

Domain allowed access.
Create a default directory

Create a default_t direcrory

Domain allowed access.
Create, default_t objects with an automatic type transition. Domain allowed access. The class of the object being created. manage generic symbolic links in the /var/run directory. Domain allowed access. Do not audit attempts to getattr all tmpfs files. Domain to not audit. Do not audit attempts to read security files Domain to not audit. rw any files inherited from another process Domain allowed access. Object type. Allow any file point to be the entrypoint of this domain Domain allowed access. Do not audit attempts to rw inherited file perms of non security files. Domain to not audit. Do not audit attempts to read or write all leaked files. Domain allowed access. Allow domain to create_file_ass all types Domain allowed access.
Policy for filesystems. Contains the initial SID for the filesystems. Transform specified type into a filesystem type. Domain allowed access. Transform specified type into a filesystem type which does not have extended attribute support. Domain allowed access. Associate the specified file type to persistent filesystems with extended attributes. This allows a file of this type to be created on a filesystem such as ext3, JFS, and XFS. The type of the to be associated. Associate the specified file type to filesystems which lack extended attributes support. This allows a file of this type to be created on a filesystem such as FAT32, and NFS. The type of the to be associated. Execute files on a filesystem that does not support extended attributes. Domain allowed access. Mount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain allowed access. Remount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. This allows some mount options to be changed. Domain allowed access. Unmount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain allowed access. Get the attributes of persistent filesystems which have extended attributes, such as ext3, JFS, or XFS.

Allow the specified domain to get the attributes of a persistent filesystems which have extended attributes, such as ext3, JFS, or XFS. Example attributes:

  • Type of the file system (e.g., ext3)
  • Size of the file system
  • Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes of a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain to not audit. Allow changing of the label of a filesystem with extended attributes using the context= mount option. Domain allowed access. Get the filesystem quotas of a filesystem with extended attributes. Domain allowed access. Set the filesystem quotas of a filesystem with extended attributes. Domain allowed access. Read files on anon_inodefs file systems. Domain allowed access. Read and write files on anon_inodefs file systems. Domain allowed access. Do not audit attempts to read or write files on anon_inodefs file systems. Domain allowed access. Mount an automount pseudo filesystem. Domain allowed access. Remount an automount pseudo filesystem This allows some mount options to be changed. Domain allowed access. Unmount an automount pseudo filesystem. Domain allowed access. Get the attributes of an automount pseudo filesystem. Domain allowed access. Search automount filesystem to use automatically mounted filesystems. Allow the specified domain to search mount points that have filesystems that are mounted by the automount service. Generally this will be required for any domain that accesses objects on these filesystems. Domain allowed access. Read directories of automatically mounted filesystems. Domain allowed access. Do not audit attempts to list directories of automatically mounted filesystems. Domain to not audit. Create, read, write, and delete symbolic links on an autofs filesystem. Domain allowed access. Get the attributes of directories on binfmt_misc filesystems. Domain allowed access. Register an interpreter for new binary file types, using the kernel binfmt_misc support.

Register an interpreter for new binary file types, using the kernel binfmt_misc support.

A common use for this is to register a JVM as an interpreter for Java byte code. Registered binaries can be directly executed on a command line without specifying the interpreter.

Domain allowed access.
Delete directories on cgroup. Domain allowed access. Mount a cgroup filesystem. Domain allowed access. Remount a cgroup filesystem This allows some mount options to be changed. Domain allowed access. Unmount a cgroup file system. Domain allowed access. Get the attributes of a cgroup filesystem. Domain allowed access. Get attributes of cgroup files. Domain allowed access. Search cgroup directories. Domain allowed access. list dirs on cgroup file systems. Domain allowed access. Manage dirs on cgroup file systems. Domain allowed access. Set attributes of files on cgroup file systems. Domain allowed access. Read files on cgroup file systems. Domain allowed access. Write files on cgroup file systems. Domain allowed access. Read and write files on cgroup file systems. Domain allowed access. Do not audit attempts to getattr, open, read and write files on cgroup file systems. Domain to not audit. Manage cgroup files. Domain allowed access. Mount on cgroup directories. Domain allowed access. Do not audit attempts to read dirs on a CIFS or SMB filesystem. Domain to not audit. Mount a CIFS or SMB network filesystem. Domain allowed access. Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a CIFS or SMB network filesystem. Domain allowed access. Get the attributes of a CIFS or SMB network filesystem. Domain allowed access. Search directories on a CIFS or SMB filesystem. Domain allowed access. List the contents of directories on a CIFS or SMB filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. Domain to not audit. Mounton a CIFS filesystem. Domain allowed access. Read files on a CIFS or SMB filesystem. Domain allowed access. Read files on a CIFS or SMB filesystem. Domain allowed access. Get the attributes of filesystems that do not have extended attribute support. Domain allowed access. Read all noxattrfs directories. Domain allowed access. Create, read, write, and delete all noxattrfs directories. Domain allowed access. Read all noxattrfs files. Domain allowed access. Dont audit attempts to write to noxattrfs files. Domain allowed access. Read/Write all inherited noxattrfs files. Domain allowed access. Create noxattrfs files. Domain allowed access. Create, read, write, and delete all noxattrfs files. Domain allowed access. Read all noxattrfs symbolic links. Domain allowed access. Do not audit attempts to read files on a CIFS or SMB filesystem. Domain to not audit. Append files on a CIFS filesystem. Domain allowed access. dontaudit Append files on a CIFS filesystem. Domain allowed access. Read inherited files on a CIFS or SMB filesystem. Domain to not audit. Read/Write inherited files on a CIFS or SMB filesystem. Domain allowed access. Do not audit attempts to read or write files on a CIFS or SMB filesystem. Domain to not audit. Read symbolic links on a CIFS or SMB filesystem. Domain allowed access. Read named pipes on a CIFS or SMB network filesystem. Domain allowed access. Read named pipes on a CIFS or SMB network filesystem. Domain allowed access. Execute files on a CIFS or SMB network filesystem, in the caller domain. Domain allowed access. Create, read, write, and delete directories on a CIFS or SMB network filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a CIFS or SMB network filesystem. Domain allowed access. Create, read, write, and delete files on a CIFS or SMB network filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a CIFS or SMB network filesystem. Domain to not audit. Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. Domain allowed access. Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. Domain allowed access. Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. Domain allowed access. Execute a file on a CIFS or SMB filesystem in the specified domain.

Execute a file on a CIFS or SMB filesystem in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle home directories on CIFS/SMB filesystems, in particular used by the ssh-agent policy.

Domain allowed access. The type of the new process.
Make general progams in cifs an entrypoint for the specified domain. The domain for which cifs_t is an entrypoint. Create, read, write, and delete dirs on a configfs filesystem. Domain allowed access. Create, read, write, and delete dirs on a configfs filesystem. Domain allowed access. Create, read, write, and delete files on a configfs filesystem. Domain allowed access. Mount a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Remount a DOS filesystem, such as FAT32 or NTFS. This allows some mount options to be changed. Domain allowed access. Unmount a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Get the attributes of a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Allow changing of the label of a DOS filesystem using the context= mount option. Domain allowed access. Search dosfs filesystem. Domain allowed access. List dirs DOS filesystem. Domain allowed access. Create, read, write, and delete dirs on a DOS filesystem. Domain allowed access. Read files on a DOS filesystem. Domain allowed access. Create, read, write, and delete files on a DOS filesystem. Domain allowed access. Read eventpollfs files.

Read eventpollfs files

This interface has been deprecated, and will be removed in the future.

Domain allowed access.
Mount a FUSE filesystem. Domain allowed access. Unmount a FUSE filesystem. Domain allowed access. Mounton a FUSEFS filesystem. Domain allowed access. Execute a file on a FUSE filesystem in the specified domain.

Execute a file on a FUSE filesystem in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle home directories on FUSE filesystems, in particular used by the ssh-agent policy.

Domain allowed to transition. The type of the new process.
Get the attributes of a FUSEFS filesystem. Domain allowed access. Search directories on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a FUSEFS filesystem. Domain to not audit. Create, read, write, and delete directories on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a FUSEFS filesystem. Domain to not audit. Read, a FUSEFS filesystem. Domain allowed access. Create, read, write, and delete files on a FUSEFS filesystem. Domain allowed access. Execute files on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a FUSEFS filesystem. Domain to not audit. Read symbolic links on a FUSEFS filesystem. Domain allowed access. Manage symbolic links on a FUSEFS filesystem. Domain allowed access. Get the attributes of an hugetlbfs filesystem; Domain allowed access. Read hugetlbfs files. Domain allowed access. Read and write hugetlbfs files. Domain allowed access. Manage hugetlbfs dirs. Domain allowed access. List hugetlbfs dirs Domain allowed access. Allow the type to associate to hugetlbfs filesystems. The type of the object to be associated. Search inotifyfs filesystem. Domain allowed access. List inotifyfs filesystem. Domain allowed access. Dontaudit List inotifyfs filesystem. Domain allowed access. Create an object in a hugetlbfs filesystem, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Mount an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Remount an iso9660 filesystem, which is usually used on CDs. This allows some mount options to be changed. Domain allowed access. Unmount an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Get the attributes of an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Read files on an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Read files on an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Mount a NFS filesystem. Domain allowed access. Remount a NFS filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a NFS filesystem. Domain allowed access. Get the attributes of a NFS filesystem. Domain allowed access. Search directories on a NFS filesystem. Domain allowed access. List NFS filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a NFS filesystem. Domain to not audit. Mounton a NFS filesystem. Domain allowed access. Read files on a NFS filesystem. Domain allowed access. Do not audit attempts to read files on a NFS filesystem. Domain to not audit. Read files on a NFS filesystem. Domain allowed access. Execute files on a NFS filesystem. Domain allowed access. Make general progams in nfs an entrypoint for the specified domain. The domain for which nfs_t is an entrypoint. Append files on a NFS filesystem. Domain allowed access. dontaudit Append files on a NFS filesystem. Domain allowed access. Read inherited files on a NFS filesystem. Domain to not audit. Read/write inherited files on a NFS filesystem. Domain allowed access. Do not audit attempts to read or write files on a NFS filesystem. Domain to not audit. Read symbolic links on a NFS filesystem. Domain allowed access. Dontaudit read symbolic links on a NFS filesystem. Domain allowed access. Read named sockets on a NFS filesystem. Domain allowed access. Read named pipes on a NFS network filesystem. Domain allowed access. Read directories of RPC file system pipes. Domain allowed access. Search directories of RPC file system pipes. Domain allowed access. Search removable storage directories. Domain allowed access. Do not audit attempts to list removable storage directories. Domain not to audit. Read removable storage files. Domain allowed access. Do not audit attempts to read removable storage files. Domain not to audit. Do not audit attempts to write removable storage files. Domain not to audit. Read removable storage symbolic links. Domain allowed access. Read and write block nodes on removable filesystems. Domain allowed access. Read directories of RPC file system pipes. Domain allowed access. Read files of RPC file system pipes. Domain allowed access. Read symbolic links of RPC file system pipes. Domain allowed access. Read sockets of RPC file system pipes. Domain allowed access. Read and write sockets of RPC file system pipes. Domain allowed access. Create, read, write, and delete directories on a NFS filesystem. Domain allowed access. Set the attributes of nfs directories. Domain allowed access. Create, read, write, and delete directories on a NFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a NFS filesystem. Domain to not audit. Create, read, write, and delete files on a NFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a NFS filesystem. Domain to not audit. Create, read, write, and delete symbolic links on a NFS network filesystem. Domain allowed access. Create, read, write, and delete named pipes on a NFS filesystem. Domain allowed access. Create, read, write, and delete named sockets on a NFS filesystem. Domain allowed access. Execute a file on a NFS filesystem in the specified domain.

Execute a file on a NFS filesystem in the specified domain. This allows the specified domain to execute any file on a NFS filesystem in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle home directories on NFS filesystems, in particular used by the ssh-agent policy.

Domain allowed access. The type of the new process.
Mount a NFS server pseudo filesystem. Domain allowed access. Mount a NFS server pseudo filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a NFS server pseudo filesystem. Domain allowed access. Get the attributes of a NFS server pseudo filesystem. Domain allowed access. Search NFS server directories. Domain allowed access. List NFS server directories. Domain allowed access. Getattr files on an nfsd filesystem Domain allowed access. read files on an nfsd filesystem Domain allowed access. Read and write NFS server files. Domain allowed access. Allow the type to associate to ramfs filesystems. The type of the object to be associated. Mount a RAM filesystem. Domain allowed access. Remount a RAM filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a RAM filesystem. Domain allowed access. Get the attributes of a RAM filesystem. Domain allowed access. Search directories on a ramfs Domain allowed access. Dontaudit Search directories on a ramfs Domain allowed access. Create, read, write, and delete directories on a ramfs. Domain allowed access. Dontaudit read on a ramfs files. Domain allowed access. Dontaudit read on a ramfs fifo_files. Domain allowed access. Create, read, write, and delete files on a ramfs filesystem. Domain allowed access. Write to named pipe on a ramfs filesystem. Domain allowed access. Do not audit attempts to write to named pipes on a ramfs filesystem. Domain allowed access. Read and write a named pipe on a ramfs filesystem. Domain allowed access. Create, read, write, and delete named pipes on a ramfs filesystem. Domain allowed access. Write to named socket on a ramfs filesystem. Domain allowed access. Create, read, write, and delete named sockets on a ramfs filesystem. Domain allowed access. Mount a ROM filesystem. Domain allowed access. Remount a ROM filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a ROM filesystem. Domain allowed access. Get the attributes of a ROM filesystem. Domain allowed access. Mount a RPC pipe filesystem. Domain allowed access. Remount a RPC pipe filesystem. This allows some mount option to be changed. Domain allowed access. Unmount a RPC pipe filesystem. Domain allowed access. Get the attributes of a RPC pipe filesystem. Domain allowed access. Read and write RPC pipe filesystem named pipes. Domain allowed access. Mount a tmpfs filesystem. Domain allowed access. Remount a tmpfs filesystem. Domain allowed access. Unmount a tmpfs filesystem. Domain allowed access. Get the attributes of a tmpfs filesystem. Domain allowed access. Allow the type to associate to tmpfs filesystems. The type of the object to be associated. Get the attributes of tmpfs directories. Domain allowed access. Do not audit attempts to get the attributes of tmpfs directories. Domain allowed access. Set the attributes of tmpfs directories. Domain allowed access. Search tmpfs directories. Domain allowed access. List the contents of generic tmpfs directories. Domain allowed access. Do not audit attempts to list the contents of generic tmpfs directories. Domain to not audit. Create, read, write, and delete tmpfs directories Domain allowed access. Create an object in a tmpfs filesystem, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to getattr generic tmpfs files. Domain to not audit. Do not audit attempts to read or write generic tmpfs files. Domain to not audit. Read and write generic tmpfs files. Domain allowed access. Create, read, write, and delete auto moutpoints. Domain allowed access. Read generic tmpfs files. Domain allowed access. Read and write generic tmpfs files. Domain allowed access. Delete generic tmpfs files. Domain allowed access. Read tmpfs link files. Domain allowed access. Read and write character nodes on tmpfs filesystems. Domain allowed access. dontaudit Read and write character nodes on tmpfs filesystems. Domain allowed access. dontaudit Read and write block nodes on tmpfs filesystems. Domain allowed access. Relabel character nodes on tmpfs filesystems. Domain allowed access. Read and write block nodes on tmpfs filesystems. Domain allowed access. Relabel block nodes on tmpfs filesystems. Domain allowed access. Read and write, create and delete generic files on tmpfs filesystems. Domain allowed access. Read and write, create and delete symbolic links on tmpfs filesystems. Domain allowed access. Read and write, create and delete socket files on tmpfs filesystems. Domain allowed access. Read and write, create and delete character nodes on tmpfs filesystems. Domain allowed access. Read and write, create and delete block nodes on tmpfs filesystems. Domain allowed access. Mount a XENFS filesystem. Domain allowed access. Search the XENFS filesystem. Domain allowed access. Create, read, write, and delete directories on a XENFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a XENFS filesystem. Domain to not audit. Create, read, write, and delete files on a XENFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a XENFS filesystem. Domain to not audit. Mount all filesystems. Domain allowed access. Remount all filesystems. This allows some mount options to be changed. Domain allowed access. Unmount all filesystems. Domain allowed access. Get the attributes of all filesystems.

Allow the specified domain to et the attributes of all filesystems. Example attributes:

  • Type of the file system (e.g., ext3)
  • Size of the file system
  • Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes all filesystems. Domain to not audit. Get the quotas of all filesystems. The type of the domain getting quotas. Set the quotas of all filesystems. The type of the domain setting quotas. Relabelfrom all filesystems. Domain allowed access. Get the attributes of all directories with a filesystem type. Domain allowed access. Search all directories with a filesystem type. Domain allowed access. List all directories with a filesystem type. Domain allowed access. Get the attributes of all files with a filesystem type. Domain allowed access. Get the attributes of all symbolic links with a filesystem type. Domain allowed access. Get the attributes of all named pipes with a filesystem type. Domain allowed access. Get the attributes of all named sockets with a filesystem type. Domain allowed access. Get the attributes of all blk files with a filesystem type. Domain allowed access. Get the attributes of all chr files with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all files with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all symbolic links with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all named pipes with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all named sockets with a filesystem type. Domain allowed access. Unconfined access to filesystems Domain allowed access. Relabel all objets from filesystems that do not support extended attributes. Domain allowed access. Do not audit attempts to read or write all leaked filesystems files. Domain allowed access.
Policy for kernel threads, proc filesystem, and unlabeled processes and objects. This module has initial SIDs. Allows to start userland processes by transitioning to the specified domain. The process type entered by kernel. The executable type for the entrypoint. Allows to start userland processes by transitioning to the specified domain, with a range transition. The process type entered by kernel. The executable type for the entrypoint. Range for the domain. Allows the kernel to mount filesystems on the specified directory type. The type of the directory to use as a mountpoint. Set the process group of kernel threads. Domain allowed access. Set the priority of kernel threads. Domain allowed access. Send a SIGCHLD signal to kernel threads. The type of the process sending the signal. Send a kill signal to kernel threads. The type of the process sending the signal. Send a generic signal to kernel threads. The type of the process sending the signal. Send signull to kernel threads. Domain allowed access. Allows the kernel to share state information with the caller. The type of the process with which to share state information. Permits caller to use kernel file descriptors. The type of the process using the descriptors. Do not audit attempts to use kernel file descriptors. The type of process not to audit. Read and write kernel unnamed pipes. Domain allowed access. Read and write kernel unix datagram sockets. Domain allowed access. Send messages to kernel unix datagram sockets. Domain allowed access. Receive messages from kernel TCP sockets. (Deprecated) Domain allowed access. Send UDP network traffic to the kernel. (Deprecated) Domain allowed access. Receive messages from kernel UDP sockets. (Deprecated) Domain allowed access. Allows caller to load kernel modules The process type to allow to load kernel modules. Allow search the kernel key ring. Domain allowed access. dontaudit search the kernel key ring. Domain allowed access. Allow link to the kernel key ring. Domain allowed access. dontaudit link to the kernel key ring. Domain allowed access. Allows caller to read the ring buffer. The process type allowed to read the ring buffer. Do not audit attempts to read the ring buffer. The domain to not audit. Change the level of kernel messages logged to the console. Domain allowed access. Allows the caller to clear the ring buffer. The process type clearing the buffer. Allows caller to request the kernel to load a module

Allow the specified domain to request that the kernel load a kernel module. An example of this is the auto-loading of network drivers when doing an ioctl() on a network interface.

In the specific case of a module loading request on a network interface, the domain will also need the net_admin capability.

Domain allowed access.
Dontaudit caller request the kernel to load a module

Allow the specified domain to request that the kernel load a kernel module. An example of this is the auto-loading of network drivers when doing an ioctl() on a network interface.

In the specific case of a module loading request on a network interface, the domain will also need the net_admin capability.

Domain allowed access.
Get information on all System V IPC objects. Domain allowed access. Get the attributes of a kernel debugging filesystem. Domain allowed access. Mount a kernel debugging filesystem. The type of the domain mounting the filesystem. Unmount a kernel debugging filesystem. The type of the domain unmounting the filesystem. Remount a kernel debugging filesystem. The type of the domain remounting the filesystem. Search the contents of a kernel debugging filesystem. Domain allowed access. Do not audit attempts to search the kernel debugging filesystem. Domain allowed access. Read information from the debugging filesystem. Domain allowed access. Mount a kernel VM filesystem. The type of the domain mounting the filesystem. Unmount the proc filesystem. The type of the domain unmounting the filesystem. Get the attributes of the proc filesystem. Domain allowed access. Search directories in /proc. Domain allowed access. List the contents of directories in /proc. Domain allowed access. Do not audit attempts to list the contents of directories in /proc. Domain to not audit. Get the attributes of files in /proc. Domain allowed access. Read generic symbolic links in /proc.

Allow the specified domain to read (follow) generic symbolic links (symlinks) in the proc filesystem (/proc). This interface does not include access to the targets of these links. An example symlink is /proc/self.

Domain allowed access.
Allows caller to read system state information in /proc.

Allow the specified domain to read general system state information from the proc filesystem (/proc).

Generally it should be safe to allow this access. Some example files that can be read based on this interface:

  • /proc/cpuinfo
  • /proc/meminfo
  • /proc/uptime

This does not allow access to sysctl entries (/proc/sys/*) nor process state information (/proc/pid).

Domain allowed access.
Write to generic proc entries. Domain allowed access. Do not audit attempts by caller to read system state information in proc. The process type not to audit. Allow caller to search virtual memory overcommit sysctls. Domain allowed access. Allow caller to read virtual memory overcommit sysctls. Domain allowed access. Read and write virtual memory overcommit sysctls. Domain allowed access. Allow searching of numa state directory. Domain allowed access. Do not audit attempts to search the numa state directory. Domain to not audit. Allow caller to read the numa state information. Domain allowed access. Allow caller to read the numa state symbolic links. Domain allowed access. Allow caller to write numa state information. Domain allowed access. Do not audit attempts by caller to read system state information in proc. The process type not to audit. Allow caller to read and write state information for AFS. Domain allowed access. Allow caller to read the state information for software raid. The process type reading software raid state. Allow caller to read and set the state information for software raid. The process type reading software raid state. Allows caller to get attribues of core kernel interface. The process type getting the attibutes. Do not audit attempts to get the attributes of core kernel interfaces. The process type to not audit. Allows caller to read the core kernel interface. Domain allowed access. Allow caller to read kernel messages using the /proc/kmsg interface. The process type reading the messages. Allow caller to get the attributes of kernel message interface (/proc/kmsg). The process type getting the attributes. Do not audit attempts by caller to get the attributes of kernel message interfaces. The process type not to audit. Do not audit attempts to search the network state directory. The process type reading the state. Allow searching of network state directory. The process type reading the state. Read the network state information.

Allow the specified domain to read the networking state information. This includes several pieces of networking information, such as network interface names, netfilter (iptables) statistics, protocol information, routes, and remote procedure call (RPC) information.

Domain allowed access.
Allow caller to read the network state symbolic links. The process type reading the state. Allow searching of xen state directory. The process type reading the state. Do not audit attempts to search the xen state directory. The process type reading the state. Allow caller to read the xen state information. The process type reading the state. Allow caller to read the xen state symbolic links. The process type reading the state. Allow caller to write xen state information. The process type writing the state. Allow attempts to list all proc directories. Domain to not audit. Do not audit attempts to list all proc directories. Domain to not audit. Do not audit attempts by caller to search the base directory of sysctls. The process type not to audit. Allow access to read sysctl directories. The process type to allow to read sysctl directories. Allow caller to read the device sysctls. The process type to allow to read the device sysctls. Read and write device sysctls. Domain allowed access. Allow caller to search virtual memory sysctls. Domain allowed access. Allow caller to read virtual memory sysctls. Domain allowed access. Read and write virtual memory sysctls. Domain allowed access. Search network sysctl directories. Domain allowed access. Do not audit attempts by caller to search network sysctl directories. The process type not to audit. Allow caller to read network sysctls. Domain allowed access. Allow caller to modiry contents of sysctl network files. Domain allowed access. Allow caller to read unix domain socket sysctls. Domain allowed access. Read and write unix domain socket sysctls. Domain allowed access. Read the hotplug sysctl. Domain allowed access. Read and write the hotplug sysctl. Domain allowed access. Read the modprobe sysctl. Domain allowed access. Read and write the modprobe sysctl. Domain allowed access. Do not audit attempts to search generic kernel sysctls. Domain to not audit. Read generic crypto sysctls. Domain allowed access. Read general kernel sysctls.

Allow the specified domain to read general kernel sysctl settings. These settings are typically read using the sysctl program. The settings that are included by this interface are prefixed with "kernel.", for example, kernel.sysrq.

This does not include access to the hotplug handler setting (kernel.hotplug) nor the module installer handler setting (kernel.modprobe).

Related interfaces:

  • kernel_rw_kernel_sysctl()
Domain allowed access.
Do not audit attempts to write generic kernel sysctls. Domain to not audit. Read and write generic kernel sysctls. Domain allowed access. Read filesystem sysctls. Domain allowed access. Read and write fileystem sysctls. Domain allowed access. Read IRQ sysctls. Domain allowed access. Read and write IRQ sysctls. Domain allowed access. Read RPC sysctls. Domain allowed access. Read and write RPC sysctls. Domain allowed access. Do not audit attempts to list all sysctl directories. Domain to not audit. Allow caller to read all sysctls. Domain allowed access. Read and write all sysctls. Domain allowed access. Send a kill signal to unlabeled processes. Domain allowed access. Mount a kernel unlabeled filesystem. The type of the domain mounting the filesystem. Unmount a kernel unlabeled filesystem. Domain allowed access. Send general signals to unlabeled processes. Domain allowed access. Send a null signal to unlabeled processes. Domain allowed access. Send a stop signal to unlabeled processes. Domain allowed access. Send a child terminated signal to unlabeled processes. Domain allowed access. List unlabeled directories. Domain allowed access. Read the process state (/proc/pid) of all unlabeled_t. Domain allowed access. Do not audit attempts to list unlabeled directories. Domain allowed access. Read and write unlabeled directories. Domain allowed access. Read and write unlabeled files. Domain allowed access. Do not audit attempts by caller to get the attributes of an unlabeled file. The process type not to audit. Do not audit attempts by caller to read an unlabeled file. Domain to not audit. Do not audit attempts by caller to get the attributes of unlabeled symbolic links. The process type not to audit. Do not audit attempts by caller to get the attributes of unlabeled named pipes. The process type not to audit. Do not audit attempts by caller to get the attributes of unlabeled named sockets. The process type not to audit. Do not audit attempts by caller to get attributes for unlabeled block devices. The process type not to audit. Read and write unlabeled block device nodes. Domain allowed access. Read and write unlabeled sockets. Domain allowed access. Do not audit attempts by caller to get attributes for unlabeled character devices. The process type not to audit. Allow caller to relabel unlabeled directories. Domain allowed access. Allow caller to relabel unlabeled filesystems. Domain allowed access. Allow caller to relabel unlabeled files. Domain allowed access. Allow caller to relabel unlabeled symbolic links. Domain allowed access. Allow caller to relabel unlabeled named pipes. Domain allowed access. Allow caller to relabel unlabeled named sockets. Domain allowed access. Send and receive messages from an unlabeled IPSEC association.

Send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_non_ipsec_sendrecv() should be used instead of this one.

Domain allowed access.
Do not audit attempts to send and receive messages from an unlabeled IPSEC association.

Do not audit attempts to send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_dontaudit_non_ipsec_sendrecv() should be used instead of this one.

Domain to not audit.
Receive TCP packets from an unlabeled connection.

Receive TCP packets from an unlabeled connection.

The corenetwork interface corenet_tcp_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive TCP packets from an unlabeled connection.

Do not audit attempts to receive TCP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Receive UDP packets from an unlabeled connection.

Receive UDP packets from an unlabeled connection.

The corenetwork interface corenet_udp_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive UDP packets from an unlabeled connection.

Do not audit attempts to receive UDP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_udp_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Receive Raw IP packets from an unlabeled connection.

Receive Raw IP packets from an unlabeled connection.

The corenetwork interface corenet_raw_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive Raw IP packets from an unlabeled connection.

Do not audit attempts to receive Raw IP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_raw_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Read/Write Raw IP packets from an unlabeled connection.

Receive Raw IP packets from an unlabeled connection.

The corenetwork interface corenet_raw_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Send and receive unlabeled packets.

Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules.

The corenetwork interface corenet_sendrecv_unlabeled_packets() should be used instead of this one.

Domain allowed access.
Receive packets from an unlabeled peer.

Receive packets from an unlabeled peer, these packets do not have any peer labeling information present.

The corenetwork interface corenet_recvfrom_unlabeled_peer() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive packets from an unlabeled peer.

Do not audit attempts to receive packets from an unlabeled peer, these packets do not have any peer labeling information present.

The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled() should be used instead of this one.

Domain to not audit.
Relabel from unlabeled database objects. Domain allowed access. Relabel to unlabeled context . Domain allowed access. Unconfined access to kernel module resources. Domain allowed access. Allow the specified domain to read/write on the kernel with a unix socket. Domain allowed access. Allow the specified domain to connect to the kernel with a unix socket. Domain allowed access. Make the specified type usable for regular entries in proc Type to be used for /proc entries.
Multicategory security policy Contains attributes used in MCS policy. This domain is allowed to read files and directories regardless of their MCS category set. Domain target for user exemption. This domain is allowed to write files and directories regardless of their MCS category set. Domain target for user exemption. This domain is allowed to sigkill and sigstop all domains regardless of their MCS category set. Domain target for user exemption. This domain is allowed to ptrace all domains regardless of their MCS category set. Domain target for user exemption. Make specified domain MCS trusted for setting any category set for the processes it executes. Domain target for user exemption. Make specified process type MCS untrusted.

Make specified process type MCS untrusted. This prevents this process from sending signals to other processes with different mcs labels object.

The type of the process.
Make specified domain MCS trusted for writing to sockets at any level. Domain allowed access.
Multilevel security policy

This module contains interfaces for handling multilevel security. The interfaces allow the specified subjects and objects to be allowed certain privileges in the MLS rules.

Contains attributes used in MLS policy. Make specified domain MLS trusted for reading from files up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from files at all levels. (Deprecated)

Make specified domain MLS trusted for reading from files at all levels.

This interface has been deprecated, please use mls_file_read_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for reading from files at all levels. Domain allowed access. Make specified domain MLS trusted for write to files up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to files at all levels. (Deprecated)

Make specified domain MLS trusted for writing to files at all levels.

This interface has been deprecated, please use mls_file_write_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for writing to files at all levels. Domain allowed access. Make specified domain MLS trusted for raising the level of files. Domain allowed access. Make specified domain MLS trusted for lowering the level of files. Domain allowed access. Make specified domain trusted to be written to within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. Domain allowed access. Make specified domain MLS trusted for reading from sockets at any level. Domain allowed access. Make specified domain MLS trusted for reading from sockets at any level that is dominated by the process clearance. Domain allowed access. Make specified domain MLS trusted for writing to sockets up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to sockets at any level. Domain allowed access. Make specified domain MLS trusted for receiving network data from network interfaces or hosts at any level. Domain allowed access. Make specified domain trusted to write to network objects within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. Domain allowed access. Make specified domain trusted to write inbound packets regardless of the network's or node's MLS range. Domain allowed access. Make specified domain trusted to write outbound packets regardless of the network's or node's MLS range. Domain allowed access. Make specified domain MLS trusted for reading from System V IPC objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from System V IPC objects at any level. Domain allowed access. Make specified domain MLS trusted for writing to System V IPC objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to System V IPC objects at any level. Domain allowed access. Allow the specified domain to do a MLS range transition that changes the current level. Domain allowed access. Make specified domain a target domain for MLS range transitions that change the current level. Domain allowed access. Make specified domain MLS trusted for reading from processes up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from processes at all levels. (Deprecated)

Make specified domain MLS trusted for reading from processes at all levels.

This interface has been deprecated, please use mls_process_read_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for reading from processes at all levels. Domain allowed access. Make specified domain MLS trusted for writing to processes up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to processes at all levels. (Deprecated)

Make specified domain MLS trusted for writing to processes at all levels.

This interface has been deprecated, please use mls_process_write_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for writing to processes at all levels. Domain allowed access. Make specified domain MLS trusted for setting the level of processes it executes. Domain allowed access. Make specified domain MLS trusted for reading from X objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from X objects at any level. Domain allowed access. Make specified domain MLS trusted for write to X objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to X objects at any level. Domain allowed access. Make specified domain MLS trusted for reading from X colormaps at any level. Domain allowed access. Make specified domain MLS trusted for writing to X colormaps at any level. Domain allowed access. Make specified object MLS trusted.

Make specified object MLS trusted. This allows all levels to read and write the object.

This currently only applies to filesystem objects, for example, files and directories.

The type of the object.
Make the specified domain trusted to inherit and use file descriptors from all levels. Domain allowed access. Make the file descriptors from the specifed domain inheritable by all levels. Domain allowed access. Make specified domain MLS trusted for translating contexts at all levels. Domain allowed access. Make specified domain MLS trusted for reading from databases at any level. Domain allowed access. Make specified domain MLS trusted for writing to databases at any level. Domain allowed access. Make specified domain MLS trusted for raising the level of databases. Domain allowed access. Make specified domain MLS trusted for lowering the level of databases. Domain allowed access. Make specified domain MLS trusted for sending dbus messages to all levels. Domain allowed access. Make specified domain MLS trusted for receiving dbus messages from all levels. Domain allowed access.
Policy for kernel security interface, in particular, selinuxfs. Contains the policy for the kernel SELinux security interface. Make the specified type used for labeling SELinux Booleans. This interface is only usable in the base module.

Make the specified type used for labeling SELinux Booleans.

This makes use of genfscon statements, which are only available in the base module. Thus any module which calls this interface must be included in the base module.

Type used for labeling a Boolean. Name of the Boolean.
Get the mountpoint of the selinuxfs filesystem. Domain allowed access. Do not audit attempts to get the mountpoint of the selinuxfs filesystem. Domain to not audit. Get the attributes of the selinuxfs filesystem Domain allowed access. Do not audit attempts to get the attributes of the selinuxfs filesystem Domain to not audit. Do not audit attempts to get the attributes of the selinuxfs directory. Domain to not audit. Search selinuxfs. Domain allowed access. Do not audit attempts to search selinuxfs. Domain to not audit. Do not audit attempts to read generic selinuxfs entries Domain to not audit. Allows the caller to get the mode of policy enforcement (enforcing or permissive mode). The process type to allow to get the enforcing mode. Allow caller to set the mode of policy enforcement (enforcing or permissive mode).

Allow caller to set the mode of policy enforcement (enforcing or permissive mode).

Since this is a security event, this action is always audited.

The process type to allow to set the enforcement mode.
Allow caller to load the policy into the kernel. The process type that will load the policy. Allow caller to read the policy from the kernel. Domain allowed access. Allow caller to set the state of Booleans to enable or disable conditional portions of the policy. (Deprecated)

Allow caller to set the state of Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

This interface has been deprecated. Please use selinux_set_generic_booleans() or selinux_set_all_booleans() instead.

The process type allowed to set the Boolean.
Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy.

Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

The process type allowed to set the Boolean.
Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy.

Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

The process type allowed to set the Boolean.
Allow caller to set SELinux access vector cache parameters.

Allow caller to set SELinux access vector cache parameters. The allows the domain to set performance related parameters of the AVC, such as cache threshold.

Since this is a security event, this action is always audited.

The process type to allow to set security parameters.
Allows caller to validate security contexts. The process type permitted to validate contexts. Do not audit attempts to validate security contexts. Domain to not audit. Allows caller to compute an access vector. The process type allowed to compute an access vector. Calculate the default type for object creation. Domain allowed access. Allows caller to compute polyinstatntiated directory members. Domain allowed access. Calculate the context for relabeling objects.

Calculate the context for relabeling objects. This is determined by using the type_change rules in the policy, and is generally used for determining the context for relabeling a terminal when a user logs in.

Domain allowed access.
Allows caller to compute possible contexts for a user. The process type allowed to compute user contexts. Unconfined access to the SELinux kernel security server. Domain allowed access. Generate a file context for a boolean type Domain allowed access.
Policy controlling access to storage devices Allow the caller to get the attributes of fixed disk device nodes. The type of the process performing this action. Do not audit attempts made by the caller to get the attributes of fixed disk device nodes. The type of the process to not audit. Allow the caller to set the attributes of fixed disk device nodes. The type of the process performing this action. Do not audit attempts made by the caller to set the attributes of fixed disk device nodes. The type of the process to not audit. Allow the caller to directly read from a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Do not audit attempts made by the caller to read fixed disk device nodes. The type of the process to not audit. Allow the caller to directly write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Do not audit attempts made by the caller to write fixed disk device nodes. Domain to not audit. Allow the caller to directly read and write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Allow the caller to create fixed disk device nodes. Domain allowed access. Allow the caller to create fixed disk device nodes. Domain allowed access. Create, read, write, and delete fixed disk device nodes. The type of the process performing this action. Create block devices in /dev with the fixed disk type via an automatic type transition. The type of the process performing this action. Create block devices in on a tmpfs filesystem with the fixed disk type via an automatic type transition. The type of the process performing this action. Relabel fixed disk device nodes. The type of the process performing this action. Enable a fixed disk device as swap space The type of the process performing this action. Allow the caller to get the attributes of device nodes of fuse devices. The type of the process performing this action. read or write fuse device interfaces. Domain to not audit. Do not audit attempts to read or write fuse device interfaces. Domain to not audit. Allow the caller to get the attributes of the generic SCSI interface device nodes. The type of the process performing this action. Allow the caller to set the attributes of the generic SCSI interface device nodes. The type of the process performing this action. Allow the caller to directly read, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Allow the caller to directly write, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Set attributes of the device nodes for the SCSI generic inerface. The type of the process performing this action. Do not audit attempts to read or write SCSI generic device interfaces. Domain to not audit. Allow the caller to get the attributes of removable devices device nodes. The type of the process performing this action. Do not audit attempts made by the caller to get the attributes of removable devices device nodes. The type of the process to not audit. Do not audit attempts made by the caller to read removable devices device nodes. The type of the process to not audit. Do not audit attempts made by the caller to write removable devices device nodes. The type of the process to not audit. Allow the caller to set the attributes of removable devices device nodes. The type of the process performing this action. Do not audit attempts made by the caller to set the attributes of removable devices device nodes. The type of the process to not audit. Allow the caller to directly read from a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Do not audit attempts to directly read removable devices. Domain to not audit. Allow the caller to directly write to a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. The type of the process performing this action. Do not audit attempts to directly write removable devices. Domain to not audit. Allow the caller to directly read a tape device. The type of the process performing this action. Allow the caller to directly read a tape device. The type of the process performing this action. Allow the caller to get the attributes of device nodes of tape devices. The type of the process performing this action. Allow the caller to set the attributes of device nodes of tape devices. The type of the process performing this action. Unconfined access to storage devices. Domain allowed access. Policy for terminals. Depended on by other required modules. Transform specified type into a pty type. An object type that will applied to a pty. Transform specified type into an user pty type. This allows it to be relabeled via type change by login programs such as ssh. The type of the user domain associated with this pty. An object type that will applied to a pty. Transform specified type into a pty type used by login programs, such as sshd. An object type that will applied to a pty. Transform specified type into a tty type. An object type that will applied to a tty. Transform specified type into a user tty type. User domain that is related to this tty. An object type that will applied to a tty. Create a pty in the /dev/pts directory. The type of the process creating the pty. The type of the pty. Write the console, all ttys and all ptys. Domain allowed access. Read and write the console, all ttys and all ptys. Domain allowed access. Write to the console. Domain allowed access. Read from the console. Domain allowed access. Do not audit attempts to read from the console. Domain allowed access. Read from and write to the console. Domain allowed access. Do not audit attemtps to read from or write to the console. Domain allowed access. Set the attributes of the console device node. Domain allowed access. Relabel from and to the console type. Domain allowed access. Relabel from and to the console type. Domain allowed access. Create the console device (/dev/console). Domain allowed access. Get the attributes of a pty filesystem Domain allowed access. Do not audit attempts to get the attributes of the /dev/pts directory. The type of the process to not audit. Search the contents of the /dev/pts directory. Domain allowed access. Do not audit attempts to search the contents of the /dev/pts directory. Domain allowed access. Read the /dev/pts directory to list all ptys. Domain allowed access. Do not audit attempts to read the /dev/pts directory. The type of the process to not audit. Do not audit attempts to create, read, write, or delete the /dev/pts directory. The type of the process to not audit. Do not audit attempts to get the attributes of generic pty devices. The type of the process to not audit. ioctl of generic pty devices. Domain allowed access. Allow setting the attributes of generic pty devices. Domain allowed access. Dontaudit setting the attributes of generic pty devices. Domain allowed access. Read and write the generic pty type. This is generally only used in the targeted policy. Domain allowed access. Dot not audit attempts to read and write the generic pty type. This is generally only used in the targeted policy. The type of the process to not audit. Set the attributes of the tty device Domain allowed access. Read and write the controlling terminal (/dev/tty). Domain allowed access. Read and write the pty multiplexor (/dev/ptmx). The type of the process to allow access. Do not audit attempts to get attributes on the pty multiplexor (/dev/ptmx). The type of the process to not audit. Do not audit attempts to read and write the pty multiplexor (/dev/ptmx). The type of the process to not audit. Get the attributes of all pty device nodes. Domain allowed access. Do not audit attempts to get the attributes of any pty device nodes. Domain allowed access. Set the attributes of all pty device nodes. Domain allowed access. Relabel to all ptys. Domain allowed access. Write to all ptys. Domain allowed access. Read and write all ptys. Domain allowed access. Do not audit attempts to read or write any ptys. Domain to not audit. Relabel from and to all pty device nodes. Domain allowed access. Get the attributes of all user pty device nodes. (Deprecated) Domain allowed access. Do not audit attempts to get the attributes of any user pty device nodes. (Deprecated) Domain allowed access. Set the attributes of all user pty device nodes. (Deprecated) Domain allowed access. Relabel to all user ptys. (Deprecated) Domain allowed access. Write to all user ptys. (Deprecated) Domain allowed access. Read and write all user ptys. (Deprecated) Domain allowed access. Do not audit attempts to read any user ptys. (Deprecated) The type of the process to not audit. Relabel from and to all user user pty device nodes. (Deprecated) Domain allowed access. Get the attributes of all unallocated tty device nodes. Domain allowed access. Do not audit attempts to get the attributes of all unallocated tty device nodes. Domain allowed access. Set the attributes of all unallocated tty device nodes. Domain allowed access. Do not audit attempts to set the attributes of unallocated tty device nodes. Domain allowed access. Do not audit attempts to ioctl unallocated tty device nodes. Domain allowed access. Relabel from and to the unallocated tty type. Domain allowed access. Relabel from all user tty types to the unallocated tty type. Domain allowed access. Append to unallocated ttys. Domain allowed access. Write to unallocated ttys. Domain allowed access. Read and write unallocated ttys. Domain allowed access. Do not audit attempts to read or write unallocated ttys. The type of the process to not audit. Get the attributes of all tty device nodes. Domain allowed access. Do not audit attempts to get the attributes of any tty device nodes. Domain allowed access. Set the attributes of all tty device nodes. Domain allowed access. Relabel from and to all tty device nodes. Domain allowed access. Write to all ttys. Domain allowed access. Read and write all ttys. Domain allowed access. Do not audit attempts to read or write any ttys. Domain allowed access. Get the attributes of all user tty device nodes. (Deprecated) Domain allowed access. Do not audit attempts to get the attributes of any user tty device nodes. (Deprecated) Domain allowed access. Set the attributes of all user tty device nodes. (Deprecated) Domain allowed access. Relabel from and to all user user tty device nodes. (Deprecated) Domain allowed access. Write to all user ttys. (Deprecated) Domain allowed access. Read and write all user to all user ttys. (Deprecated) Domain allowed access. Do not audit attempts to read or write any user ttys. (Deprecated) Domain allowed access. Getattr on the virtio console. Domain allowed access. Read from and write to the virtio console. Domain allowed access. User-based access control policy Contains attributes used in UBAC policy. Constrain by user-based access control (UBAC).

Constrain the specified type by user-based access control (UBAC). Typically, these are user processes or user files that need to be differentiated by SELinux user. Normally this does not include administrative or privileged programs. For the UBAC rules to be enforced, both the subject (source) type and the object (target) types must be UBAC constrained.

Type to be constrained by UBAC.
Exempt user-based access control for files. Domain to be exempted. Exempt user-based access control for processes. Domain to be exempted. Exempt user-based access control for file descriptors. Domain to be exempted. Exempt user-based access control for sockets. Domain to be exempted. Exempt user-based access control for SysV IPC. Domain to be exempted. Exempt user-based access control for X Windows. Domain to be exempted. Exempt user-based access control for dbus. Domain to be exempted. Exempt user-based access control for keys. Domain to be exempted. Exempt user-based access control for databases. Domain to be exempted.
Policy for allowing confined domains to use unlabeled_t packets
Policy modules for user roles. Audit administrator role Change to the audit administrator role. Role allowed access. Change from the audit administrator role.

Change from the audit administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Database administrator role Change to the database administrator role. Role allowed access. Change from the database administrator role.

Change from the web administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Least privledge terminal user Change to the guest role. Role allowed access. Change from the guest role.

Change from the guest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Log administrator role Change to the log administrator role. Role allowed access. Change from the log administrator role.

Change from the log administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Security administrator role Change to the security administrator role. Role allowed access. Change from the security administrator role.

Change from the security administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Administrator's unprivileged user Change to the staff role. Role allowed access. Change from the staff role.

Change from the staff role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
General system administration role Change to the system administrator role. Role allowed access. Change from the system administrator role.

Change from the system administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Execute a shell in the sysadm domain. Domain allowed access. Execute a generic bin program in the sysadm domain. Domain allowed access. Execute all entrypoint files in the sysadm domain. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain allowed access.
Allow sysadm to execute a generic bin program in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute a generic bin program in a specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in.
Send a SIGCHLD signal to sysadm users. Domain allowed access. Inherit and use sysadm file descriptors Domain allowed access. Read and write sysadm user unnamed pipes. Domain allowed access.

Allow sysadm to debug or ptrace all processes.

No Interfaces Unconfiend user role Change from the unconfineduser role.

Change from the unconfineduser role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Transition to the unconfined domain. Domain allowed access. Execute specified programs in the unconfined domain. The type of the process performing this action. The role to allow the unconfined domain. Transition to the unconfined domain by executing a shell. Domain allowed access. Allow unconfined to execute the specified program in the specified domain.

Allow unconfined to execute the specified program in the specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Inherit file descriptors from the unconfined domain. Domain allowed access. Send a SIGCHLD signal to the unconfined domain. Domain allowed access. Send a SIGNULL signal to the unconfined domain. Domain allowed access. Send a SIGNULL signal to the unconfined execmem domain. Domain allowed access. Send a signal to the unconfined execmem domain. Domain allowed access. Send generic signals to the unconfined domain. Domain allowed access. Read unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read unconfined domain unnamed pipes. Domain allowed access. Read and write unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read and write unconfined domain unnamed pipes. Domain to not audit. Do not audit attempts to read and write unconfined domain netlink_route_socket. Domain to not audit. Do not audit attempts to read and write unconfined domain stream. Domain to not audit. Allow attempts to read and write unconfined domain stream. Domain to not audit. Connect to the unconfined domain using a unix domain stream socket. Domain allowed access. Do not audit attempts to read or write unconfined domain tcp sockets.

Do not audit attempts to read or write unconfined domain tcp sockets.

This interface was added due to a broken symptom in ldconfig.

Domain to not audit.
Do not audit attempts to read or write unconfined domain packet sockets.

Do not audit attempts to read or write unconfined domain packet sockets.

This interface was added due to a broken symptom.

Domain to not audit.
Create keys for the unconfined domain. Domain allowed access. Send messages to the unconfined domain over dbus. Domain allowed access. Send and receive messages from unconfined_t over dbus. Domain allowed access. Connect to the the unconfined DBUS for service (acquire_svc). Domain allowed access. Connect to the the unconfined DBUS Domain allowed access. Allow ptrace of unconfined domain Domain allowed access. Read and write to unconfined shared memory. The type of the process performing this action. Read and write to unconfined execmem shared memory. The type of the process performing this action. Transition to the unconfined_execmem domain. Domain allowed access. execute the execmem applications Domain allowed access. Allow apps to set rlimits on userdomain Domain allowed access. Get the process group of unconfined. Domain allowed access. Change to the unconfined role. Role allowed access. Allow domain to attach to TUN devices created by unconfined_t users. Domain allowed access.

Transition to confined nsplugin domains from unconfined user

Allow a user to login as an unconfined domain

Ignore unconfined mmap_zero errors

Allow unconfined users to transition to the Mozilla plugin domain when running xulrunner plugin-container.

Generic unprivileged user Change to the generic user role. Role allowed access. Change from the generic user role.

Change from the generic user role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Web administrator role Change to the web administrator role. Role allowed access. Change from the web administrator role.

Change from the web administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow webadm to manage files in users home directories

Allow webadm to read files in users home directories

Least priviledged X user Change to the xguest role. Role allowed access. Change from the xguest role.

Change from the xguest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow xguest users to mount removable media

Allow xguest to configure Network Manager and connect to apache ports

Allow xguest to use blue tooth devices

Policy modules for system services, like cron, and network services, like sshd. ABRT - automated bug-reporting tool Execute abrt in the abrt domain. Domain allowed to transition. Execute abrt in the caller domain. Domain allowed access. Send a null signal to abrt. Domain allowed access. Allow the domain to read abrt state files in /proc. Domain allowed access. Connect to abrt over an unix stream socket. Domain allowed access. Send and receive messages from abrt over dbus. Domain allowed access. Execute abrt-helper in the abrt-helper domain. Domain allowed to transition. Execute abrt helper in the abrt_helper domain, and allow the specified role the abrt_helper domain. Domain allowed to transition. Role allowed access. Read abrt cache Domain allowed access. Append abrt cache Domain allowed access. Manage abrt cache Domain allowed access. Read abrt configuration file. Domain allowed access. Read abrt logs. Domain allowed access. Read abrt PID files. Domain allowed access. Create, read, write, and delete abrt PID files. Domain allowed access. Read and write abrt fifo files. Domain allowed access. All of the rules required to administrate an abrt environment Domain allowed access. The role to be allowed to manage the abrt domain. Execute abrt-retrace in the abrt-retrace domain. Domain allowed to transition. Manage abrt retrace server cache Domain allowed access. Read abrt retrace server cache Domain allowed access. Read abrt retrace server cache Domain allowed access.

Allow ABRT to modify public files used for public file transfer services.

Allow ABRT to run in abrt_handle_event_t domain to handle ABRT event scripts

Andrew Filesystem server Execute a domain transition to run the afs client. Domain allowed to transition. Read and write afs client UDP sockets. Domain allowed access. read/write afs cache files Domain allowed to transition. Execute afs server in the afs domain. The type of the process performing this action. All of the rules required to administrate an afs environment Domain allowed access. The role to be allowed to manage the afs domain. Automatic IPv6 Connectivity Client Utility. Execute a domain transition to run aiccu. Domain allowed to transition. Execute aiccu server in the aiccu domain. Domain allowed to transition. Read aiccu PID files. Domain allowed access. Manage aiccu PID files. Domain allowed access. All of the rules required to administrate an aiccu environment Domain allowed access. Role allowed access. Aide filesystem integrity checker Execute aide in the aide domain Domain allowed access. Execute aide programs in the AIDE domain. Domain allowed access. The role to allow the AIDE domain. All of the rules required to administrate an aide environment Domain allowed access. SELinux policy for Aisexec Cluster Engine Execute a domain transition to run aisexec. Domain allowed to transition. Connect to aisexec over a unix domain stream socket. Domain allowed access. Allow the specified domain to read aisexec's log files. Domain allowed access. All of the rules required to administrate an aisexec environment Domain allowed access. The role to be allowed to manage the aisexecd domain. Daemon that interfaces mail transfer agents and content checkers, such as virus scanners. Execute a domain transition to run amavis. Domain allowed to transition. Execute amavis server in the amavis domain. Domain allowed access. Read amavis spool files. Domain allowed access. Manage amavis spool files. Domain allowed access. Create objects in the amavis spool directories with a private type. Domain allowed access. Private file type. Class of the object being created. Search amavis lib directories. Domain allowed access. Read amavis lib files. Domain allowed access. Create, read, write, and delete amavis lib files. Domain allowed access. Set the attributes of amavis pid files. Domain allowed access. Create of amavis pid files. Domain allowed access. Write of amavis pid files. Domain allowed access. Write of amavis pid files. Domain allowed access. All of the rules required to administrate an amavis environment Domain allowed access. Role allowed access.

Allow amavis to use JIT compiler

SELinux policy for antivirus programs - amavis, clamd, freshclam and clamscan Creates types and rules for a basic antivirus domain. Domain type. Execute a domain transition to run antivirus program. Domain allowed to transition. Execute antivirus program without a transition. Domain allowed access. Connect to run antivirus program. Domain allowed access. Allow the specified domain to append to antivirus log files. Domain allowed access. Read antivirus configuration files. Domain allowed access. Search antivirus db content directories. Domain allowed access. Read antivirus db content directories. Domain allowed access. Read and write antivirus db content directories. Domain allowed access. Manage antivirus db content directories. Domain allowed access. Manage antivirus pid content. Domain allowed access. Read antivirus state files. Domain allowed access. All of the rules required to administrate an antivirus programs environment Domain allowed access. The role to be allowed to manage the clamav domain.

Allow antivirus programs to read non security files on a system

Determine whether can antivirus programs use JIT compiler.

Apache web server Role access for apache Role allowed access User domain for the role Read httpd user scripts executables. Domain allowed access. Read user web content. Domain allowed access. Read user web content. Domain allowed access. Transition to apache. Domain allowed access. Allow the specified domain to execute apache in the caller domain. Domain allowed access. Send a generic signal to apache. Domain allowed access. Send a null signal to apache. Domain allowed access. Send a SIGCHLD signal to apache. Domain allowed access. Inherit and use file descriptors from Apache. Domain allowed access. Do not audit attempts to read and write Apache unnamed pipes. Domain allowed access. Do not audit attempts to read and write Apache unix domain stream sockets. Domain allowed access. Do not audit attempts to read and write Apache TCP sockets. Domain allowed access. Create, read, write, and delete all web content. Domain allowed access. Allow domain to set the attributes of the APACHE cache directory. Domain allowed access. Allow the specified domain to list Apache cache. Domain allowed access. Allow the specified domain to read and write Apache cache files. Domain allowed access. Allow the specified domain to delete Apache cache dirs. Domain allowed access. Allow the specified domain to delete Apache cache. Domain allowed access. Allow the specified domain to search apache configuration dirs. Domain allowed access. Allow the specified domain to read apache configuration files. Domain allowed access. Allow the specified domain to manage apache configuration files. Domain allowed access. Execute the Apache helper program with a domain transition. Domain allowed access. Execute the Apache helper program with a domain transition, and allow the specified role the Apache helper domain. Domain allowed access. Role allowed access. dontaudit attempts to read apache log files. Domain allowed access. Allow the specified domain to read apache log files. Domain allowed access. Allow the specified domain to append to apache log files. Domain allowed access. Do not audit attempts to append to the Apache logs. Domain to not audit. Allow the specified domain to write to apache log files. Domain allowed access. Allow the specified domain to manage to apache log files. Domain allowed access. Do not audit attempts to search Apache module directories. Domain to not audit. Allow the specified domain to list the contents of the apache modules directory. Domain allowed access. Allow the specified domain to read the apache modules files. directory. Domain allowed access. Allow the specified domain to execute apache modules. Domain allowed access. Execute a domain transition to run httpd_rotatelogs. Domain allowed access. Execute httpd_rotatelogs in the caller domain. Domain allowed to transition. Execute httpd system scripts in the caller domain. Domain allowed to transition. Allow the specified domain to list apache system content files. Domain allowed access. Allow the specified domain to manage apache system content files. Domain allowed access. Allow the specified domain to manage apache system content rw files. Domain allowed access. Allow the specified domain to delete apache system content rw files. Domain allowed access. Execute all web scripts in the system script domain. Domain allowed access. Do not audit attempts to read and write Apache system script unix domain stream sockets. Domain allowed access. Execute all user scripts in the user script domain. Domain allowed access. Execute all user scripts in the user script domain. Add user script domains to the specified role. Domain allowed access. The role to be allowed the script domains. Allow the specified domain to read apache squirrelmail data. Domain allowed access. Allow the specified domain to append apache squirrelmail data. Domain allowed access. Search apache system content. Domain allowed access. Getattr apache system content. Domain to not audit. Read apache system content. Domain to not audit. Search apache system CGI directories. Domain allowed access. Create, read, write, and delete all user web content. Domain allowed access. Search system script state directory. Domain to not audit. Allow the specified domain to read apache tmp files. Domain allowed access. Dontaudit attempts to read and write apache tmp files. Domain allowed access. Dontaudit attempts to write apache tmp files. Domain allowed access. Execute CGI in the specified domain.

Execute CGI in the specified domain.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Domain run the cgi script in. Type of the executable to enter the cgi domain.
All of the rules required to administrate an apache environment Domain allowed access. Role allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. Allow getattr of suexec The type of the process performing this action. Read and write of httpd unix stream socket. Domain allowed access. Allow any httpd_exec_t to be an entrypoint of this domain Domain allowed access.

Allow Apache to modify public files used for public file transfer services. Directories/Files must be labeled public_rw_content_t.

Allow Apache to use mod_auth_pam

Allow httpd scripts and modules execmem/execstack

Allow httpd processes to manage IPA content

Allow httpd to use built in scripting (usually php)

Allow HTTPD scripts and modules to connect to the network using TCP.

Allow HTTPD scripts and modules to connect to cobbler over the network.

Allow HTTPD scripts and modules to server cobbler files.

Allow HTTPD scripts and modules to connect to databases over the network.

Allow httpd to connect to memcache server

Allow httpd to act as a relay

Allow http daemon to send mail

Allow http daemon to check spam

Allow Apache to communicate with avahi service via dbus

Allow Apache to communicate with sssd service via dbus

Allow httpd cgi support

Allow httpd to act as a FTP server by listening on the ftp port.

Allow httpd to read home directories

Allow httpd to read user content

Allow httpd daemon to change system limits

Allow HTTPD to run SSI executables in the same domain as system CGI scripts.

Allow Apache to execute tmp content.

Unify HTTPD to communicate with the terminal. Needed for entering the passphrase for certificates at the terminal.

Unify HTTPD handling of all content files.

Allow httpd to access openstack ports

Allow httpd to access cifs file systems

Allow httpd to access FUSE file systems

Allow httpd to run gpg in gpg-web domain

Allow httpd to access nfs file systems

Allow apache scripts to write to public content. Directories/Files must be labeled public_rw_content_t.

Allow Apache to run in stickshift mode, not transition to passenger

Allow Apache to run preupgrade

Allow Apache to query NS records

Allow Apache to use mod_auth_ntlm_winbind

APC UPS monitoring daemon Execute a domain transition to run apcupsd. Domain allowed to transition. Execute apcupsd server in the apcupsd domain. Domain allowed access. Read apcupsd PID files. Domain allowed access. Allow the specified domain to read apcupsd's log files. Domain allowed access. Allow the specified domain to append apcupsd log files. Domain allowed to transition. Execute a domain transition to run httpd_apcupsd_cgi_script. Domain allowed to transition. All of the rules required to administrate an apcupsd environment Domain allowed access. The role to be allowed to manage the apcupsd domain. Advanced power management daemon Execute APM in the apm domain. Domain allowed access. Use file descriptors for apmd. The type of the process performing this action. Write to apmd unnamed pipes. The type of the process performing this action. Read and write to an apm unix stream socket. Domain allowed access. Append to apm's log file. Domain allowed access. Connect to apmd over an unix stream socket. Domain allowed access. Ethernet activity monitor. Execute arpwatch server in the arpwatch domain. Domain allowed access. Search arpwatch's data file directories. Domain allowed access. Create arpwatch data files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Do not audit attempts to read and write arpwatch packet sockets. Domain to not audit. All of the rules required to administrate an arpwatch environment Domain allowed access. The role to be allowed to manage the arpwatch domain. Asterisk IP telephony server Execute asterisk in the asterisk domain. The type of the process performing this action. Connect to asterisk over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an asterisk environment Domain allowed access. The role to be allowed to manage the asterisk domain. Generate entropy from audio input Filesystem automounter service. Execute automount in the automount domain. Domain allowed access. Send automount a signal The type of the process performing this action. Execute automount in the caller domain. Domain allowed access. Allow the domain to read state files in /proc. Domain to allow access. Do not audit attempts to file descriptors for automount. Domain to not audit. Do not audit attempts to write automount daemon unnamed pipes. Domain allowed access. Allow domain to search of automount temporary directories. Domain to not audit. Do not audit attempts to get the attributes of automount temporary directories. Domain to not audit. All of the rules required to administrate an automount environment Domain allowed access. The role to be allowed to manage the automount domain. mDNS/DNS-SD daemon implementing Apple ZeroConf architecture Execute avahi server in the avahi domain. The type of the process performing this action. Send avahi a signal The type of the process performing this action. Send avahi a kill signal. Domain allowed access. Send avahi a signull Domain allowed access. Send and receive messages from avahi over dbus. Domain allowed access. Connect to avahi using a unix domain stream socket. Domain allowed access. Do not audit attempts to search the avahi pid directory. Domain allowed access. All of the rules required to administrate an avahi environment Domain allowed access. The role to be allowed to manage the avahi domain. Cross platform network backup. Execute bacula admin bacula admin domain. Domain allowed to transition. Execute user interfaces in the bacula admin domain, and allow the specified role the bacula admin domain. Domain allowed to transition. Role allowed access. Allow the domain to read bacula store data.. Domain allowed access. All of the rules required to administrate an bacula environment. Domain allowed access. Role allowed access.

Allow bacula to manage nfs files

Allow bacula to manage cifs files

bcfg2-server daemon which serves configurations to clients based on the data in its repository Execute bcfg2 in the bcfg2 domain.. Domain allowed to transition. Execute bcfg2 server in the bcfg2 domain. Domain allowed access. Search bcfg2 lib directories. Domain allowed access. Read bcfg2 lib files. Domain allowed access. Manage bcfg2 lib files. Domain allowed access. Manage bcfg2 lib directories. Domain allowed access. All of the rules required to administrate an bcfg2 environment Domain allowed access. Role allowed access. Berkeley internet name domain DNS server. Execute bind server in the bind domain. Domain allowed access. Execute ndc in the ndc domain. Domain allowed access. Send generic signals to BIND. Domain allowed access. Send null sigals to BIND. Domain allowed access. Send BIND the kill signal Domain allowed access. Execute ndc in the ndc domain, and allow the specified role the ndc domain. Domain allowed access. The role to be allowed the bind domain. Execute bind in the named domain. Domain allowed access. Read DNSSEC keys. Domain allowed access. Read BIND named configuration files. Domain allowed access. Write BIND named configuration files. Domain allowed access. Create, read, write, and delete BIND configuration directories. Domain allowed access. Search the BIND cache directory. Domain allowed access. Create, read, write, and delete BIND cache files. Domain allowed access. Set the attributes of the BIND pid directory. Domain allowed access. Read BIND log files. Domain allowed access. Set the attributes of the BIND zone directory. Domain allowed access. Read BIND zone files. Domain allowed access. Manage BIND zone files. Domain allowed access. Send and receive datagrams to and from named. (Deprecated) Domain allowed access. All of the rules required to administrate an bind environment Domain allowed access. The role to be allowed to manage the bind domain.

Allow BIND to bind apache port.

Allow BIND to write the master zone files. Generally this is used for dynamic DNS or zone transfers.

Bitlbee service Read bitlbee configuration files Domain allowed accesss. All of the rules required to administrate an bitlbee environment Domain allowed access. The role to be allowed to manage the bitlbee domain. Bluetooth tools and system services. Role access for bluetooth Role allowed access User domain for the role Connect to bluetooth over a unix domain stream socket. Domain allowed access. Execute bluetooth in the bluetooth domain. The type of the process performing this action. Read bluetooth daemon configuration. Domain allowed access. Send and receive messages from bluetooth over dbus. Domain allowed access. dontaudit Send and receive messages from bluetooth over dbus. Domain allowed access. Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) The type of the process performing this action. Execute bluetooth_helper in the bluetooth_helper domain, and allow the specified role the bluetooth_helper domain. (Deprecated) The type of the process performing this action. The role to be allowed the bluetooth_helper domain. The type of the terminal allow the bluetooth_helper domain to use. Read bluetooth helper state files. Domain allowed access. All of the rules required to administrate an bluetooth environment Domain allowed access. The role to be allowed to manage the bluetooth domain. policy for boinc Execute a domain transition to run boinc. Domain allowed to transition. Execute boinc server in the boinc domain. The type of the process performing this action. Search boinc lib directories. Domain allowed access. Read boinc lib files. Domain allowed access. Create, read, write, and delete boinc lib files. Domain allowed access. Manage boinc var_lib files. Domain allowed access. All of the rules required to administrate an boinc environment. Domain allowed access. Role allowed access. Bugzilla server Allow the specified domain to search bugzilla directories. Domain allowed access. Do not audit attempts to read and write bugzilla script unix domain stream sockets. Domain allowed access. policy for cachefilesd Execute a domain transition to run cachefilesd. Domain allowed to transition. Canna - kana-kanji conversion server Connect to Canna using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an canna environment Domain allowed access. The role to be allowed to manage the canna domain. Cluster Configuration System Execute a domain transition to run ccs. Domain allowed to transition. Connect to ccs over an unix stream socket. Domain allowed access. Read cluster configuration files. Domain allowed access. Manage cluster configuration files. Domain allowed access. Certmaster SSL certificate distribution service Execute a domain transition to run certmaster. Domain allowed to transition. Execute certmaster in the caller domain. Domain allowed access. read certmaster logs. Domain allowed access. Append to certmaster logs. Domain allowed access. Create, read, write, and delete certmaster logs. Domain allowed access. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the syslog domain. Certificate status monitor and PKI enrollment client Execute a domain transition to run certmonger. Domain allowed to transition. Execute certmonger server in the certmonger domain. The type of the process performing this action. Read certmonger PID files. Domain allowed access. Manage certmonger var_run files. Domain allowed access. Search certmonger lib directories. Domain allowed access. Read certmonger lib files. Domain allowed access. Create, read, write, and delete certmonger lib files. Domain allowed access. Manage certmonger var_lib files. Domain allowed access. Dontaudit certmonger leaked files descriptors. Domain allowed access. Send and receive messages from certmonger over dbus. Domain allowed access. All of the rules required to administrate an certmonger environment Domain allowed access. Role allowed access. policy for cfengine Transition to cfengine. Domain allowed to transition. Search cfengine lib files. Domain allowed access. Read cfengine lib files. Domain allowed access. Allow the specified domain to read cfengine's log files. Domain allowed access. Allow the specified domain to append cfengine's log files. Domain allowed access. Dontaudit the specified domain to write cfengine's log files. Domain allowed access. policy for cgdcbxd Execute cgdcbxd in the cgdcbxd domin. Domain allowed to transition. Read cgdcbxd PID files. Domain allowed access. All of the rules required to administrate an cgdcbxd environment Domain allowed access. libcg is a library that abstracts the control group file system in Linux. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. domain. Domain allowed to transition. Connect to CG rules engine daemon over unix stream sockets. Domain allowed access. All of the rules required to administrate an cgroup environment. Domain allowed access. Role allowed access. Chrony NTP background daemon Execute chronyd in the chronyd domain. Domain allowed access. Execute chronyd server in the chronyd domain. Domain allowed access. Execute chronyd Domain allowed access. Read chronyd logs. Domain allowed access. Read and write chronyd shared memory. Domain allowed access. Read chronyd keys files. Domain allowed access. Append chronyd keys files. Domain allowed access. All of the rules required to administrate an chronyd environment Domain allowed access. The role to be allowed to manage the chronyd domain. openstack-cinder Manage cinder lib files. Domain allowed access. Encrypted tunnel daemon ClamAV Virus Scanner Execute a domain transition to run clamd. Domain allowed to transition. Connect to run clamd. Domain allowed to connect. Allow the specified domain to append to clamav log files. Domain allowed access. Read clamav configuration files. Domain allowed access. Search clamav libraries directories. Domain allowed access. Read clamd state files. Domain allowed access. Execute a domain transition to run clamscan. Domain allowed access. Execute clamscan without a transition. Domain allowed access. All of the rules required to administrate an clamav environment Domain allowed access. The role to be allowed to manage the clamav domain.

Allow clamscan to non security files on a system

Allow clamd to use JIT compiler

Clockspeed simple network time protocol client Execute clockspeed utilities in the clockspeed_cli domain. Domain allowed access. Allow the specified role the clockspeed_cli domain. Domain allowed access. The role to be allowed the clockspeed_cli domain. clogd - clustered mirror log server Execute a domain transition to run clogd. Domain allowed to transition. Connect to clogd over a unix domain stream socket. Domain allowed access. Allow read and write access to clogd semaphores. Domain allowed access. Read and write to group shared memory. The type of the process performing this action. cloudform policy Execute mongod in the caller domain. Domain allowed access. policy for cmirrord Execute a domain transition to run cmirrord. Domain allowed to transition. Execute cmirrord server in the cmirrord domain. The type of the process performing this action. Read cmirrord PID files. Domain allowed access. Read and write to cmirrord shared memory. The type of the process performing this action. All of the rules required to administrate an cmirrord environment Domain allowed access. Role allowed access. Cobbler installation server.

Cobbler is a Linux installation server that allows for rapid setup of network installation environments. It glues together and automates many associated Linux tasks so you do not have to hop between lots of various commands and applications when rolling out new systems, and, in some cases, changing existing ones.

Execute a domain transition to run cobblerd. Domain allowed to transition. Execute cobblerd server in the cobblerd domain. Domain allowed to transition. List Cobbler configuration. Domain allowed access. Read Cobbler configuration files. Domain to not audit. Search cobbler dirs in /var/lib Domain allowed access. Read cobbler files in /var/lib Domain allowed access. Manage cobbler files in /var/lib Domain allowed access. Do not audit attempts to read and write Cobbler log files (leaked fd). Domain to not audit. All of the rules required to administrate an cobblerd environment Domain allowed access. Role allowed access.

Allow Cobbler to modify public files used for public file transfer services.

Allow Cobbler to connect to the network using TCP.

Allow Cobbler to access cifs file systems.

Allow Cobbler to access nfs file systems.

Statistics collection daemon for filling RRD files. Transition to collectd. Domain allowed to transition. Execute collectd server in the collectd domain. Domain allowed access. Search collectd lib directories. Domain allowed access. Read collectd lib files. Domain allowed access. Manage collectd lib files. Domain allowed access. Manage collectd lib directories. Domain allowed access. All of the rules required to administrate an collectd environment Domain allowed access. Role allowed access.

Determine whether collectd can connect to the network using TCP.

Comsat, a biff server. policy for condor Transition to condor. Domain allowed to transition. Read condor's log files. Domain allowed access. Append to condor log files. Domain allowed access. Manage condor log files Domain allowed access. Search condor lib directories. Domain allowed access. Read condor lib files. Domain allowed access. Read condor lib files. Domain allowed access. Manage condor lib files. Domain allowed access. Manage condor lib directories. Domain allowed access. Read condor PID files. Domain allowed access. Read and write condor_startd server TCP sockets. Domain allowed access. Read and write condor_schedd server TCP sockets. Domain allowed access. Allows to start userland processes by transitioning to the specified domain, with a range transition. The process type entered by condor_startd. The executable type for the entrypoint. Range for the domain. Allows to start userlandprocesses by transitioning to the specified domain. The process type entered by condor_startd. The executable type for the entrypoint. All of the rules required to administrate an condor environment Domain allowed access.

Allow codnor domain to connect to the network using TCP.

Conman is a program for connecting to remote consoles being managed by conmand Execute conman in the conman domin. Domain allowed to transition. Read conman's log files. Domain allowed access. Append to conman log files. Domain allowed access. Manage conman log files Domain allowed access. Framework for facilitating multiple user sessions on desktops. Execute a domain transition to run consolekit. Domain allowed to transition. Send and receive messages from consolekit over dbus. Domain allowed access. Read consolekit log files. Domain allowed access. Dontaudit attempts to read consolekit log files. Domain to not audit. Manage consolekit log files. Domain allowed access. Read consolekit PID files. Domain allowed access. Dontaudit attempts to connect to consolekit over an unix stream socket. Domain allowed access. SELinux policy for Corosync Cluster Engine Execute a domain transition to run corosync. Domain allowed to transition. Execute a domain transition to run corosync. Domain allowed to transition. Execute corosync in the caller domain. Domain allowed to transition. Connect to corosync over a unix domain stream socket. Domain allowed access. Allow the specified domain to read corosync's log files. Domain allowed access. Allow the specified domain to read/write corosync's tmpfs files. Domain allowed access. All of the rules required to administrate an corosync environment Domain allowed access. The role to be allowed to manage the corosyncd domain. Courier IMAP and POP3 email servers Execute the courier authentication daemon with a domain transition. Domain allowed access. Connect to courier-authdaemon over an unix stream socket. Domain allowed access. Execute the courier POP3 and IMAP server with a domain transition. Domain allowed access. Read courier config files Domain allowed access. Create, read, write, and delete courier spool directories. Domain allowed access. Create, read, write, and delete courier spool files. Domain allowed access. Read courier spool files. Domain allowed access. Read and write to courier spool pipes. Domain to not audit. Services for loading CPU microcode and CPU frequency scaling. CPUcontrol stub interface. No access allowed. Domain allowed access. Periodic execution of scheduled commands. Role access for cron Role allowed access User domain for the role Role access for unconfined cronjobs Role allowed access User domain for the role Role access for cron Role allowed access User domain for the role Make the specified program domain accessable from the system cron jobs. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Execute cron in the cron system domain. Domain allowed access. Execute crond_exec_t Domain allowed access. Execute crond server in the nscd domain. The type of the process performing this action. Inherit and use a file descriptor from the cron daemon. Domain allowed access. Send a SIGCHLD signal to the cron daemon. Domain allowed access. Read a cron daemon unnamed pipe. Domain allowed access. Do not audit attempts to write cron daemon unnamed pipes. Domain allowed access. Read and write a cron daemon unnamed pipe. Domain allowed access. Read and write inherited user spool files. Domain allowed access. Read and write inherited spool files. Domain allowed access. Read, and write cron daemon TCP sockets. Domain allowed access. Dontaudit Read, and write cron daemon TCP sockets. Domain allowed access. Search the directory containing user cron tables. The type of the process to performing this action. Manage pid files used by cron Domain allowed access. Execute anacron in the cron system domain. Domain allowed access. Inherit and use a file descriptor from system cron jobs. Domain allowed access. Write a system cron job unnamed pipe. Domain allowed access. Read and write a system cron job unnamed pipe. Domain allowed access. Allow read/write unix stream sockets from the system cron jobs. Domain allowed access. Read temporary files from the system cron jobs. Domain allowed access. Do not audit attempts to append temporary files from the system cron jobs. Domain to not audit. Do not audit attempts to write temporary files from the system cron jobs. Domain to not audit. Read temporary files from the system cron jobs. Domain allowed access. Manage files from the system cron jobs. Domain allowed access.

Allow system cron jobs to relabel filesystem for restoring file contexts.

Enable extra rules in the cron domain to support fcron.

policy for ctdbd Transition to ctdbd. Domain allowed to transition. Execute ctdbd server in the ctdbd domain. Domain allowed access. Read ctdbd's log files. Domain allowed access. Append to ctdbd log files. Domain allowed to transition. Manage ctdbd log files Domain to not audit. Search ctdbd lib directories. Domain allowed access. Read ctdbd lib files. Domain allowed access. Manage ctdbd lib files. Domain allowed access. Manage ctdbd lib directories. Domain allowed access. Read ctdbd PID files. Domain allowed access. Connect to ctdbd over an unix stream socket. Domain allowed access. Allow domain to signal ctdbd. Domain to not audit. Allow domain to send SIGCHLD to ctdbd. Domain to not audit. All of the rules required to administrate an ctdbd environment Domain allowed access. Role allowed access. Common UNIX printing system Setup cups to transtion to the cups backend domain Domain allowed access. Domain allowed access. Execute cups in the cups domain. The type of the process performing this action. Connect to cupsd over an unix domain stream socket. Domain allowed access. Connect to cups over TCP. (Deprecated) Domain allowed access. Send and receive messages from cups over dbus. Domain allowed access. Read cups PID files. Domain allowed access. Execute cups_config in the cups_config domain. The type of the process performing this action. Send generic signals to the cups configuration daemon. Domain allowed access. Send and receive messages from cupsd_config over dbus. Domain allowed access. Read cups configuration files. Domain allowed access. Read cups-writable configuration files. Domain allowed access. Read cups log files. Domain allowed access. Append cups log files. Domain allowed access. Write cups log files. Domain allowed access. Connect to ptal over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an cups environment Domain allowed access. The role to be allowed to manage the cups domain. Concurrent versions system Read the CVS data and metadata. Domain allowed access. Allow the specified domain to execute cvs in the caller domain. Domain allowed access. Dontaudit Attempts to list the CVS data and metadata. Domain to not audit. All of the rules required to administrate an cvs environment Domain allowed access. The role to be allowed to manage the cvs domain.

Allow cvs daemon to read shadow

Cyphesis WorldForge game server Execute a domain transition to run cyphesis. Domain allowed to transition. Cyrus is an IMAP service intended to be run on sealed servers Allow caller to create, read, write, and delete cyrus data files. Domain allowed access. Allow write cyrus data files. Domain allowed access. Connect to Cyrus using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an cyrus environment Domain allowed access. The role to be allowed to manage the cyrus domain. Dante msproxy and socks4/5 proxy server Dictionary server for the SKK Japanese input method system. Desktop messaging bus DBUS stub interface. No access allowed. Domain allowed access Template for creating connections to the system DBUS. The type of the domain. Template for creating connections to a user DBUS. The type of the domain. Send a message the session DBUS. Domain allowed access. Read dbus configuration. Domain allowed access. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Send a message on the system DBUS. Domain allowed access. Allow unconfined access to the system DBUS. Domain allowed access. Allow a application domain to be started by the session dbus. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Create a domain for processes which can be started by the system dbus Type to be used as a domain. Type of the program to be used as an entry point to this domain. Do not audit attempts to send dbus messages to system bus types. Domain to not audit. Allow attempts to send dbus messages to system bus types. Domain to not audit. Dontaudit Read, and write system dbus TCP sockets. Domain allowed access. Allow unconfined access to the system DBUS. Domain allowed access. Create, read, write, and delete system dbus lib files. Domain allowed access. Read system dbus lib files. Domain allowed access. Distributed checksum clearinghouse spam filtering Execute cdcc in the cdcc domain. Domain allowed access. Execute cdcc in the cdcc domain, and allow the specified role the cdcc domain. Domain allowed access. The role to be allowed the cdcc domain. Execute dcc_client in the dcc_client domain. Domain allowed access. Send a signal to the dcc_client. Domain allowed access. Execute dcc_client in the dcc_client domain, and allow the specified role the dcc_client domain. Domain allowed access. The role to be allowed the dcc_client domain. Execute dbclean in the dcc_dbclean domain. Domain allowed access. Execute dbclean in the dcc_dbclean domain, and allow the specified role the dcc_dbclean domain. Domain allowed access. The role to be allowed the dcc_dbclean domain. Connect to dccifd over a unix domain stream socket. Domain allowed access. Update dynamic IP address at DynDNS.org. Execute ddclient in the ddclient domain. Domain allowed to transition. Execute ddclient in the ddclient domain, and allow the specified role the ddclient domain. Domain allowed to transition. Role allowed access. All of the rules required to administrate an ddclient environment. Domain allowed access. Role allowed access. Deny Hosts.

DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks).

Execute a domain transition to run denyhosts. Domain allowed to transition. Execute denyhost server in the denyhost domain. The type of the process performing this action. All of the rules required to administrate an denyhosts environment. Domain allowed access. Role allowed access.
Devicekit modular hardware abstraction layer Execute a domain transition to run devicekit. Domain allowed to transition. Send to devicekit over a unix domain datagram socket. Domain allowed access. Send and receive messages from devicekit over dbus. Domain allowed access. Send and receive messages from devicekit disk over dbus. Domain allowed access. Send signal devicekit power Domain allowed access. Send and receive messages from devicekit power over dbus. Domain allowed access. Read devicekit PID files. Domain allowed access. Manage devicekit var_run files. Domain allowed access. Dontaudit Send and receive messages from devicekit disk over dbus. Domain to not audit. Manage devicekit PID files. Domain allowed access. All of the rules required to administrate an devicekit environment Domain allowed access. Dynamic host configuration protocol (DHCP) server Transition to dhcpd. Domain allowed access. Set the attributes of the DCHP server state files. Domain allowed access. Execute dhcp server in the dhcp domain. The type of the process performing this action. All of the rules required to administrate an dhcp environment Domain allowed access. The role to be allowed to manage the dhcp domain. Dictionary daemon Use dictionary services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an dictd environment Domain allowed access. The role to be allowed to manage the dictd domain. Administration Server for Directory Server, dirsrv-admin. Exec dirsrv-admin programs. Domain allowed access. Exec cgi programs. Domain allowed access. Manage dirsrv-adminserver configuration files. Domain allowed access. Manage dirsrv-adminserver configuration files. Domain allowed access. Read dirsrv-adminserver tmp files. Domain allowed access. Write dirsrv-adminserver tmp files. Domain allowed access. Manage dirsrv-adminserver tmp files. Domain allowed access. Execute admin cgi programs in caller domain. Domain allowed access. policy for dirsrv Execute a domain transition to run dirsrv. Domain allowed to transition. Allow caller to signal dirsrv. Domain allowed access. Send a null signal to dirsrv. Domain allowed access. Allow a domain to manage dirsrv logs. Domain allowed access. Allow a domain to manage dirsrv lock. Domain allowed access. Allow a domain to manage dirsrv logs. Domain allowed access. Allow a domain to manage dirsrv /var/lib files. Domain allowed access. Allow a domain to manage dirsrv /var/run files. Domain allowed access. Allow a domain to create dirsrv pid directories. Domain allowed access. Allow a domain to read dirsrv /var/run files. Domain allowed access. Manage dirsrv configuration files. Domain allowed access. Read dirsrv share files. Domain allowed access. Connect to dirsrv over an unix stream socket. Domain allowed access. Distributed compiler daemon small and secure DNS daemon Allow search the djbdns-tinydns key ring. Domain allowed access. Allow link to the djbdns-tinydns key ring. Domain allowed access. DomainKeys Identified Mail milter. dnsmasq DNS forwarder and DHCP server Execute dnsmasq server in the dnsmasq domain. The type of the process performing this action. Execute dnsmasq server in the caller domain. Domain allowed to transition. Execute the dnsmasq init script in the init script domain. Domain allowed access. Send dnsmasq a signal The type of the process performing this action. Send dnsmasq a signull Domain allowed access. Send dnsmasq a kill signal. Domain allowed access. Read dnsmasq config files. Domain allowed. Write to dnsmasq config files. Domain allowed. Delete dnsmasq pid files Domain allowed access. Read dnsmasq pid files Domain allowed access. Manage dnsmasq pid files Domain allowed access. Create dnsmasq pid dirs Domain allowed access. All of the rules required to administrate an dnsmasq environment Domain allowed access. The role to be allowed to manage the dnsmasq domain. Dovecot POP and IMAP mail server Connect to dovecot unix domain stream socket. Domain allowed access. Connect to dovecot auth unix domain stream socket. Domain allowed access. Execute dovecot_deliver in the dovecot_deliver domain. Domain allowed access. Create, read, write, and delete the dovecot spool files. Domain allowed access. Do not audit attempts to delete dovecot lib files. Domain to not audit. Dontaudit attempts to read and write dovecot tmp files. Domain to not audit. Allow attempts to write inherited dovecot tmp files. Domain to not audit. Allow attempts to read and write to sendmail unnamed pipes. Domain allowed access. All of the rules required to administrate an dovecot environment Domain allowed access. The role to be allowed to manage the dovecot domain. policy for drbd Execute a domain transition to run drbd. Domain allowed access. Search drbd lib directories. Domain allowed access. Read drbd lib files. Domain allowed access. Create, read, write, and delete drbd lib files. Domain allowed access. Manage drbd lib dirs files. Domain allowed access. All of the rules required to administrate an drbd environment Domain allowed access. policy for dspam Execute a domain transition to run dspam. Domain allowed access. Execute dspam server in the dspam domain. The type of the process performing this action. Allow the specified domain to read dspam's log files. Domain allowed access. Allow the specified domain to append dspam log files. Domain allowed to transition. Allow domain to manage dspam log files Domain to not audit. Search dspam lib directories. Domain allowed access. Read dspam lib files. Domain allowed access. Create, read, write, and delete dspam lib files. Domain allowed access. Manage dspam lib dirs files. Domain allowed access. Read dspam PID files. Domain allowed access. Connect to DSPAM using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an dspam environment Domain allowed access. Role allowed access. Exim mail transfer agent Execute a domain transition to run exim. Domain allowed to transition. Execute exim in the exim domain. The type of the process performing this action. Do not audit attempts to read, exim tmp files Domain to not audit. Allow domain to read, exim tmp files Domain to not audit. Read exim PID files. Domain allowed access. Allow the specified domain to read exim's log files. Domain allowed access. Allow the specified domain to append exim log files. Domain allowed to transition. Allow the specified domain to manage exim's log files. Domain allowed access. Create, read, write, and delete exim spool dirs. Domain allowed access. Read exim spool files. Domain allowed access. Create, read, write, and delete exim spool files. Domain allowed access. All of the rules required to administrate an exim environment. Domain allowed access. Role allowed access.

Allow exim to connect to databases (postgres, mysql)

Allow exim to read unprivileged user files.

Allow exim to create, read, write, and delete unprivileged user files.

Update firewall filtering to ban IP addresses with too many password failures. Execute a domain transition to run fail2ban. Domain allowed to transition. Connect to fail2ban over a unix domain stream socket. Domain allowed access. Read and write to an fail2ban unix stream socket. Domain allowed access. Read fail2ban lib files. Domain allowed access. Allow the specified domain to read fail2ban's log files. Domain allowed access. Allow the specified domain to append fail2ban log files. Domain allowed to transition. Read fail2ban PID files. Domain allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. All of the rules required to administrate an fail2ban environment Domain allowed access. The role to be allowed to manage the fail2ban domain. Read and write inherited temporary files. Domain allowed access. policy for fcoemon Transition to fcoemon. Domain allowed to transition. Read fcoemon PID files. Domain allowed access. Send to a fcoemon unix dgram socket. Domain allowed access. All of the rules required to administrate an fcoemon environment Domain allowed access. Remote-mail retrieval and forwarding utility All of the rules required to administrate an fetchmail environment Domain allowed access. Finger user information service. Execute fingerd in the fingerd domain. The type of the process performing this action. Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated) Domain allowed access. DBus fingerprint reader service Execute a domain transition to run fprintd. Domain allowed to transition. Send and receive messages from fprintd over dbus. Domain allowed access. Remote-Console (out-of-band) and System Management Software (in-band) based on Intelligent Platform Management Interface specification Connect to cluster domains over a unix domain stream socket. Domain allowed access. File transfer protocol service Execute a domain transition to run ftpd. Domain allowed to transition. Execute ftpd server in the ftpd domain. The type of the process performing this action. Use ftp by connecting over TCP. (Deprecated) Domain allowed access. Read ftpd etc files Domain allowed access. Execute FTP daemon entry point programs. Domain allowed access. Read FTP transfer logs Domain allowed access. Execute the ftpdctl program in the ftpdctl domain. Domain allowed access. Execute the ftpdctl program in the ftpdctl domain. Domain allowed access. The role to allow the ftpdctl domain. Allow domain dyntransition to chroot_user_t domain. Domain allowed access. All of the rules required to administrate an ftp environment Domain allowed access. The role to be allowed to manage the ftp domain.

Allow ftp servers to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Allow ftp servers to login to local users and read/write all files on the system, governed by DAC.

Allow ftp servers to use cifs used for public file transfer services.

Allow ftpd to use ntfs/fusefs volumes.

Allow ftp servers to use nfs used for public file transfer services.

Allow ftp servers to use connect to mysql database

Allow ftp to read and write files in the user home directories

Determine whether ftpd can bind to all unreserved ports for passive mode.

OpenH.323 Voice-Over-IP Gatekeeper GIT revision control system. Read generic system content files. Domain allowed access.

Determine whether Git CGI can search home directories.

Determine whether Git CGI can access cifs file systems.

Determine whether Git CGI can access nfs file systems.

Determine whether Git session daemon can bind TCP sockets to all unreserved ports.

Determine whether calling user domains can execute Git daemon in the git_session_t domain.

Determine whether Git system daemon can search home directories.

Determine whether Git system daemon can access cifs file systems.

Determine whether Git system daemon can access nfs file systems.

policy for glance Transition to glance registry. Domain allowed to transition. Transition to glance api. Domain allowed to transition. Read glance's log files. Domain allowed access. Append to glance log files. Domain allowed access. Manage glance log files Domain allowed access. Search glance lib directories. Domain allowed access. Read glance lib files. Domain allowed access. Manage glance lib files. Domain allowed access. Manage glance lib directories. Domain allowed access. Read glance PID files. Domain allowed access. Manage glance PID files. Domain allowed access. All of the rules required to administrate an glance environment Domain allowed access. Role allowed access. policy for glusterd Transition to glusterd. Domain allowed to transition. Execute glusterd server in the glusterd domain. Domain allowed access. Read glusterd's log files. Domain allowed access. Append to glusterd log files. Domain allowed access. Manage glusterd log files Domain allowed access. Read glusterd's config files. Domain allowed access. Read and write /var/lib/glusterd files. Domain allowed access. Read and write /var/lib/glusterd files. Domain allowed access. All of the rules required to administrate an glusterd environment Domain allowed access. Role allowed access. Manage glusterd PID files. Domain allowed access.

Allow glusterfsd to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow glusterfsd to share any file/directory read only.

Allow glusterfsd to share any file/directory read/write.

Gnome clock handler for setting the time. Execute a domain transition to run gnomeclock. Domain allowed to transition. Execute gnomeclock in the gnomeclock domain, and allow the specified role the gnomeclock domain. Domain allowed access The role to be allowed the gnomeclock domain. Send and receive messages from gnomeclock over dbus. Domain allowed access. Do not audit send and receive messages from gnomeclock over dbus. Domain allowed access. General Purpose Mouse driver Connect to GPM over a unix domain stream socket. Domain allowed access. Get the attributes of the GPM control channel named socket. Domain allowed access. Do not audit attempts to get the attributes of the GPM control channel named socket. Domain allowed access. Set the attributes of the GPM control channel named socket. Domain allowed access. gpsd monitor daemon Execute a domain transition to run gpsd. Domain allowed to transition. Execute gpsd in the gpsd domain, and allow the specified role the gpsd domain. Domain allowed access The role to be allowed the gpsd domain. Read and write gpsd shared memory. Domain allowed access. Hardware abstraction layer Execute hal in the hal domain. Domain allowed access. Get the attributes of a hal process. Domain allowed access. Read hal system state Domain to not audit. Allow ptrace of hal domain Domain allowed access. Allow domain to use file descriptors from hal. Domain to not audit. Do not audit attempts to use file descriptors from hal. Domain to not audit. Allow attempts to read and write to hald unnamed pipes. Domain to not audit. Do not audit attempts to read and write to hald unnamed pipes. Domain to not audit. Send to hal over a unix domain datagram socket. Domain allowed access. Send to hal over a unix domain stream socket. Domain allowed access. Dontaudit read/write to a hal unix datagram socket. Domain allowed access. Send a dbus message to hal. Domain allowed access. Send and receive messages from hal over dbus. Domain allowed access. Execute hal mac in the hal mac domain. Domain allowed access. Allow attempts to write the hal log files. Domain allowed access. Do not audit attempts to write the hal log files. Domain to not audit Manage hald log files. Domain allowed access. Manage hald log files. Domain allowed access. Read hald tmp files. Domain allowed access. Do not audit attempts to read or write HAL libraries files Domain allowed access. Read hald PID files. Domain allowed access. Do not audit attempts to read hald PID files. Domain to not audit. Read/Write hald PID files. Domain allowed access. Manage hald PID dirs. Domain allowed access. Manage hald PID files. Domain allowed access. hddtemp hard disk temperature tool running as a daemon Execute hddtemp in the hddtemp domain. Domain allowed access. Execute hddtemp Domain allowed access. Port of Apple Rendezvous multicast DNS Send generic signals to howl. Domain allowed access. policy for hypervkvp Execute hypervkvpd in the hypervkvp domin. Domain allowed to transition. Search hypervkvp lib directories. Domain allowed access. Read hypervkvp lib files. Domain allowed access. Create, read, write, and delete hypervkvp lib files. Domain allowed access. IIIMF htt server Use i18n_input over a TCP connection. (Deprecated) Domain allowed access. ShoutCast compatible streaming media server Execute a domain transition to run icecast. Domain allowed to transition. Allow domain signal icecast Domain allowed access. Execute icecast server in the icecast domain. Domain allowed access. Read icecast PID files. Domain allowed access. Manage icecast pid files. Domain allowed access. Allow the specified domain to read icecast's log files. Domain allowed access. Allow the specified domain to append icecast log files. Domain allowed access. Allow domain to manage icecast log files Domain allow access. All of the rules required to administrate an icecast environment Domain allowed access. Role allowed access.

Determine whether icecast can listen on and connect to any TCP port.

Bring up/down ethernet interfaces based on cable detection. Execute a domain transition to run ifplugd. Domain allowed to transition. Send a generic signal to ifplugd Domain allowed access. Read ifplugd etc configuration files. Domain allowed access. Manage ifplugd etc configuration files. Domain allowed access. Read ifplugd PID files. Domain allowed access. All of the rules required to administrate an ifplugd environment Domain allowed access. The role to be allowed to manage the ifplugd domain. iMaze game server Internet services daemon. Define the specified domain as a inetd service.

Define the specified domain as a inetd service. The inetd_service_domain(), inetd_tcp_service_domain(), or inetd_udp_service_domain() interfaces should be used instead of this interface, as this interface only provides the common rules to these three interfaces.

The type associated with the inetd service process. The type associated with the process program.
Define the specified domain as a TCP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a TCP and UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Inherit and use file descriptors from inetd. Domain allowed access. Connect to the inetd service using a TCP connection. (Deprecated) Domain allowed access. Run inetd child process in the inet child domain Domain allowed access. Send UDP network traffic to inetd. (Deprecated) The type of the process performing this action. Read and write inetd TCP sockets. The type of the process performing this action.
Internet News NNTP server Allow the specified domain to execute innd in the caller domain. Domain allowed access. Allow the specified domain to execute inn configuration files in /etc. Domain allowed access. Create, read, write, and delete the innd log. Domain allowed access. Create, read, write, and delete the innd pid files. Domain allowed access. Read innd configuration files. Domain allowed access. Read innd news library files. Domain allowed access. Read innd news library files. Domain allowed access. Send to a innd unix dgram socket. Domain allowed access. Execute inn in the inn domain. Domain allowed access. All of the rules required to administrate an inn environment Domain allowed access. The role to be allowed to manage the inn domain. policy for ipmievd Transition to ipmievd. Domain allowed to transition. Execute ipmievd server in the ipmievd domain. Domain allowed access. Read ipmievd PID files. Domain allowed access. All of the rules required to administrate an ipmievd environment Domain allowed access. Role allowed access. IRC server IRQ balancing daemon Internet Storage Name Service. All of the rules required to administrate an isnsd environment. Domain allowed access. Role allowed access. Jabber instant messaging server Execute a domain transition to run jabberd services Domain allowed to transition. Execute a domain transition to run jabberd router service Domain allowed to transition. Read jabberd lib files. Domain allowed access. Dontaudit inherited read jabberd lib files. Domain to not audit. Create, read, write, and delete jabberd lib files. Domain allowed access. All of the rules required to administrate an jabber environment Domain allowed access. The role to be allowed to manage the jabber domain. keepalived - load-balancing and high-availability service Execute keepalived in the keepalived domin. Domain allowed to transition. MIT Kerberos admin and KDC

This policy supports:

Servers:

  • kadmind
  • krb5kdc

Clients:

  • kinit
  • kdestroy
  • klist
  • ksu (incomplete)

Execute kadmind in the current domain Domain allowed access. Execute a domain transition to run kpropd. Domain allowed to transition. Use kerberos services Domain allowed access. Read the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Do not audit attempts to write the kerberos configuration file (/etc/krb5.conf). Domain to not audit. Read and write the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Read the kerberos key table. Domain allowed access. Read/Write the kerberos key table. Domain allowed access. Create keytab file in /etc Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Connect to krb524 service Domain allowed access. All of the rules required to administrate an kerberos environment Domain allowed access. The role to be allowed to manage the kerberos domain. Type transition files created in /tmp to the krb5_host_rcache type. Domain allowed access.

Allow confined applications to run with kerberos.

Service for reporting kernel oopses to kerneloops.org Execute a domain transition to run kerneloops. Domain allowed to transition. Send and receive messages from kerneloops over dbus. Domain allowed access. dontaudit attempts to Send and receive messages from kerneloops over dbus. Domain allowed access. Allow domain to manage kerneloops tmp files Domain to not audit. All of the rules required to administrate an kerneloops environment Domain allowed access. The role to be allowed to manage the kerneloops domain. policy for keystone Transition to keystone. Domain allowed to transition. Read keystone's log files. Domain allowed access. Append to keystone log files. Domain allowed access. Manage keystone log files Domain allowed access. Search keystone lib directories. Domain allowed access. Read keystone lib files. Domain allowed access. Manage keystone lib files. Domain allowed access. Manage keystone lib directories. Domain allowed access. All of the rules required to administrate an keystone environment Domain allowed access. Role allowed access. Kernel Samepage Merging (KSM) Tuning Daemon Execute a domain transition to run ksmtuned. Domain allowed to transition. Execute ksmtuned server in the ksmtuned domain. Domain allowed access. All of the rules required to administrate an ksmtuned environment Domain allowed access. Role allowed access. KDE Talk daemon Layer 2 Tunneling Protocol daemons. Transition to l2tpd. Domain allowed to transition. Execute l2tpd server in the l2tpd domain. Domain allowed access. Send to l2tpd via a unix dgram socket. Domain allowed access. Read and write l2tpd sockets. Domain allowed access. Read l2tpd PID files. Domain allowed access. Connect to l2tpd over a unix domain stream socket. Domain allowed access. Read and write l2tpd unnamed pipes. Domain allowed access. All of the rules required to administrate an l2tpd environment Domain allowed access. Role allowed access. OpenLDAP directory server Execute OpenLDAP in the ldap domain. The type of the process performing this action. Execute OpenLDAP server in the ldap domain. The type of the process performing this action. Read the contents of the OpenLDAP database directories. Domain allowed access. Read the contents of the OpenLDAP database files. Domain allowed access. Read the OpenLDAP configuration files. Domain allowed access. Use LDAP over TCP connection. (Deprecated) Domain allowed access. Connect to slapd over an unix stream socket. Domain allowed access. Connect to dirsrv over an unix stream socket. Domain allowed access. All of the rules required to administrate an ldap environment Domain allowed access. The role to be allowed to manage the ldap domain. Likewise Active Directory support for UNIX.

Likewise Open is a free, open source application that joins Linux, Unix, and Mac machines to Microsoft Active Directory to securely authenticate users with their domain credentials.

Connect to lsassd. Domain allowed access.
implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux. Execute domain in the phc2sys domain. Domain allowed to transition. Execute domain in the phc2sys domain. Domain allowed to transition. Connect to timemaster using a unix domain stream socket. Domain allowed access. Read timemaster conf files. Domain allowed access. Read and write timemaster shared memory. Domain allowed access. Read and write ptp4l_t shared memory. Domain allowed access. Linux infared remote control daemon Execute a domain transition to run lircd. Domain allowed to transition. Connect to lircd over a unix domain stream socket. Domain allowed access. Read lircd etc file The type of the process performing this action. All of the rules required to administrate a lircd environment Domain allowed access. The role to be allowed to manage the syslog domain. Intel LLDP Agent. Transition to lldpad. Domain allowed to transition. Send to lldpad with a unix dgram socket. Domain allowed access. Recv to lldpad with a unix dgram socket. Domain allowed access. All of the rules required to administrate an lldpad environment. Domain allowed access. Role allowed access. Line printer daemon Role access for lpd Role allowed access User domain for the role Execute lpd in the lpd domain. Domain allowed access. Execute amrecover in the lpd domain, and allow the specified role the lpd domain. Domain allowed access. The role to be allowed the lpd domain. List the contents of the printer spool directories. Domain allowed access. Read the printer spool files. Domain allowed access. Create, read, write, and delete printer spool files. Domain allowed access. Relabel from and to the spool files. Domain allowed access. List the contents of the printer spool directories. Domain allowed access. Allow the specified domain to execute lpr in the caller domain. Domain allowed access.

Use lpd server instead of cups

libStorageMgmt plug-in daemon Execute TEMPLATE in the lsmd domin. Domain allowed to transition. Read lsmd PID files. Domain allowed access.

Determine whether lsmd_plugin can connect to all TCP ports.

Mailman is for managing electronic mail discussion and e-newsletter lists Execute mailman in the mailman domain. Domain allowed access. Execute the mailman program in the mailman domain. Domain allowed to transition. The role to allow the mailman domain. Execute mailman CGI scripts in the mailman CGI domain. Domain allowed to transition. Execute mailman in the caller domain. Domain allowd access. Send generic signals to the mailman cgi domain. Domain allowed access. Allow domain to search data directories. Domain allowed access. Allow domain to to read mailman data files. Domain allowed access. Allow domain to to create mailman data files and write the directory. Domain allowed access. List the contents of mailman data directories. Domain allowed access. Allow read acces to mailman data symbolic links. Domain allowed access. Read mailman logs. Domain allowed access. Append to mailman logs. Domain allowed access. Create, read, write, and delete mailman logs. Domain allowed access. Allow domain to read mailman archive files. Domain allowed access. Execute mailman_queue in the mailman_queue domain. Domain allowed access. policy for matahari Search matahari lib directories. Domain allowed access. Read matahari lib files. Domain allowed access. Create, read, write, and delete matahari lib files. Domain allowed access. Manage matahari lib dirs files. Domain allowed access. Read matahari PID files. Domain allowed access. Read matahari PID files. Domain allowed access. Execute a domain transition to run matahari_hostd. Domain allowed access. Execute a domain transition to run matahari_netd. Domain allowed access. Execute a domain transition to run matahari_serviced. Domain allowed access. All of the rules required to administrate an matahari environment Domain allowed access. Role allowed access. high-performance memory object caching system Execute a domain transition to run memcached. Domain allowed to transition. Read memcached PID files. Domain allowed access. All of the rules required to administrate an memcached environment Domain allowed access. The role to be allowed to manage the memcached domain. Manage memcached PID files Domain allowed access. Connect to memcached over a unix stream socket. Domain allowed access. Milter mail filters MTA communication with milter sockets Domain allowed access. Allow getattr of milter sockets Domain allowed access. Allow setattr of milter dirs Domain allowed access. Manage spamassassin milter state Domain allowed access. Delete dkim-milter PID files. Domain allowed access. Mobile IPv6 and NEMO Basic Support implementation Execute TEMPLATE in the mip6d domin. Domain allowed to transition. policy for mirrormanager Execute mirrormanager in the mirrormanager domin. Domain allowed to transition. Read mirrormanager's log files. Domain allowed access. Append to mirrormanager log files. Domain allowed access. Manage mirrormanager log files Domain allowed access. Search mirrormanager lib directories. Domain allowed access. Read mirrormanager lib files. Domain allowed access. Manage mirrormanager lib files. Domain allowed access. Manage mirrormanager lib directories. Domain allowed access. Read mirrormanager PID files. Domain allowed access. Manage mirrormanager PID files. Domain allowed access. Manage mirrormanager PID sock files. Domain allowed access. All of the rules required to administrate an mirrormanager environment Domain allowed access. Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards. Execute a domain transition to run modemmanager. Domain allowed to transition. Send and receive messages from modemmanager over dbus. Domain allowed access. Monopoly daemon policy for daemon for playing music Execute a domain transition to run mpd. Domain allowed to transition. Execute mpd server in the mpd domain. Domain allowed access. Read mpd data files. Domain allowed access. Read mpd tmpfs files. Domain allowed access. Manage mpd tmpfs files. The type of the process performing this action. Manage mpd data files. Domain allowed access. Search mpd lib directories. Domain allowed access. Read mpd lib files. Domain allowed access. Create, read, write, and delete mpd lib files. Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Manage mpd lib dirs files. Domain allowed access. Send and receive messages from mpd over dbus. Domain allowed access. All of the rules required to administrate an mpd environment Domain allowed access. Role allowed access. Policy common to all email tranfer agents. MTA stub interface. No access allowed. Domain allowed access. Type transition files created in calling dir to the mail address aliases type. Domain allowed access. Directory to transition on. Role access for mta Role allowed access User domain for the role ALlow domain to read mail content in the homedir Domain allowed access. Allow domain to manage mail content in the homedir Domain allowed access. Make the specified domain usable for a mail server. Type to be used as a mail server domain. Type of the program to be used as an entry point to this domain. Make the specified type a MTA executable file. Type to be used as a mail client. Dontaudit read and write an leaked file descriptors The type of the process performing this action. Make the specified type by a system MTA. Type to be used as a mail client. Modified mailserver interface for sendmail daemon use.

A modified MTA mail server interface for the sendmail program. It's design does not fit well with policy, and using the regular interface causes a type_transition conflict if direct running of init scripts is enabled.

This interface should most likely only be used by the sendmail policy.

The type to be used for the mail server.
Make a type a mailserver type used for sending mail. Mail server domain type used for sending mail. Make a type a mailserver type used for delivering mail to local users. Mail server domain type used for delivering mail. Make a type a mailserver type used for sending mail on behalf of local users to the local mail spool. Mail server domain type used for sending local mail. Send mail from the system. Domain allowed access. Send mail client a signal The type of the process performing this action. Execute send mail in a specified domain.

Execute send mail in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Send system mail client a signal Domain allowed access. Send system mail client a kill signal Domain allowed access. Execute sendmail in the caller domain. Domain allowed access. Read mail server configuration. Domain allowed access. write mail server configuration. Domain allowed access. Read mail address aliases. Domain allowed access. Create, read, write, and delete mail address aliases. Domain allowed access. Type transition files created in /etc to the mail address aliases type. Domain allowed access. Read and write mail aliases. Domain allowed access. Do not audit attempts to read and write TCP sockets of mail delivery domains. Mail server domain. Connect to all mail servers over TCP. (Deprecated) Mail server domain. Do not audit attempts to read a symlink in the mail spool. Domain allowed access. Get the attributes of mail spool files. Domain allowed access. Do not audit attempts to get the attributes of mail spool files. Domain to not audit. Create private objects in the mail spool directory. Domain allowed access. The type of the object to be created. The object class of the object being created. Read and write the mail spool. Domain allowed access. Create, read, and write the mail spool. Domain allowed access. Delete from the mail spool. Domain allowed access. Create, read, write, and delete mail spool files. Domain allowed access. Search mail queue dirs. Domain allowed access. List the mail queue. Domain allowed access. Read the mail queue. Domain allowed access. Do not audit attempts to read and write the mail queue. Domain to not audit. Create, read, write, and delete mail queue files. Domain allowed access. Type transition files created in calling dir to the mail address aliases type. Domain allowed access. Directory to transition on. The object class of the object being created. Read sendmail binary. Domain allowed access. Read and write unix domain stream sockets of user mail domains. Domain allowed access. Send all user mail client a signal Domain allowed access.
Munin network-wide load graphing (formerly LRRD) Connect to munin over a unix domain stream socket. Domain allowed access. Read munin configuration files. Domain allowed access. dontaudit read and write an leaked file descriptors The type of the process performing this action. Append to the munin log. Domain allowed access. Search munin library directories. Domain allowed access. Do not audit attempts to search munin library directories. Domain allowed access. All of the rules required to administrate an munin environment Domain allowed access. The role to be allowed to manage the munin domain. Policy for MySQL Execute MySQL in the mysql domain. Domain allowed access. Execute MySQL in the coller domain. Domain allowed access. Execute MySQL_safe in the coller domain. Domain allowed access. Send a generic signal to MySQL. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Connect to MySQL using a unix domain stream socket. Domain allowed access. Read MySQL configuration files. Domain allowed access. Search the directories that contain MySQL database storage. Domain allowed access. List the directories that contain MySQL database storage. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database directories. Domain allowed access. Append to the MySQL database directory. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database files. Domain allowed access. Read and write to the MySQL database named socket. Domain allowed access. Write to the MySQL log. Domain allowed access. Execute MySQL server in the mysql domain. Domain allowed access. Read MySQL PID files. Domain allowed access. Search MySQL PID files. Domain allowed access. All of the rules required to administrate an mysql environment Domain allowed access. The role to be allowed to manage the mysql domain. Read and write to the MySQL database directory. Domain allowed access.

Allow mysqld to connect to all ports

Net Saint / NAGIOS - network monitoring server Do not audit attempts to read or write nagios unnamed pipes. Domain to not audit. Allow the specified domain to read nagios configuration files. Domain allowed access. Allow the specified domain to read nagios temporary files. Domain allowed access. Allow the specified domain to read nagios temporary files. Domain allowed access. Execute the nagios NRPE with a domain transition. Domain allowed access. Search nagios spool directories. Domain allowed access. Read nagios lib files. Domain allowed access. Read nagios logs. Domain allowed access. dontaudit Read and write nagios logs. Domain allowed access. Execute the nagios unconfined plugins with a domain transition. Domain allowed access. Do not audit attempts to write nrpe daemon unnamed pipes. Domain allowed access. All of the rules required to administrate an nagios environment Domain allowed access. The role to be allowed to manage the nagios domain. Read nagios lib files. Domain allowed access. Execute nagios log in the caller domain. Domain allowed access.

Allow nagios/nrpe to call sudo from NRPE utils scripts.

Nessus network scanning daemon Connect to nessus over a TCP socket (Deprecated) Domain allowed access. Manager for dynamically switching between networks. Read and write NetworkManager UDP sockets. Domain allowed access. Read and write NetworkManager packet sockets. Domain allowed access. Read and write NetworkManager netlink routing sockets. Domain allowed access. Execute NetworkManager with a domain transition. Domain allowed access. Send and receive messages from NetworkManager over dbus. Domain allowed access. Send and receive messages from NetworkManager over dbus. Domain allowed access. Send a generic signal to NetworkManager Domain allowed access. Execute NetworkManager scripts with an automatic domain transition to initrc. Domain allowed access. Read NetworkManager PID files. Domain allowed access. Read NetworkManager PID files. Domain allowed access. Execute NetworkManager in the NetworkManager domain, and allow the specified role the NetworkManager domain. Domain allowed access. The role to be allowed the NetworkManager domain. Allow caller to relabel tun_socket Domain allowed access. Allow the specified domain to append to Network Manager log files. Domain allowed access. Policy for NIS (YP) servers and clients Use the ypbind service to access NIS services unconditionally.

Use the ypbind service to access NIS services unconditionally.

This interface was added because of apache and spamassassin, to fix a nested conditionals problem. When that support is added, this should be removed, and the regular interface should be used.

The type of the process performing this action.
Use the ypbind service to access NIS services.

Allow the specified domain to use the ypbind service to access Network Information Service (NIS) services. Information that can be retreived from NIS includes usernames, passwords, home directories, and groups. If the network is configured to have a single sign-on using NIS, it is likely that any program that does authentication will need this access.

Domain allowed access.
Use the nis to authenticate passwords Domain allowed access. Execute ypbind in the ypbind domain. Domain allowed access. Execute ypbind in the ypbind domain, and allow the specified role the ypbind domain. Domain allowed access. The role to be allowed the ypbind domain. Send generic signals to ypbind. Domain allowed access. List the contents of the NIS data directory. Domain allowed access. Send UDP network traffic to NIS clients. (Deprecated) Domain allowed access. Connect to ypbind over TCP. (Deprecated) Domain allowed access. Read ypbind pid files. Domain allowed access. Delete ypbind pid files. Domain allowed access. Read ypserv configuration files. Domain allowed access. Execute ypxfr in the ypxfr domain. Domain allowed access. Execute nis server in the nis domain. Domain allowed access. Execute nis server in the nis domain. Domain allowed access. All of the rules required to administrate an nis environment Domain allowed access. Role allowed access.
openstack-nova Manage nova lib files. Domain allowed access. Name service cache daemon Send generic signals to NSCD. Domain allowed access. Send NSCD the kill signal. Domain allowed access. Send signulls to NSCD. Domain allowed access. Execute NSCD in the nscd domain. The type of the process performing this action. Allow the specified domain to execute nscd in the caller domain. Domain allowed access. Use NSCD services by connecting using a unix stream socket. Domain allowed access. Use nscd services Domain allowed access. Use NSCD services by mapping the database from an inherited NSCD file descriptor. Domain allowed access. Do not audit attempts to search the NSCD pid directory. Domain allowed access. Read NSCD pid file. Domain allowed access. Unconfined access to NSCD services. Domain allowed access. Execute nscd in the nscd domain, and allow the specified role the nscd domain. Domain allowed access The role to be allowed the nscd domain. Execute the nscd server init script. Domain allowed access. All of the rules required to administrate an nscd environment Domain allowed access. The role to be allowed to manage the nscd domain.

Allow confined applications to use nscd shared memory.

Authoritative only name server Send and receive datagrams from NSD. (Deprecated) Domain allowed access. Connect to NSD over a TCP socket (Deprecated) Domain allowed access. nslcd - local LDAP name service daemon. Execute a domain transition to run nslcd. Domain allowed to transition. Execute nslcd server in the nslcd domain. The type of the process performing this action. Read nslcd PID files. Domain allowed access. Connect to nslcd over an unix stream socket. Domain allowed to connect. All of the rules required to administrate an nslcd environment Domain allowed access. Role allowed access. Network Top Execute a domain transition to run ntop. Domain allowed to transition. Execute ntop server in the ntop domain. The type of the process performing this action. Read ntop content in /etc Domain allowed access. Search ntop dirs in /var/lib Domain allowed access. Read ntop files in /var/lib Domain allowed access. Manage ntop files in /var/lib Domain allowed access. All of the rules required to administrate an ntop environment Domain allowed access. Role allowed access. Network time protocol daemon NTP stub interface. No access allowed. Domain allowed access. Execute ntp server in the ntpd domain. The type of the process performing this action. Execute ntp in the ntp domain, and allow the specified role the ntp domain. Domain allowed access. Role allowed access. Execute ntp server in the ntpd domain. The type of the process performing this action. Execute ntp server in the ntpd domain. The type of the process performing this action. Send a generic signal to ntpd Domain allowed access. Read and write ntpd shared memory. The type of the process performing this action. All of the rules required to administrate an ntp environment Domain allowed access. The role to be allowed to manage the ntp domain. policy for numad Transition to numad. Domain allowed to transition. All of the rules required to administrate an numad environment Domain allowed access. nut - Network UPS Tools NX remote desktop Transition to NX server. Domain allowed access. Read nx home directory content Domain allowed access. Read nx home directory content Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Open AntiVirus scannerdaemon and signature update Execute oav_update in the oav_update domain. Domain allowed access. Execute oav_update in the oav_update domain, and allow the specified role the oav_update domain. Domain allowed access. The role to be allowed the oav_update domain. Oddjob provides a mechanism by which unprivileged applications can request that specified privileged operations be performed on their behalf. Execute a domain transition to run oddjob. Domain allowed to transition. Do not audit attempts to read and write oddjob fifo file. Domain to not audit. Make the specified program domain accessable from the oddjob. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Send and receive messages from oddjob over dbus. Domain allowed access. Send a SIGCHLD signal to oddjob. Domain allowed access. Execute a domain transition to run oddjob_mkhomedir. Domain allowed to transition. Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain. Domain allowed access. Role allowed access. Create a domain which can be started by init, with a range transition. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Range for the domain. SELinux policy for Oident daemon.

Oident daemon is a server that implements the TCP/IP standard IDENT user identification protocol as specified in the RFC 1413 document.

Allow the specified domain to read Oidentd personal configuration files. Domain allowed access. Allow the specified domain to create, read, write, and delete Oidentd personal configuration files. Domain allowed access. Allow the specified domain to relabel Oidentd personal configuration files. Domain allowed access.
OpenCA - Open Certificate Authority Execute the OpenCA program with a domain transition. Domain allowed access. Send OpenCA generic signals. Domain allowed access. Send OpenCA stop signals. Domain allowed access. Kill OpenCA. Domain allowed access. Service for handling smart card readers. Send openct a null signal. Domain allowed access. Execute openct in the caller domain. Domain allowed access. Execute a domain transition to run openct. Domain allowed to transition. Read openct PID files. Domain allowed access. Connect to openct over an unix stream socket. Domain allowed access. policy for openhpid Transition to openhpid. Domain allowed to transition. Execute openhpid server in the openhpid domain. Domain allowed access. Search openhpid lib directories. Domain allowed access. Read openhpid lib files. Domain allowed access. Manage openhpid lib files. Domain allowed access. Manage openhpid lib directories. Domain allowed access. All of the rules required to administrate an openhpid environment Domain allowed access. Role allowed access. policy for openshift Execute openshift server in the openshift domain. The type of the process performing this action. Execute openshift server in the openshift domain. The type of the process performing this action. Execute openshift server in the openshift domain. The type of the process performing this action. Role access to this domain. Send a null signal to openshift init scripts. Domain allowed access. Send a signal to openshift init scripts. Domain allowed access. Allow the specified domain to read openshift's log files. Domain allowed access. Allow the specified domain to append openshift log files. Domain allowed to transition. Allow domain to manage openshift log files Domain to not audit. Getattr openshift lib files. Domain allowed access. Search openshift lib directories. Domain allowed access. Read openshift lib files. Domain allowed access. Read openshift lib files. Domain allowed access. Create, read, write, and delete openshift lib files. Domain allowed access. Manage openshift lib dirs files. Domain allowed access. Manage openshift lib content. Domain allowed access. Create private objects in the mail lib directory. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Read openshift PID files. Domain allowed access. All of the rules required to administrate an openshift environment Domain allowed access. Role allowed access. Read and write inherited openshift files. Domain allowed access. Manage openshift tmp files. Domain allowed access. Manage openshift tmp sockets. Domain allowed access. Mounton openshift tmp directory. Domain allowed access. Dontaudit Read and write inherited script fifo files. Domain allowed access. Allow calling app to transition to an openshift domain Domain allowed access Allow calling app to transition to an openshift domain Domain allowed access Execute openshift in the openshift domain, and allow the specified role the openshift domain. Domain allowed to transition. Role allowed access.

Allow openshift to access nfs file systems without labels

full-featured SSL VPN solution Execute OPENVPN clients in the openvpn domain. Domain allowed access. Execute OPENVPN clients in the openvpn domain, and allow the specified role the openvpn domain. Domain allowed access. The role to be allowed the openvpn domain. Send OPENVPN clients the kill signal. Domain allowed access. Send generic signals to OPENVPN clients. Domain allowed access. Send signulls to OPENVPN clients. Domain allowed access. Allow the specified domain to read OpenVPN configuration files. Domain allowed access. All of the rules required to administrate an openvpn environment Domain allowed access. The role to be allowed to manage the openvpn domain.

Allow openvpn to read home directories

Allow openvpn to run unconfined scripts

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Transition to openvswitch. Domain allowed to transition. Execute TEMPLATE in the openvswitch domin. Domain allowed to transition. Allow stream connect to openvswitch. Domain allowed access. Read openvswitch PID files. Domain allowed access. Search openvswitch lib directories. Domain allowed access. Read openvswitch lib files. Domain allowed access. Manage openvswitch lib files. Domain allowed access. Manage openvswitch lib directories. Domain allowed access. WS-Management Server Execute openwsman in the openwsman domin. Domain allowed to transition. policy for oracleasm Transition to oracleasm. Domain allowed to transition. Execute oracleasm server in the oracleasm domain. Domain allowed access. All of the rules required to administrate an oracleasm environment Domain allowed access. Role allowed access. Client-side service written in Python that responds to pings and runs rhn_check when told to by osa-dispatcher. Execute osad in the osad domin. Domain allowed to transition. Execute osad server in the osad domain. Domain allowed access. Read osad's log files. Domain allowed access. Append to osad log files. Domain allowed access. Manage osad log files Domain allowed access. Read osad PID files. Domain allowed access. All of the rules required to administrate an osad environment Domain allowed access. Role allowed access. policy for pacemaker Transition to pacemaker. Domain allowed to transition. Execute pacemaker server in the pacemaker domain. Domain allowed access. Search pacemaker lib directories. Domain allowed access. Read pacemaker lib files. Domain allowed access. Manage pacemaker lib files. Domain allowed access. Manage pacemaker lib directories. Domain allowed access. Read pacemaker PID files. Domain allowed access. All of the rules required to administrate an pacemaker environment Domain allowed access. Role allowed access. Passive Asset Detection System

PADS is a libpcap based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.

All of the rules required to administrate an pads environment Domain allowed access. Role allowed access.
Ruby on rails deployment for Apache and Nginx servers. Execute passenger in the passenger domain. Domain allowed to transition. Execute passenger in the current domain. Domain allowed to transition. Read passenger lib files Domain allowed access. Manage passenger lib files Domain allowed access. Manage passenger var_run content. Domain allowed access. Connect to passenger unix stream socket. Domain allowed access. Allow to manage passenger tmp files/dirs. Domain allowed access. Allow to manage passenger tmp sock_files Domain allowed access. The pcp command summarizes the status of a Performance Co-Pilot (PCP) installation Allow domain to read pcp lib files Prefix for the domain. All of the rules required to administrate an pcp environment Domain allowed access. Allow the specified domain to execute pcp_pmie in the caller domain. Domain allowed to transition. Allow the specified domain to execute pcp_pmlogger in the caller domain. Domain allowed to transition.

Allow pcp to bind to all unreserved_ports

PCSC smart card service Execute a domain transition to run pcscd. Domain allowed to transition. Read pcscd pub files. Domain allowed access. Manage pcscd pub files. Domain allowed access. Manage pcscd pub fifo files. Domain allowed access. Connect to pcscd over an unix stream socket. Domain allowed access. The Open Group Pegasus CIM/WBEM Server. Perdition POP and IMAP proxy Connect to perdition over a TCP socket (Deprecated) The type of the process performing this action. Pingd of the Whatsup cluster node up/down detection utility Execute a domain transition to run pingd. Domain allowed to transition. Read pingd etc configuration files. Domain allowed access. Manage pingd etc configuration files. Domain allowed access. All of the rules required to administrate an pingd environment Domain allowed access. The role to be allowed to manage the pingd domain. policy for piranha Execute a domain transition to run fos. Domain allowed to transition. Execute a domain transition to run lvsd. Domain allowed to transition. Execute a domain transition to run pulse. Domain allowed to transition. Execute pulse server in the pulse domain. The type of the process performing this action. Allow the specified domain to read piranha's log files. Domain allowed access. Allow the specified domain to append piranha log files. Domain allowed to transition. Allow domain to manage piranha log files Domain to not audit.

Allow piranha-lvs domain to connect to the network using TCP.

policy for pkcsslotd Transition to pkcsslotd. Domain allowed to transition. Search pkcsslotd lib directories. Domain allowed access. Read pkcsslotd lib files. Domain allowed access. Manage pkcsslotd lib files. Domain allowed access. Manage pkcsslotd lib directories. Domain allowed access. All of the rules required to administrate an pkcsslotd environment Domain allowed access. policy for plymouthd Execute a domain transition to run plymouthd. Domain allowed to transition. Execute the plymoth daemon in the current domain Domain allowed to transition. Execute the plymoth command in the current domain Domain allowed to transition. Execute a domain transition to run plymouthd. Domain allowed to transition. Read plymouthd PID files. Domain allowed access. Manage plymouthd var_run files. Domain allowed access. Search plymouthd lib directories. Domain allowed access. Read plymouthd lib files. Domain allowed access. Create, read, write, and delete plymouthd lib files. Domain allowed access. Manage plymouthd var_lib files. Domain allowed access. Search plymouthd spool directories. Domain allowed access. Read plymouthd spool files. Domain allowed access. Create, read, write, and delete plymouthd spool files. Domain allowed access. Allow domain to manage plymouthd spool files Domain allowed access All of the rules required to administrate an plymouthd environment Domain allowed access. Allow domain to Stream socket connect to Plymouth daemon. Domain allowed access. Policy framework for controlling privileges for system-wide services. Send and receive messages from policykit over dbus. Domain allowed access. Send and receive messages from policykit over dbus. Domain allowed access. Execute a domain transition to run polkit_auth. Domain allowed to transition. Execute a policy_auth in the policy_auth domain, and allow the specified role the policy_auth domain, Domain allowed access. The role to be allowed the load_policy domain. Execute a domain transition to run polkit_grant. Domain allowed to transition. Execute a policy_grant in the policy_grant domain, and allow the specified role the policy_grant domain, Domain allowed access. The role to be allowed the load_policy domain. read policykit reload files Domain allowed access. rw policykit reload files Domain allowed access. Execute a domain transition to run polkit_resolve. Domain allowed to transition. Search policykit lib directories. Domain allowed access. read policykit lib files Domain allowed access. Send generic signal to policy_auth Domain allowed to transition. RPC port mapping service. Execute portmap_helper in the helper domain. Domain allowed access. Execute portmap helper in the helper domain, and allow the specified role the helper domain. Communicate with portmap. Domain allowed access. The role to be allowed the portmap domain. Send UDP network traffic to portmap. (Deprecated) The type of the process performing this action. Send and receive UDP network traffic from portmap. (Deprecated) Domain allowed access. Connect to portmap over a TCP socket (Deprecated) The type of the process performing this action. Reserve well-known ports in the RPC port range. Execute a domain transition to run portreserve. Domain allowed to transition. Execute portreserve in the portreserve domain. The type of the process performing this action. Allow the specified domain to read portreserve etcuration files. Domain allowed access. Allow the specified domain to manage portreserve etcuration files. Domain allowed access. All of the rules required to administrate an portreserve environment. Domain allowed access. Role allowed access. Portslave terminal server software Execute portslave with a domain transition. Domain allowed to transition. Postfix email server Postfix stub interface. No access allowed. Domain allowed access. Read postfix configuration files. Domain allowed access. Create files with the specified type in the postfix configuration directories. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to read and write postfix local delivery TCP sockets. Domain to not audit. Allow read/write postfix local pipes TCP sockets. Domain allowed access. Allow read/write postfix public pipes TCP sockets. Domain allowed access. Allow domain to read postfix local process state Domain allowed access. Allow domain to read postfix master process state Domain allowed access. Use postfix master process file file descriptors. Domain allowed access. Do not audit attempts to use postfix master process file file descriptors. Domain to not audit. Execute postfix_map in the postfix_map domain. Domain allowed to transition. Execute postfix_map in the postfix_map domain, and allow the specified role the postfix_map domain. Domain allowed to transition. Role allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Execute the master postfix in the postfix master domain. Domain allowed access. Execute the master postfix program in the caller domain. Domain allowed access. Connect to postfix master process using a unix domain stream socket. Domain allowed access. Allow read/write postfix master pipes Domain allowed access. Execute the master postdrop in the postfix_postdrop domain. Domain allowed to transition. Execute the master postqueue in the postfix_postqueue domain. Domain allowed to transition. Execute the master postqueue in the caller domain. Domain allowed access. Create a named socket in a postfix private directory. Domain allowed access. manage named socket in a postfix private directory. Domain allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Getattr postfix mail spool files. Domain allowed access. Search postfix mail spool directories. Domain allowed access. List postfix mail spool directories. Domain allowed access. Read postfix mail spool files. Domain allowed access. Create, read, write, and delete postfix mail spool files. Domain allowed access. Read, write, and delete postfix maildrop spool files. Domain allowed access. Create, read, write, and delete postfix maildrop spool files. Domain allowed access. Execute postfix user mail programs in their respective domains. Domain allowed access. All of the rules required to administrate an postfix environment. Domain allowed access. Role allowed access. Execute the master postdrop in the postfix_postdrop domain. Domain allowed to transition. The role to be allowed the iptables domain.

Allow postfix_local domain full write access to mail_spool directories

Postfix policy server All of the rules required to administrate an postfixpolicyd environment Domain allowed access. The role to be allowed to manage the postfixpolicyd domain. PostgreSQL relational database Role access for SE-PostgreSQL. The role associated with the user domain. The type of the user domain. Marks as a SE-PostgreSQL loadable shared library module Type marked as a database object type. Marks as a SE-PostgreSQL database object type Type marked as a database object type. Marks as a SE-PostgreSQL schema object type Type marked as a schema object type. Marks as a SE-PostgreSQL table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL system table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL sequence type Type marked as a sequence type. Marks as a SE-PostgreSQL view object type Type marked as a view object type. Marks as a SE-PostgreSQL procedure object type Type marked as a database object type. Marks as a SE-PostgreSQL procedural language object type Type marked as a procedural language object type. Marks as a SE-PostgreSQL binary large object type Type marked as a database binary large object type. Allow the specified domain to search postgresql's database directory. Domain allowed access. Allow the specified domain to manage postgresql's database. Domain allowed access. Execute postgresql in the postgresql domain. Domain allowed to transition. Execute Postgresql in the caller domain. Domain allowed access. Allow domain to signal postgresql Domain allowed access. Allow the specified domain to read postgresql's etc. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Allow the specified domain to connect to postgresql with a unix socket. Domain allowed access. Allow the specified domain unprivileged accesses to unifined database objects managed by SE-PostgreSQL, Domain allowed access. Allow the specified domain unconfined accesses to any database objects managed by SE-PostgreSQL, Domain allowed access. All of the rules required to administrate an postgresql environment Domain allowed access. The role to be allowed to manage the postgresql domain.

Allow postgresql to use ssh and rsync for point-in-time recovery

Allow unprivileged users to execute DDL statement

Allow database admins to execute DML statement

Postfix grey-listing server Write to postgrey socket Domain allowed to talk to postgrey Search the spool directory Domain allowed access All of the rules required to administrate an postgrey environment Domain allowed access. The role to be allowed to manage the postgrey domain. Point to Point Protocol daemon creates links in ppp networks Use PPP file discriptors. Domain allowed access. Do not audit attempts to inherit and use PPP file discriptors. Domain to not audit. Send a SIGCHLD signal to PPP. Domain allowed access. Send ppp a kill signal Domain allowed access. Send a generic signal to PPP. Domain allowed access. Send a generic signull to PPP. Domain allowed access. Execute domain in the ppp domain. Domain allowed access. Conditionally execute ppp daemon on behalf of a user or staff type. Domain allowed access. The role to allow the ppp domain. Unconditionally execute ppp daemon on behalf of a user or staff type. Domain allowed access. The role to allow the ppp domain. Execute domain in the ppp caller. Domain allowed access. Read ppp configuration files. Domain allowed access. Read PPP-writable configuration files. Domain allowed access. Read PPP secrets. Domain allowed access. Read PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Execute ppp server in the ntpd domain. The type of the process performing this action. All of the rules required to administrate an ppp environment Domain allowed access. Role allowed access.

Allow pppd to load kernel modules for certain modems

Allow pppd to be run for a regular user

Prelude hybrid intrusion detection system Execute a domain transition to run prelude. Domain allowed to transition. Execute a domain transition to run prelude_audisp. Domain allowed to transition. Signal the prelude_audisp domain. Domain allowed acccess. Read the prelude spool files Domain allowed access. Manage to prelude-manager spool files. Domain allowed to transition. All of the rules required to administrate an prelude environment Domain allowed access. Role allowed access. Privacy enhancing web proxy. All of the rules required to administrate an privoxy environment Domain allowed access. Role allowed access.

Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports.

Procmail mail delivery agent Execute procmail with a domain transition. Domain allowed access. Execute procmail in the caller domain. Domain allowed access. Read procmail tmp files. Domain allowed access. Read/write procmail tmp files. Domain allowed access. Read procmail home directory content Domain allowed access. Intrusion Detection and Log Analysis with iptables Execute a domain transition to run psad. Domain allowed to transition. Send a generic signal to psad Domain allowed access. Send a null signal to psad. Domain allowed access. Read psad etc configuration files. Domain allowed access. Manage psad etc configuration files. Domain allowed access. Read psad PID files. Domain allowed access. Read psad PID files. Domain allowed access. Allow the specified domain to read psad's log files. Domain allowed access. Allow the specified domain to append to psad's log files. Domain allowed access. Allow the specified domain to write to psad's log files. Domain allowed access. Read and write psad fifo files. Domain allowed access. Read and write psad tmp files. Domain allowed access. All of the rules required to administrate an psad environment Domain allowed access. The role to be allowed to manage the syslog domain. publicfile supplies files to the public through HTTP and FTP Puppet client daemon

Puppet is a configuration management system written in Ruby. The client daemon is responsible for periodically requesting the desired system state from the server and ensuring the state of the client system matches.

Execute puppet_master in the puppet_master domain. Domain allowed to transition. Read / Write to Puppet temp files. Puppet uses some system binaries (groupadd, etc) that run in a non-puppet domain and redirects output into temp files. Domain allowed access Allow the specified domain to read puppet's config files. Domain allowed access. Allow the specified domain to read puppet's log files. Domain allowed access. Allow the specified domain to create puppet's log files. Domain allowed access. Allow the specified domain to append puppet's log files. Domain allowed access. Read Puppet lib files. Domain allowed access. Manage Puppet lib files. Domain allowed access. Allow the specified domain to search puppet's log files. Domain allowed access. Allow the specified domain to search puppet's pid files. Domain allowed access. Execute puppet in the puppet domain. Domain allowed to transition. Execute puppet in the puppet domain and allow the specified role the puppetca domain. Domain allowed to transition. Role allowed access.

Allow Puppet client to manage all file types.

Allow Puppet master to use connect to mysql and postgresql database

Server for the PXE network boot protocol PyICQt is an ICQ transport for XMPP server. Pyzor is a distributed, collaborative spam detection and filtering network. Role access for pyzor Role allowed access User domain for the role Send generic signals to pyzor Domain allowed access. Execute pyzor with a domain transition. Domain allowed access. Execute pyzor in the caller domain. Domain allowed access. All of the rules required to administrate an pyzor environment Domain allowed access. The role to be allowed to manage the pyzor domain. Qmail Mail Server Transition to qmail_inject_t Domain allowed access Transition to qmail_queue_t Domain allowed access Read qmail configuration files. Domain allowed access. Define the specified domain as a qmail-smtp service. Needed by antivirus/antispam filters. Domain allowed access The type associated with the process program. Create, read, write, and delete qmail spool directories. Domain allowed access. Create, read, write, and delete qmail spool files. Domain allowed access. Read and write to qmail spool pipes. Domain to not audit. policy for qpidd Execute a domain transition to run qpidd. Domain allowed to transition. Execute qpidd server in the qpidd domain. The type of the process performing this action. Execute qpidd server in the qpidd domain. The type of the process performing this action. Read qpidd PID files. Domain allowed access. Manage qpidd var_run files. Domain allowed access. Search qpidd lib directories. Domain allowed access. Read qpidd lib files. Domain allowed access. Create, read, write, and delete qpidd lib files. Domain allowed access. Manage qpidd var_lib files. Domain allowed access. All of the rules required to administrate an qpidd environment Domain allowed access. Role allowed access. Allow read and write access to qpidd semaphores. Domain allowed access. Read and write to qpidd shared memory. The type of the process performing this action. Quantum is a virtual network service for Openstack Transition to neutron. Domain allowed to transition. Read neutron's log files. Domain allowed access. Append to neutron log files. Domain allowed access. Manage neutron log files Domain allowed access. Search neutron lib directories. Domain allowed access. Read neutron lib files. Domain allowed access. Manage neutron lib files. Domain allowed access. Manage neutron lib directories. Domain allowed access. Read and write neutron fifo files. Domain allowed access. Allow domain to send sigchld to neutron process. Domain allowed access. Connect to neutron over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an neutron environment Domain allowed access. RADIUS authentication and accounting server. Use radius over a UDP connection. (Deprecated) Domain allowed access. All of the rules required to administrate an radius environment Domain allowed access. Role allowed access. IPv6 router advertisement daemon Read radvd PID files. Domain allowed access. All of the rules required to administrate an radvd environment Domain allowed access. Role allowed access. A distributed, collaborative, spam detection and filtering network.

A distributed, collaborative, spam detection and filtering network.

This policy will work with either the ATrpms provided config file in /etc/razor, or with the default of dumping everything into $HOME/.razor.

Role access for razor Role allowed access User domain for the role Execute razor in the system razor domain. Domain allowed access. read razor lib files. Domain allowed access.
Network router discovery daemon Execute rdisc in the caller domain. Domain allowed access. Advanced key-value store Execute redis server in the redis domin. Domain allowed to transition. Execute redis server in the redis domain. Domain allowed access. Read redis's log files. Domain allowed access. Append to redis log files. Domain allowed access. Manage redis log files Domain allowed access. Search redis lib directories. Domain allowed access. Read redis lib files. Domain allowed access. Manage redis lib files. Domain allowed access. Manage redis lib directories. Domain allowed access. Read redis PID files. Domain allowed access. Connect to redis over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an redis environment Domain allowed access. Role allowed access. Policy for rshd, rlogind, and telnetd. Domain transition to the remote login domain. The type of the process performing this action. allow Domain to signal remote login domain. The type of the process performing this action. Resource management daemon Connect to resmgrd over a unix domain stream socket. Domain allowed access. SELinux policy for rgmanager Execute a domain transition to run rgmanager. Domain allowed to transition. Allow read and write access to rgmanager semaphores. Domain allowed access. Connect to rgmanager over an unix stream socket. Domain allowed access. Allow manage rgmanager tmpfs files. The type of the process performing this action. Allow manage rgmanager tmp files. The type of the process performing this action. Allow manage rgmanager pid files. The type of the process performing this action. All of the rules required to administrate an rgmanager environment Domain allowed access. The role to be allowed to manage the rgmanager domain. Allow the specified domain to manage rgmanager's lib/run files. Domain allowed access. Allow the specified domain to search rgmanager's lib files. Domain allowed access.

Allow rgmanager domain to connect to the network using TCP.

RHCS - Red Hat Cluster Suite Execute a domain transition to run dlm_controld. Domain allowed to transition. Connect to dlm_controld over a unix domain stream socket. Domain allowed access. Allow read and write access to dlm_controld semaphores. Domain allowed access. Execute a domain transition to run fenced. Domain allowed access. Allow a domain to getattr on fenced executable. Domain allowed to transition. Allow read and write access to fenced semaphores. Domain allowed access. Send and receive messages from fenced over dbus. Domain allowed access. Connect to fenced over an unix domain stream socket. Domain allowed access. Execute a domain transition to run gfs_controld. Domain allowed access. Allow read and write access to gfs_controld semaphores. Domain allowed access. Read and write to gfs_controld_t shared memory. Domain allowed access. Connect to gfs_controld_t over an unix domain stream socket. Domain allowed access. Execute a domain transition to run groupd. Domain allowed access. Connect to groupd over a unix domain stream socket. Domain allowed access. Allow read and write access to groupd semaphores. Domain allowed access. Read and write to group shared memory. Domain allowed access. Read and write to cluster domains shared memory. Domain allowed access. Read and write access to cluster domains semaphores. Domain allowed access. Connect to cluster domains over a unix domain stream socket. Domain allowed access. Connect to cluster domains over a unix domain stream socket. Domain allowed access. Domain allowed access. Execute a domain transition to run qdiskd. Domain allowed access. Allow domain to read qdiskd tmpfs files Domain allowed access. Execute a domain transition to run cluster administrative domain. Domain allowed to transition. Execute cluster init scripts in the init script domain. Domain allowed to transition. Execute cluster in the caller domain. Domain allowed access. Read cluster log files. Domain allowed access. Setattr cluster log files. Domain allowed access. Allow the specified domain to read/write inherited cluster's tmpf files. Domain allowed access. Allow manage cluster tmp files. Domain allowed access. Allow the specified domain to read/write cluster's tmpfs files. Domain allowed access. Allow manage cluster tmpfs files. Domain allowed access. Allow manage cluster pid files. Domain allowed access. Allow read cluster pid files. Domain allowed access. Allow domain to read cluster lib files Domain allowed access. Allow domain to manage cluster lib files Domain allowed access. Allow domain to relabel cluster lib files Domain allowed access. Send and receive messages from a cluster service over dbus. Domain allowed access.

Allow fenced domain to connect to the network using TCP.

Allow fenced domain to execute ssh.

Allow cluster administrative domains to connect to the network using TCP.

Allow cluster administrative domains to manage all files on a system.

Allow cluster administrative cluster domains memcheck-amd64- to use executable memory

rhev polic module contains policies for rhev apps Execute rhev-agentd in the rhev_agentd domain. Domain allowed access. Read rhev-agentd PID files. Domain allowed access. Connect to rhev_agentd over a unix domain stream socket. Domain allowed access. Send sigchld to rhev-agentd Domain allowed access Allow attempts to read and write to rhev-agentd pipes Domain allowed access Red Hat Graphical Boot RHGB stub interface. No access allowed. N/A Use a rhgb file descriptor. The type of the process performing this action. Get the process group of rhgb. Domain allowed access. Send a signal to rhgb. Domain allowed access. Read and write to unix stream sockets. The type of the process performing this action. Do not audit attempts to read and write rhgb unix domain stream sockets. The type of the process performing this action. Connected to rhgb unix stream socket. The type of the process performing this action. Read and write to rhgb shared memory. The type of the process performing this action. Read from and write to the rhgb devpts. Domain allowed access. dontaudit Read from and write to the rhgb devpts. Domain allowed access. Read and write to rhgb temporary file system. The type of the process performing this action. policy for rhnsd Transition to rhnsd. Domain allowed to transition. Execute rhnsd server in the rhnsd domain. Domain allowed access. Allow the specified domain to manage rhnsd configuration files. Domain allowed access. All of the rules required to administrate an rhnsd environment Domain allowed access. Role allowed access. Subscription Management Certificate Daemon policy Transition to rhsmcertd. Domain allowed to transition. Execute rhsmcertd server in the rhsmcertd domain. Domain allowed access. Read rhsmcertd's log files. Domain allowed access. Append to rhsmcertd log files. Domain allowed access. Manage rhsmcertd log files Domain allowed access. Search rhsmcertd lib directories. Domain allowed access. Read rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib directories. Domain allowed access. Read rhsmcertd PID files. Domain allowed access. Connect to rhsmcertd over a unix domain stream socket. Domain allowed access. Send and receive messages from rhsmcertd over dbus. Domain allowed access. Dontaudit Send and receive messages from rhsmcertd over dbus. Domain allowed access. All of the rules required to administrate an rhsmcertd environment Domain allowed access. Role allowed access. Ricci cluster management agent Execute a domain transition to run ricci. Domain allowed to transition. Execute ricci server in the ricci domain. The type of the process performing this action. Execute a domain transition to run ricci_modcluster. Domain allowed to transition. Do not audit attempts to use ricci_modcluster file descriptors. The type of process not to audit. Do not audit attempts to read write ricci_modcluster unamed pipes. The type of process not to audit. Connect to ricci_modclusterd over an unix stream socket. Domain allowed access. Read and write to ricci_modclusterd temporary file system. Domain allowed access. Execute a domain transition to run ricci_modlog. Domain allowed to transition. Execute a domain transition to run ricci_modrpm. Domain allowed to transition. Execute a domain transition to run ricci_modservice. Domain allowed to transition. Execute a domain transition to run ricci_modstorage. Domain allowed to transition. Allow the specified domain to read ricci's lib files. Domain allowed access. Allow the specified domain to manage ricci's lib files. Domain allowed access. All of the rules required to administrate an ricci environment Domain allowed access. Role allowed access. Remote login daemon Execute rlogind in the rlogin domain. The type of the process performing this action. read rlogin homedir content (.config) Domain allowed access. Roundup Issue Tracking System policy All of the rules required to administrate an roundup environment Domain allowed access. The role to be allowed to manage the roundup domain. Remote Procedure Call Daemon for managment of network based process communication RPC stub interface. No access allowed. Domain allowed access. Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) The type of the process performing this action. Do not audit attempts to get the attributes of the NFS export file. The type of the process performing this action. Allow read access to exports. The type of the process performing this action. Allow write access to exports. The type of the process performing this action. Execute domain in nfsd domain. The type of the process performing this action. Execute domain in nfsd domain. Domain allowed access. Execute domain in rpcd domain. The type of the process performing this action. Send kill signals to rpcd. Domain allowed access. Execute rpcd in the rcpd domain, and allow the specified role the rpcd domain. Domain allowed to transition. Role allowed access. Execute domain in rpcd domain. Domain allowed access. Read NFS exported content. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to read and write to an NFS UDP socket. Domain allowed access. Send UDP traffic to NFSd. (Deprecated) Domain allowed access. Search NFS state data in /var/lib/nfs. Domain allowed access. Read NFS state data in /var/lib/nfs. Domain allowed access. Manage NFS state data in /var/lib/nfs. Domain allowed access.

Allow gssd to read temp directory. For access to kerberos tgt.

Universal Addresses to RPC Program Number Mapper Execute a domain transition to run rpcbind. Domain allowed to transition. Connect to rpcbindd over an unix stream socket. Domain allowed access. Read rpcbind PID files. Domain allowed access. Search rpcbind lib directories. Domain allowed access. Read rpcbind lib files. Domain allowed access. Create, read, write, and delete rpcbind lib files. Domain allowed access. All of the rules required to administrate an rpcbind environment Domain allowed access. The role to be allowed to manage the rpcbind domain. Remote shell service. Domain transition to rshd. The type of the process performing this action. Fast incremental file transfer for synchronization Make rsync an entry point for the specified domain. The domain for which init scripts are an entrypoint. Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Execute rsync in the caller domain domain. Domain allowed access. Read rsync config files. Domain allowed. Write to rsync config files. Domain allowed. Manage rsync config files. Domain allowed. Create objects in the amavis spool directories with a private type. Domain allowed access. Class of the object being created.

Allow rsync to run as a client

Allow rsync to run as a server

Allow rsync to export any files/directories read only.

Allow rsync to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow rsync servers to share cifs files systems

Allow rsync servers to share nfs files systems

Platform diagnostics report firmware events. Execute rtas_errd in the rtas_errd domin. Domain allowed to transition. Read rtas_errd's log files. Domain allowed access. Append to rtas_errd log files. Domain allowed access. Manage rtas_errd log files Domain allowed access. Read rtas_errd PID files. Domain allowed access. All of the rules required to administrate an rtas_errd environment Domain allowed access. Realtime scheduling for user processes. Execute a domain transition to run rtkit_daemon. Domain allowed to transition. Send and receive messages from rtkit_daemon over dbus. Domain allowed access. Do not audit send and receive messages from rtkit_daemon over dbus. Domain allowed access. Allow rtkit to control scheduling for your process Domain allowed access. Who is logged in on other machines? Execute a domain transition to run rwho. Domain allowed to transition. Search rwho log directories. Domain allowed access. Read rwho log files. Domain allowed access. Search rwho spool directories. Domain allowed access. Read rwho spool files. Domain allowed access. Create, read, write, and delete rwho spool files. Domain allowed access. All of the rules required to administrate an rwho environment Domain allowed access. The role allowed access. SMB and CIFS client/server programs for UNIX and name Service Switch daemon for resolving names from Windows NT servers. Execute nmbd net in the nmbd_t domain. The type of the process performing this action. Execute samba server in the samba domain. The type of the process performing this action. Execute samba net in the samba_net domain. The type of the process performing this action. Execute samba net in the samba_unconfined_net domain. The type of the process performing this action. Execute samba net in the samba_net domain, and allow the specified role the samba_net domain. The type of the process performing this action. The role to be allowed the samba_net domain. Execute samba net in the samba_unconfined_net domain, and allow the specified role the samba_unconfined_net domain. The type of the process performing this action. The role to be allowed the samba_unconfined_net domain. Execute smbmount in the smbmount domain. The type of the process performing this action. Execute smbmount interactively and do a domain transition to the smbmount domain. Domain allowed acces. The role to be allowed the smbmount domain. Allow the specified domain to read samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read samba's log files. Domain allowed access. Allow the specified domain to append to samba's log files. Domain allowed access. Execute samba log in the caller domain. The type of the process performing this action. Allow the specified domain to read samba's secrets. Domain allowed access. Allow the specified domain to read samba's shares Domain allowed access. Allow the specified domain to search samba /var directories. Domain allowed access. Allow the specified domain to read samba /var files. Domain allowed access. Do not audit attempts to write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var directories. Domain allowed access. Execute a domain transition to run smbcontrol. Domain allowed to transition. Execute smbcontrol in the smbcontrol domain, and allow the specified role the smbcontrol domain. Domain allowed access The role to be allowed the smbcontrol domain. Execute smbd in the smbd_t domain. The type of the process performing this action. Do not audit attempts to use file descriptors from samba. Domain to not audit. Allow the specified domain to write to smbmount tcp sockets. Domain allowed access. Allow the specified domain to read and write to smbmount tcp sockets. Domain allowed access. Execute winbind_helper in the winbind_helper domain. The type of the process performing this action. Execute winbind_helper in the winbind_helper domain, and allow the specified role the winbind_helper domain. The type of the process performing this action. The role to be allowed the winbind_helper domain. Allow the specified domain to read the winbind pid files. Domain allowed access. Allow domain to signull winbind Domain allowed access. Allow domain to signal samba Domain to not audit. Connect to nmbd. Domain allowed access. Allow domain to signal samba Domain to not audit. Connect to winbind. Domain allowed access. Search the samba pid directory. Domain to not audit. Allow domain to signull samba_unconfined_net Domain allowed access. Set attributes of samba_share directories. Domain allowed access. All of the rules required to administrate an samba environment Domain allowed access. The role to be allowed to manage the samba domain.

Allow samba to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow samba to create new home directories (e.g. via PAM)

Allow samba to act as the domain controller, add users, groups and change passwords.

Allow samba to act as a portmapper

Allow samba to share users home directories.

Allow samba to share any file/directory read only.

Allow samba to share any file/directory read/write.

Allow samba to run unconfined scripts

Allow samba to export NFS volumes.

Allow samba to export ntfs/fusefs volumes.

Allow smbd to load libgfapi from gluster.

policy for sanlock Execute a domain transition to run sanlock. Domain allowed access. Execute sanlock server in the sanlock domain. The type of the process performing this action. Create, read, write, and delete sanlock PID files. Domain allowed access. Connect to sanlock over an unix stream socket. Domain allowed access. All of the rules required to administrate an sanlock environment Domain allowed access. Role allowed access.

Allow sanlock to manage nfs files

Allow sanlock to manage cifs files

Allow sanlock to read/write fuse files

SASL authentication server Connect to SASL. Domain allowed access. All of the rules required to administrate an sasl environment Domain allowed access. Role allowed access.

Allow sasl to read shadow

Standards Based Linux Instrumentation for Manageability. Transition to gatherd. Domain allowed to transition. Read gatherd PID files. Domain allowed access. Connect to sblim_sfcb over a unix stream socket. Domain allowed access. Getattr on sblim executable. Domain allowed to transition. Connect to sblim_sfcb over a unix stream socket. Domain allowed access. Allow read and write access to sblim semaphores. Domain allowed access. All of the rules required to administrate an gatherd environment Domain allowed access. Policy for sendmail. Sendmail stub interface. No access allowed. Domain allowed access. Allow attempts to read and write to sendmail unnamed pipes. Domain to not audit. Domain transition to sendmail. Domain allowed access. Execute sendmail in the sendmail domain. The type of the process performing this action. Execute the sendmail program in the sendmail domain. Domain allowed access. The role to allow the sendmail domain. Send generic signals to sendmail. Domain allowed access. Read and write sendmail TCP sockets. Domain allowed access. Do not audit attempts to read and write sendmail TCP sockets. Domain to not audit. Read and write sendmail unix_stream_sockets. Domain allowed access. Do not audit attempts to read and write sendmail unix_stream_sockets. Domain allowed access. Read sendmail logs. Domain allowed access. Create, read, write, and delete sendmail logs. Domain allowed access. Create sendmail logs with the correct type. Domain allowed access. Manage sendmail tmp files. Domain allowed access. Execute sendmail in the unconfined sendmail domain, and allow the specified role the unconfined sendmail domain, and use the caller's terminal. Domain allowed access. Role allowed access. Execute sendmail in the unconfined sendmail domain. Domain allowed access. All of the rules required to administrate an sendmail environment Domain allowed access. Role allowed access. Sensor information logging daemon Execute sensord in the sensord domain. Domain allowed to transition. All of the rules required to administrate an sensord environment Domain allowed access. SELinux troubleshooting service Connect to setroubleshootd over an unix stream socket. Domain allowed access. Dontaudit attempts to connect to setroubleshootd over an unix stream socket. Domain allowed access. Send and receive messages from setroubleshoot over dbus. Domain allowed access. dontaudit send and receive messages from setroubleshoot over dbus. Domain to not audit. Send and receive messages from setroubleshoot over dbus. Domain allowed access. Dontaudit read/write to a setroubleshoot leaked sockets. Domain allowed access. All of the rules required to administrate an setroubleshoot environment Domain allowed access. Policy for gridengine MPI jobs

Allow sge to access nfs file systems.

Allow sge to connect to the network using any TCP port

OpenSLP server daemon to dynamically register services. Transition to slpd. Domain allowed to transition. Execute slpd server in the slpd domain. Domain allowed access. All of the rules required to administrate an slpd environment Domain allowed access. Role allowed access. Service for downloading news feeds the slrn newsreader. Allow the domain to search slrnpull spools. domain allowed access Allow the domain to create, read, write, and delete slrnpull spools. domain allowed access Smart disk monitoring daemon policy Allow caller to read smartmon temporary files. The process type reading the temporary files. All of the rules required to administrate an smartmon environment Domain allowed access. Role allowed access.

Enable additional permissions needed to support devices on 3ware controllers.

Smokeping network latency measurement. Execute a domain transition to run smokeping. Domain allowed to transition. Execute smokeping server in the smokeping domain. Domain allowed access. Read smokeping PID files. Domain allowed access. Manage smokeping PID files. Domain allowed access. Get attributes of smokeping lib files. Domain allowed access. Read smokeping lib files. Domain allowed access. Manage smokeping lib files. Domain allowed access. All of the rules required to administrate a smokeping environment Domain allowed access. Role allowed access. Tools to send and receive short messages through GSM modems or mobile phones. Search smsd lib directories. Domain allowed access. Read smsd lib files. Domain allowed access. Manage smsd lib files. Domain allowed access. Manage smsd lib directories. Domain allowed access. All of the rules required to administrate an smstools environment. Domain allowed access. Role allowed access. Simple network management protocol services Connect to snmpd using a unix domain stream socket. Domain allowed access. Use snmp over a TCP connection. (Deprecated) Domain allowed access. Send and receive UDP traffic to SNMP (Deprecated) Domain allowed access. Read snmpd libraries. Domain allowed access. Read snmpd libraries directories Domain allowed access. Manage snmpd libraries directories Domain allowed access. Append snmpd libraries. Domain allowed access. Manage snmpd libraries files. Domain allowed access. dontaudit Read snmpd libraries. Domain to not audit. dontaudit write snmpd libraries files. Domain to not audit. All of the rules required to administrate an snmp environment Domain allowed access. The role to be allowed to manage the snmp domain. Snort network intrusion detection system Execute a domain transition to run snort. Domain allowed to transition. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the snort domain. sound server for network audio server programs, nasd, yiff, etc Connect to the sound server over a TCP socket (Deprecated) Domain allowed access. All of the rules required to administrate an soundd environment Domain allowed access. The role to be allowed to manage the soundd domain. Filter used for removing unsolicited email. Role access for spamassassin Role allowed access User domain for the role Execute the standalone spamassassin program in the caller directory. Domain allowed access. Singnal the spam assassin daemon The type of the process performing this action. Execute the spamassassin daemon program in the caller directory. Domain allowed access. Execute spamassassin client in the spamassassin client domain. Domain allowed access. Send kill signal to spamassassin client Domain allowed access. Manage spamc home files. Domain allowed access. Execute the spamassassin client program in the caller directory. Domain allowed access. Execute spamassassin standalone client in the user spamassassin domain. Domain allowed access. read spamd lib files. Domain allowed access. Create, read, write, and delete spamd lib files. Domain allowed access. Read temporary spamd file. The type of the process performing this action. Do not audit attempts to get attributes of temporary spamd sockets/ Domain to not audit. Connect to run spamd. Domain allowed to connect. Read spamd pid file. Domain allowed to connect. All of the rules required to administrate an spamassassin environment Domain allowed access. The role to be allowed to manage the spamassassin domain.

Allow user spamassassin clients to use the network.

Allow spamd to read/write user home directories.

Alcatel speedtouch USB ADSL modem Squid caching http proxy server Execute squid in the squid domain. The type of the process performing this action. Execute squid The type of the process performing this action. Send generic signals to squid. Domain allowed access. Allow read and write squid unix domain stream sockets. Domain allowed access. Do not audit attempts to search squid cache dirs Domain to not audit. Read squid configuration file. Domain allowed access. Append squid logs. Domain allowed access. Append squid logs. Domain allowed access. Create, read, write, and delete squid logs. Domain allowed access. Use squid services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an squid environment Domain allowed access. The role to be allowed to manage the squid domain.

Allow squid to connect to all ports, not just HTTP, FTP, and Gopher ports.

Allow squid to run as a transparent proxy (TPROXY)

Secure shell client and server policy. Send a SIGCHLD signal to the ssh server. Domain allowed access. Send a generic signal to the ssh server. Domain allowed access. Read a ssh server unnamed pipe. Domain allowed access. Read and write a ssh server unnamed pipe. Domain allowed access. Read and write ssh server unix domain stream sockets. Domain allowed access. Read and write ssh server unix dgram sockets. Domain allowed access. Read and write ssh server TCP sockets. Domain allowed access. Do not audit attempts to read and write ssh server TCP sockets. Domain to not audit. Connect to SSH daemons over TCP sockets. (Deprecated) Domain allowed access. Execute the ssh daemon sshd domain. Domain allowed access. Execute sshd server in the sshd domain. The type of the process performing this action. Execute the ssh client in the caller domain. Domain allowed access. Set the attributes of sshd key files. Domain allowed access. Execute the ssh agent client in the caller domain. Domain allowed access. Read ssh home directory content Domain allowed access. Execute the ssh key generator in the ssh keygen domain. Domain allowed access. Execute the ssh key generator in the caller domain. Domain allowed to transition. Execute ssh-keygen in the iptables domain, and allow the specified role the ssh-keygen domain. Domain allowed to transition. Role allowed access. Read ssh server keys Domain allowed access. Manage ssh home directory content Domain allowed access. Create Secure Shell home directory content. Domain allowed access. Delete from the ssh temp files. Domain allowed access. Send a null signal to sshd processes. Domain allowed access. Allow domain dyntransition to chroot_user_t domain. Domain allowed access. Getattr ssh home directory Domain allowed access. Dontaudit search ssh home directory Domain allowed access. Do not audit attempts to read and write the sshd pty type. Domain to not audit. Read and write inherited sshd pty type. Domain to not audit. All of the rules required to administrate an sshd environment Domain allowed access. Role allowed access.

allow host key based authentication

Allow ssh logins as sysadm_r:sysadm_t

Allow ssh with chroot env to read and write files in the user home directories

Allow ssh with chroot env to manage all files

Allow ssh with chroot env to apache content

System Security Services Daemon Execute a domain transition to run sssd. Domain allowed to transition. Execute sssd server in the sssd domain. Domain allowed access. Read sssd public files. Domain allowed access. Read sssd PID files. Domain allowed access. Manage sssd var_run files. Domain allowed access. Search sssd lib directories. Domain allowed access. Do not audit attempts to search sssd lib directories. Domain to not audit. Read sssd lib files. Domain allowed access. Create, read, write, and delete sssd lib files. Domain allowed access. Send and receive messages from sssd over dbus. Domain allowed access. Connect to sssd over an unix stream socket. Domain allowed access. Allow attempts to read and write to sssd pipes Domain allowed access. All of the rules required to administrate an sssd environment Domain allowed access. The role to be allowed to manage the sssd domain. Instrumentation System Server Execute stapserver in the stapserver domain. Domain allowed to transition. Read stapserver's log files. Domain allowed access. Append to stapserver log files. Domain allowed access. Manage stapserver log files Domain allowed access. Read stapserver PID files. Domain allowed access. Manage stapserver lib files Domain allowed access. All of the rules required to administrate an stapserver environment Domain allowed access. SSL Tunneling Proxy Define the specified domain as a stunnel inetd service. The type associated with the stunnel inetd service process. The type associated with the process program. policy for svnserve Transition to svnserve. Domain allowed to transition. Execute svnserve server in the svnserve domain. Domain allowed access. Read svnserve PID files. Domain allowed access. All of the rules required to administrate an svnserve environment Domain allowed access. policy for swift Execute TEMPLATE in the swift domin. Domain allowed to transition. Read swift PID files. Domain allowed access. Manage swift data files. Domain allowed access. Read and write swift lock files. Domain allowed access. Transition content labels to swift named content Domain allowed access.

Determine whether swift can connect to all TCP ports

Policy for sysstat. Reports on various system states Manage sysstat logs. Domain allowed access. Policy for TCP daemon. Execute tcpd in the tcpd domain. The type of the process performing this action. Create a domain for services that utilize tcp wrappers. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Telnet daemon Trivial file transfer protocol daemon Read tftp content Domain allowed access. Manage tftp /var/lib files. Domain allowed access. Search tftp /var/lib directories. Domain allowed access. Search tftp /var/lib directories. Domain allowed access. Manage tftp /var/lib files. Domain allowed access. Create objects in tftpdir directories with specified types. Domain allowed access. Private file type. Class of the object being created. All of the rules required to administrate an tftp environment Domain allowed access.

Allow tftp to modify public files used for public file transfer services.

Allow tftp to read from a NFS store for public file transfer services.

Allow tftp to read from a CIFS store for public file transfer services.

Linux Target Framework Daemon.

Linux target framework (tgt) aims to simplify various SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation and maintenance. Our key goals are the clean integration into the scsi-mid layer and implementing a great portion of tgt in user space.

Allow read and write access to tgtd semaphores. Domain allowed access. Manage tgtd sempaphores. Domain allowed access. Connect to tgtd using a unix domain stream socket. Domain allowed access.
MIDI to WAV converter and player configured as a service policy for tomcat Transition to tomcat. Domain allowed to transition. Search tomcat cache directories. Domain allowed access. Read tomcat cache files. Domain allowed access. Create, read, write, and delete tomcat cache files. Domain allowed access. Manage tomcat cache dirs. Domain allowed access. Read tomcat's log files. Domain allowed access. Append to tomcat log files. Domain allowed access. Manage tomcat log files Domain allowed access. Search tomcat lib directories. Domain allowed access. Read tomcat lib files. Domain allowed access. Manage tomcat lib files. Domain allowed access. Manage tomcat lib directories. Domain allowed access. Read tomcat PID files. Domain allowed access. All of the rules required to administrate an tomcat environment Domain allowed access. TOR, the onion router Execute a domain transition to run TOR. Domain allowed to transition. All of the rules required to administrate an tor environment Domain allowed access. The role to be allowed to manage the tor domain.

Allow tor daemon to bind tcp sockets to all unreserved ports.

HTTP transperant proxy Dynamic adaptive system tuning daemon Execute a domain transition to run tuned. Domain allowed to transition. Execute tuned in the caller domain. Domain allowed access. Read tuned PID files. Domain allowed access. Manage tuned PID files. Domain allowed access. Execute tuned server in the tuned domain. The type of the process performing this action. All of the rules required to administrate an tuned environment Domain allowed access. Role allowed access. ucspitcp policy

Policy for DJB's ucspi-tcpd

Define a specified domain as a ucspitcp service. Domain allowed access. The type associated with the process program.
Iptables/netfilter userspace logging daemon. Execute a domain transition to run ulogd. Domain allowed to transition. Allow the specified domain to read ulogd configuration files. Domain allowed access. Allow the specified domain to read ulogd's log files. Domain allowed access. Allow the specified domain to search ulogd's log files. Domain allowed to transition. Allow the specified domain to append to ulogd's log files. Domain allowed access. All of the rules required to administrate an ulogd environment Domain allowed access. The role to be allowed to manage the syslog domain. Uptime daemon USB multiplexing daemon for communicating with Apple iPod Touch and iPhone Execute a domain transition to run usbmuxd. Domain allowed to transition. Connect to usbmuxd over a unix domain stream socket. Domain allowed access. Unix to Unix Copy Execute the uucico program in the uucpd_t domain. Domain allowed to transition. Allow the specified domain to append to uucp log files. Domain allowed access. Create, read, write, and delete uucp spool files. Domain allowed access. Execute the master uux program in the uux_t domain. Domain allowed access. All of the rules required to administrate an uucp environment Domain allowed access. policy for uuidd Transition to uuidd. Domain allowed to transition. Execute uuidd server in the uuidd domain. Domain allowed access. Search uuidd lib directories. Domain allowed access. Read uuidd lib files. Domain allowed access. Manage uuidd lib files. Domain allowed access. Manage uuidd lib directories. Domain allowed access. Read uuidd PID files. Domain allowed access. Connect to uuidd over an unix stream socket. Domain allowed access. All of the rules required to administrate an uuidd environment Domain allowed access. Role allowed access. University of Washington IMAP toolkit POP3 and IMAP mail server Execute the UW IMAP/POP3 servers with a domain transition. Domain allowed access. Varnishd http accelerator daemon Execute varnishd in the varnishd domain. The type of the process performing this action. Execute varnishd The type of the process performing this action. Read varnishd configuration file. Domain allowed access. Read varnish lib files. Domain allowed access. Read varnish logs. Domain allowed access. Append varnish logs. Domain allowed access. Manage varnish logs. Domain allowed access. All of the rules required to administrate an varnishlog environment Domain allowed access. The role to be allowed to manage the varnishlog domain. All of the rules required to administrate an varnishd environment Domain allowed access. The role to be allowed to manage the varnishd domain.

Allow varnishd to connect to all ports, not just HTTP.

policy for vdagent Getattr on vdagent executable. Domain allowed to transition. Execute a domain transition to run vdagent. Domain allowed access. Get the attributes of vdagent logs. Domain allowed access. Read vdagent PID files. Domain allowed access. Connect to vdagent over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an vdagent environment Domain allowed access. Virtual host metrics daemon Execute a domain transition to run vhostmd. Domain allowed to transition. Execute vhostmd server in the vhostmd domain. The type of the process performing this action. Allow domain to read, vhostmd tmpfs files Domain to not audit. Do not audit attempts to read, vhostmd tmpfs files Domain to not audit. Allow domain to read and write vhostmd tmpfs files Domain to not audit. Create, read, write, and delete vhostmd tmpfs files. Domain to not audit. Read vhostmd PID files. Domain allowed access. Manage vhostmd var_run files. Domain allowed access. Connect to vhostmd over an unix domain stream socket. Domain allowed access. Dontaudit read and write to vhostmd over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an vhostmd environment Domain allowed access. Role allowed access. Libvirt virtualization API Make the specified type usable as a virt image Type to be used as a virtual image Getattr on virt executable. Domain allowed to transition. Execute a domain transition to run virt. Domain allowed to transition. Execute a domain transition to run virt. Domain allowed to transition. Role allowed to access. Transition to virt_bridgehelper. Domain allowed to transition. Connect to virt over an unix domain stream socket. Domain allowed access. Allow domain to attach to virt TUN devices Domain allowed access. Read virt config files. Domain allowed access. manage virt config files. Domain allowed access. Allow domain to search virt image files Domain to not audit. Allow domain to search virt image direcories Domain allowed access. Allow domain to manage virt image files Domain to not audit. Allow domain to write virt image files Domain to not audit. Read virt PID files. Domain allowed access. Read virt PID lnk files. Domain allowed access. Manage virt pid files. Domain allowed access. Search virt lib directories. Domain allowed access. Read virt lib files. Domain allowed access. Dontaudit inherited read virt lib files. Domain to not audit. Create, read, write, and delete virt lib files. Domain allowed access. Allow the specified domain to read virt's log files. Domain allowed access. Allow the specified domain to append virt log files. Domain allowed to transition. Allow domain to manage virt log files Domain to not audit. Allow domain to read virt blk image files Domain allowed access. Allow domain to read virt image files Domain to not audit. Allow domain to read virt image files Domain to not audit. Create, read, write, and delete svirt cache files. Domain allowed access. Allow domain to manage virt image files Domain to not audit. All of the rules required to administrate an virt environment Domain allowed access. Role allowed access. Execute qemu in the svirt domain, and allow the specified role the svirt domain. Domain allowed access The role to be allowed the svirt domain. Do not audit attempts to write virt daemon unnamed pipes. Domain allowed access. Send a sigkill to virtual machines Domain allowed access. Send a sigkill to virtd daemon Domain allowed access. Send a signal to virtual machines Domain allowed access. allow domain to read virt tmpf files Domain allowed access dontaudit domain to write virt tmp files Domain allowed access Allow domain to write virt tmp sock files Domain allowed access Execute Sandbox Files Domain allowed access. Manage Sandbox Files Domain allowed access. Relabel Sandbox File systems Domain allowed access. Mounton Sandbox Files Domain allowed access. Connect to virt over a unix domain stream socket. Domain allowed access.

Allow virt to use serial/parallell communication ports

Allow virt to read fuse files

Allow virt to manage nfs files

Allow virt to manage cifs files

Allow virt to manage device configuration, (pci)

Allow confined virtual guests to interact with the sanlock

Allow virtual machine to interact with the xserver

Allow virt to use usb devices

Allow confined virtual guests to use executable memory and executable stack

W3C Markup Validator Software watchdog. All of the rules required to administrate an watchdog environment. Domain allowed access. Role allowed access. policy for wdmd Execute a domain transition to run wdmd. Domain allowed access. Execute wdmd server in the wdmd domain. The type of the process performing this action. All of the rules required to administrate an wdmd environment Domain allowed access. Role allowed access. Connect to wdmd over an unix stream socket. Domain allowed access. Allow the specified domain to read/write wdmd's tmpfs files. Domain allowed access. Allow the specified domain to read/write wdmd's tmpfs files. Domain allowed access. X Windows Font Server Read a X font server named socket. Domain allowed access. Connect to a X font server over a unix domain stream socket. Domain allowed access. Allow the specified domain to execute xfs in the caller domain. Domain allowed access. X print server X Windows Server Rules required for using the X Windows server and environment, for restricted users. Role allowed access. Domain allowed access. Rules required for using the X Windows server and environment. Role allowed access. Domain allowed access. Create sessions on the X server, with read-only access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create sessions on the X server, with read and write access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create non-drawing client sessions on an X server. Domain allowed access. Create full client sessions on a user X server. Domain allowed access. The type of the domain SYSV tmpfs files. Read user fonts, user font configuration, and manage the user font cache.

Read user fonts, user font configuration, and manage the user font cache.

This is a templated interface, and should only be called from a per-userdomain template.

Domain allowed access.
Transition to the Xauthority domain. Domain allowed access. Allow exec of Xauthority program.. Domain allowed to transition. Dontaudit exec of Xauthority program. Domain allowed access. Create a Xauthority file in the user home directory. Domain allowed access. Read all users fonts, user font configurations, and manage all users font caches. Domain allowed access. Read all users .Xauthority. Domain allowed access. Set the attributes of the X windows console named pipes. Domain allowed access. Read and write the X windows console named pipe. Domain allowed access. Use file descriptors for xdm. Domain allowed access. Do not audit attempts to inherit XDM file descriptors. Domain to not audit. Read and write XDM unnamed pipes. Domain allowed access. Do not audit attempts to read and write XDM unnamed pipes. Domain to not audit. Connect to XDM over a unix domain stream socket. Domain allowed access. Read xdm-writable configuration files. Domain allowed access. Set the attributes of XDM temporary directories. Domain allowed access. Create a named socket in a XDM temporary directory. Domain allowed access. Read XDM pid files. Domain allowed access. Dontaudit Read XDM pid files. Domain allowed access. Read XDM var lib files. Domain allowed access. Make an X session script an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Execute an X session in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

Execute an Xsession in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. The type of the shell process.
Get the attributes of X server logs. Domain allowed access. Do not audit attempts to write the X server log files. Domain to not audit Do not audit attempts to write the X server log files. Domain to not audit Read X keyboard extension libraries. Domain to not audit Read xdm config files. Domain to not audit Manage xdm config files. Domain to not audit Read xdm temporary files. Domain to not audit Do not audit attempts to read xdm temporary files. Domain to not audit Read write xdm temporary files. Domain to not audit Create, read, write, and delete xdm temporary files. Domain to not audit dontaudit getattr xdm temporary named sockets. Domain to not audit Execute the X server in the X server domain. Domain allowed access. Signal X servers Domain to not audit Kill X servers Domain to not audit Read and write X server Sys V Shared memory segments. Domain allowed access. Do not audit attempts to read and write to X server sockets. Domain to not audit Do not audit attempts to read and write X server unix domain stream sockets. Domain allowed access. Connect to the X server over a unix domain stream socket. Domain allowed access. Dontaudit attempts to connect to xserver over an unix stream socket. Domain to not audit. Read X server temporary files. Domain to not audit Interface to provide X object permissions on a given X server to an X client domain. Gives the domain permission to read the virtual core keyboard and virtual core pointer devices. Domain allowed access. Interface to provide X object permissions on a given X server to an X client domain. Gives the domain complete control over the display. Domain allowed access. Dontaudit append to .xsession-errors file Domain to not audit append to .xsession-errors file Domain to not audit Manage the xdm_spool files Domain allowed access. Send and receive messages from xdm over dbus. Domain allowed access. Read xserver files created in /var/run Domain allowed access. Execute xserver files created in /var/run Domain allowed access. Write xserver files created in /var/run Domain allowed access. Allow append the xdm log files. Domain to not audit Read user homedir fonts. Domain allowed access. Search XDM var lib dirs. Domain allowed access. Make an X executable an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Execute xsever in the xserver domain, and allow the specified role the xserver domain. The type of the process performing this action. The role to be allowed the xserver domain. Execute xsever in the xserver domain, and allow the specified role the xserver domain. The type of the process performing this action. The role to be allowed the xserver domain. Read user homedir fonts. Domain allowed access.

Allows clients to write to the X server shared memory segments.

Allows XServer to execute writable memory

Allows xdm to execute bootloader

Allow xdm logins as sysadm

Support X userspace object manager

Allow regular users direct dri device access

Distributed infrastructure monitoring Execute a domain transition to run zabbix. Domain allowed to transition. Allow connectivity to the zabbix server Domain allowed access. Allow the specified domain to read zabbix's log files. Domain allowed access. Allow the specified domain to append zabbix log files. Domain allowed access. Read zabbix PID files. Domain allowed access. Allow the specified domain to read zabbix's log files. Domain allowed access. Read zabbix PID files. Domain allowed access. Allow connectivity to a zabbix agent Domain allowed access. All of the rules required to administrate an zabbix environment Domain allowed access. The role to be allowed to manage the zabbix domain.

Determine whether zabbix can connect to all TCP ports

Zarafa collaboration platform. Allow the specified domain to search zarafa configuration dirs. Domain allowed access. Execute a domain transition to run zarafa_deliver. Domain allowed to transition. Read zarafa_deliver executable. Domain allowed to transition. Execute a domain transition to run zarafa_server. Domain allowed to transition. Connect to zarafa-server unix domain stream socket. Domain allowed access. Allow the specified domain to manage zarafa /var/lib files. Domain allowed access. Allow the specified domain to manage zarafa /var/lib files. Domain allowed access. Zebra border gateway protocol network routing service Read the configuration files for zebra. Domain allowed access. Connect to zebra over an unix stream socket. Domain allowed access. All of the rules required to administrate an zebra environment Domain allowed access. The role to be allowed to manage the zebra domain.

Allow zebra daemon to write it configuration files

policy for z/OS Remote-services Audit dispatcher plugin Execute a domain transition to run audispd-zos-remote. Domain allowed to transition. Allow specified type and role to transition and run in the zos_remote_t domain. Allow specified type to use zos_remote_t terminal. Domain allowed access The role to be allowed the zos_remote domain.
Policy modules for system functions from init to multi-user login. Policy for user executable applications. Make the specified type usable as an application domain. Type to be used as a domain type. Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. Type to be used for files. Execute application executables in the caller domain. Domain allowed access. Execute all executable files. Domain allowed access. Create a domain for applications.

Create a domain for applications. Typically these are programs that are run interactively.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

Type to be used as an application domain. Type of the program to be used as an entry point to this domain.
Send signull to all application domains. Domain allowed access. Send signal to all application domains. Domain allowed access. Dontaudit signull sent to all application domains. Domain to not audit. Dontaudit signal sent to all application domains. Domain to not audit. Dontaudit kill signal sent to all application domains. Domain to not audit.
Common policy for authentication and user login. Role access for password authentication. Role allowed access. Domain allowed access. Use PAM for authentication. Domain allowed access. Make the specified domain used for a login program. Domain type used for a login program domain. Use the login program as an entry point program. The type of process using the login program as entry point. Execute a login_program in the target domain. Domain allowed access. The type of the login_program process. Execute a login_program in the target domain, with a range transition. Domain allowed access. The type of the login_program process. Range of the login program. Search authentication cache Domain allowed access. Read authentication cache Domain allowed access. Read/Write authentication cache Domain allowed access. Manage authentication cache Domain allowed access. Automatic transition from cache_t to cache. Domain allowed access. Run unix_chkpwd to check a password. Domain allowed access. Run unix_chkpwd to check a password. Stripped down version to be called within boolean Domain allowed access. Execute chkpwd programs in the chkpwd domain. Domain allowed access. The role to allow the chkpwd domain. Execute a domain transition to run unix_update. Domain allowed to transition. Execute updpwd programs in the updpwd domain. Domain allowed access. The role to allow the updpwd domain. Get the attributes of the shadow passwords file. Domain allowed access. Do not audit attempts to get the attributes of the shadow passwords file. Domain to not audit. Read the shadow passwords file (/etc/shadow) Domain allowed access. Pass shadow assertion for reading.

Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals.

Domain allowed access.
Pass shadow assertion for reading.

Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals.

Domain allowed access.
Read the shadow password file.

Read the shadow password file. This should only be used in a conditional; it does not pass the reading shadow assertion.

Domain allowed access.
Do not audit attempts to read the shadow password file (/etc/shadow). The type of the domain to not audit. Read and write the shadow password file (/etc/shadow). Domain allowed access. Create, read, write, and delete the shadow password file. Domain allowed access. Create, read, write, and delete the shadow password file. Domain allowed access. Automatic transition from etc to shadow. Domain allowed access. Relabel to the shadow password file type. Domain allowed access. Relabel from and to the shadow password file type. Domain allowed access. Append to the login failure log. Domain allowed access. Read and write the login failure log. Domain allowed access. Manage the login failure log. Domain allowed access. Read the last logins log. Domain allowed access. Append only to the last logins log. Domain allowed access. Read and write to the last logins log. Domain allowed access. Execute pam programs in the pam domain. Domain allowed access. Send generic signals to pam processes. Domain allowed access. Execute pam programs in the PAM domain. Domain allowed access. The role to allow the PAM domain. Execute the pam program. Domain allowed access. Manage var auth files. Used by various other applications and pam applets etc. Domain allowed access. Read PAM PID files. Domain allowed access. Do not audit attemps to read PAM PID files. Domain to not audit. Delete pam PID files. Domain allowed access. Manage pam PID files. Domain allowed access. Execute pam_console with a domain transition. Domain allowed access. Search the contents of the pam_console data directory. Domain allowed access. List the contents of the pam_console data directory. Domain allowed access. Read pam_console data files. Domain allowed access. Create, read, write, and delete pam_console data files. Domain allowed access. Delete pam_console data. Domain allowed access. Read all directories on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Relabel all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Read and write all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except the shadow passwords and listed exceptions. The type of the domain perfoming this action. The types to be excluded. Each type or attribute must be negated by the caller. Execute utempter programs in the utempter domain. Domain allowed access. Execute utempter programs in the utempter domain. Domain allowed access. The role to allow the utempter domain. Do not audit attemps to execute utempter executable. Domain to not audit. Set the attributes of login record files. Domain allowed access. Read login records files (/var/log/wtmp). Domain allowed access. Do not audit attempts to read login records files (/var/log/wtmp). Domain allowed access. Do not audit attempts to write to login records files. Domain to not audit. Append to login records (wtmp). Domain allowed access. Write to login records (wtmp). Domain allowed access. Read and write login records. Domain allowed access. Create a login records in the log directory using a type transition. Domain allowed access. Create, read, write, and delete login records files. Domain allowed access. Use nsswitch to look up user, password, group, or host information.

Allow the specified domain to look up user, password, group, or host information using the name service. The most common use of this interface is for services that do host name resolution (usually DNS resolution).

Domain allowed access.
Unconfined access to the authlogin module.

Unconfined access to the authlogin module.

Currently, this only allows assertions for the shadow passwords file (/etc/shadow) to be passed. No access is granted yet.

Domain allowed access.
Send generic signals to chkpwd processes. Domain allowed access.

Allow users to login using a radius server

Allow users login programs to access /etc/shadow.

Allow users to login using a yubikey OTP server or challenge response mode

Policy for reading and setting the hardware clock. Execute hwclock in the clock domain. The type of the process performing this action. Execute hwclock in the clock domain, and allow the specified role the hwclock domain. The type of the process performing this action. The role to be allowed the clock domain. Execute hwclock in the caller domain. The type of the process performing this action. Do not audit attempts to write clock drift adjustments. Domain to not audit. Read and write clock drift adjustments. Domain allowed access. Collection of tools for managing UNIX services

Policy for DJB's daemontools

An ipc channel between the supervised domain and svc_start_t Domain allowed access to svc_start_t. Define a specified domain as a supervised service. Domain allowed access. The type associated with the process program. Execute in the svc_start_t domain. Domain allowed access. Execute svc_start in the svc_start domain, and allow the specified role the svc_start domain. Domain allowed access. The role to be allowed the svc_start domain. Execute in the svc_run_t domain. Domain allowed access. Execute in the svc_multilog_t domain. Domain allowed access. Allow a domain to read svc_svc_t files. Domain allowed access. Search svc_svc_t directory. Domain allowed access. Allow a domain to create svc_svc_t files. Domain allowed access. Send a SIGCHLD signal to svc_run domain. Domain allowed access.
Tools for filesystem management, such as mkfs and fsck. Execute fs tools in the fstools domain. The type of the process performing this action. Execute fs tools in the fstools domain, and allow the specified role the fs tools domain. The type of the process performing this action. The role to be allowed the fs tools domain. Execute fsadm in the caller domain. The type of the process performing this action. Send signal to fsadm process Domain allowed access. Read fstools unnamed pipes. Domain allowed access. Relabel a file to the type used by the filesystem tools programs. The type of the process performing this action. Create, read, write, and delete a file used by the filesystem tools programs. The type of the process performing this action. Getattr swapfile The type of the process performing this action. Policy for getty. Execute gettys in the getty domain. Domain allowed access. Inherit and use getty file descriptors. Domain allowed access. Allow process to read getty log file. Domain allowed access. Allow process to read getty config file. Domain allowed access. Allow process to edit getty config file. Domain allowed access. Policy for changing the system host name. Execute hostname in the hostname domain. Domain allowed access. Execute hostname in the hostname domain, and allow the specified role the hostname domain. Domain allowed access. The role to be allowed the hostname domain. Execute hostname in the caller domain. Domain allowed access. Policy for hotplug system, for supporting the connection and disconnection of devices at runtime. Execute hotplug with a domain transition. Domain allowed access. Execute hotplug in the caller domain. Domain allowed access. Inherit and use hotplug file descriptors. Domain allowed access. Do not audit attempts to inherit hotplug file descriptors. Domain to not audit. Do not audit attempts to search the hotplug configuration directories. Domain to not audit. Get the attributes of the hotplug configuration directory. Domain allowed access. Search the hotplug configuration directory. Domain allowed access. Read the configuration files for hotplug. The type of the process performing this action. Search the hotplug PIDs. Domain allowed access. System initialization programs (init and init scripts). Create a file type used for init scripts.

Create a file type used for init scripts. It can not be used in conjunction with init_script_domain(). These script files are typically stored in the /etc/init.d directory.

Typically this is used to constrain what services an admin can start/stop. For example, a policy writer may want to constrain a web administrator to only being able to restart the web server, not other services. This special type will help address that goal.

This also makes the type usable for files; thus an explicit call to files_type() is redundant.

Type to be used for a script file.
Create a domain used for init scripts.

Create a domain used for init scripts. Can not be used in conjunction with init_script_file().

Type to be used as an init script domain. Type of the script file used as an entry point to this domain.
Create a domain which can be started by init. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Create a domain which can be started by init, with a range transition. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Range for the domain. Create a domain for long running processes (daemons/services) which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. Short running processes should use the init_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_daemon_domain() should be used instead.

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain.
Create initrc domain. Type to be used as a initrc daemon domain. Create initrc domain. Type to be used as a initrc daemon domain. Executable type. Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range.

Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range. Short running processes should use the init_ranged_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_daemon_domain().

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain. MLS/MCS range for the domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_daemon_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_system_domain() should be used instead.

Type to be used as a system domain. Type of the program to be used as an entry point to this domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_ranged_system_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_system_domain().

Type to be used as a system domain. Type of the program to be used as an entry point to this domain. Range for the domain.
Execute init (/sbin/init) with a domain transition. Domain allowed access. Execute the init program in the caller domain. Domain allowed access. Get the process group of init. Domain allowed access. Send init a null signal. Domain allowed access. Send init a SIGCHLD signal. Domain allowed access. Inherit and use file descriptors from init.

Allow the specified domain to inherit file descriptors from the init program (process ID 1). Typically the only file descriptors to be inherited from init are for the console. This does not allow the domain any access to the object to which the file descriptors references.

Related interfaces:

  • init_dontaudit_use_fds()
  • term_dontaudit_use_console()
  • term_use_console()

Example usage:

init_use_fds(mydomain_t) term_use_console(mydomain_t)

Normally, processes that can inherit these file descriptors (usually services) write messages to the system log instead of writing to the console. Therefore, in many cases, this access should dontaudited instead.

Example dontaudit usage:

init_dontaudit_use_fds(mydomain_t) term_dontaudit_use_console(mydomain_t)

Domain allowed access.
Do not audit attempts to inherit file descriptors from init. Domain allowed access. Send UDP network traffic to init. (Deprecated) Domain allowed access. Get the attributes of initctl. Domain allowed access. Do not audit attempts to get the attributes of initctl. Domain to not audit. Write to initctl. Domain allowed access. Use telinit (Read and write initctl). Domain allowed access. Read and write initctl. Domain allowed access. Do not audit attempts to read and write initctl. Domain allowed access. Make init scripts an entry point for the specified domain. The domain for which init scripts are an entrypoint. Execute init scripts with a specified domain transition. Domain allowed access. Execute init scripts with an automatic domain transition. Domain allowed access. Execute a file in a bin directory in the initrc_t domain Domain allowed access. Execute a init script in a specified domain.

Execute a init script in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain to transition from. Domain to transition to.
Transition to the init script domain on a specified labeled init script. Domain allowed access. Labeled init script file. Transition to the init script domain for all labeled init script types Domain allowed access Start and stop daemon programs directly.

Start and stop daemon programs directly in the traditional "/etc/init.d/daemon start" style, and do not require run_init.

Domain allowed access. The role to be performing this action.
Read the process state (/proc/pid) of init. Domain allowed access. Ptrace init Domain allowed access. Write an init script unnamed pipe. Domain allowed access. Get the attribute of init script entrypoint files. Domain allowed access. Read init scripts. Domain allowed access. Execute init scripts in the caller domain. Domain allowed access. Get the attribute of all init script entrypoint files. Domain allowed access. Read all init script files. Domain allowed access. Dontaudit read all init script files. Domain allowed access. Execute all init scripts in the caller domain. Domain allowed access. Read the process state (/proc/pid) of the init scripts. Domain allowed access. Inherit and use init script file descriptors. Domain allowed access. Do not audit attempts to inherit init script file descriptors. Domain allowed access. Get the process group ID of init scripts. Domain allowed access. Send SIGCHLD signals to init scripts. Domain allowed access. Connect to init with a unix socket. Domain allowed access. Send generic signals to init scripts. Domain allowed access. Send null signals to init scripts. Domain allowed access. Read and write init script unnamed pipes. Domain allowed access. Send UDP network traffic to init scripts. (Deprecated) Domain allowed access. Allow the specified domain to connect to init scripts with a unix socket. Domain allowed access. Allow the specified domain to read/write to init scripts with a unix domain stream sockets. Domain allowed access. Dont audit the specified domain connecting to init scripts with a unix domain stream socket. Domain allowed access. Send messages to init scripts over dbus. Domain allowed access. Send and receive messages from init over dbus. Domain allowed access. Send and receive messages from init scripts over dbus. Domain allowed access. Read and write the init script pty.

Read and write the init script pty. This pty is generally opened by the open_init_pty portion of the run_init program so that the daemon does not require direct access to the administrator terminal.

Domain allowed access.
Do not audit attempts to read and write the init script pty. Domain to not audit. Get the attributes of init script status files. Domain allowed access. Do not audit attempts to read init script status files. Domain allowed access. Read init script temporary data. Domain allowed access. Read and write init script temporary data. Domain allowed access. Read and write init script inherited temporary data. Domain allowed access. Create files in a init script temporary data directory. Domain allowed access. The type of the object to be created The object class. Get the attributes of init script process id files. Domain allowed access. Read utmp. Domain allowed access. Do not audit attempts to read utmp. Domain to not audit. Do not audit attempts to write utmp. Domain allowed access. Write to utmp. Domain allowed access. Do not audit attempts to lock init script pid files. Domain allowed access. Read and write utmp. Domain allowed access. Do not audit attempts to read and write utmp. Domain allowed access. Create, read, write, and delete utmp. Domain access allowed. Create files in /var/run with the utmp file type. Domain access allowed. Allow the specified domain to connect to daemon with a tcp socket Domain allowed access. Allow the specified domain to connect to daemon with a udp socket Domain allowed access. Transition to system_r when execute an init script

Execute a init script in a specified role

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Role to transition from.
dontaudit read and write an leaked init scrip file descriptors The type of the process performing this action. dontaudit read and write an leaked file descriptors Domain to not audit. Manage init script status files. Domain allowed access. Send generic signals to init. Domain allowed access.

Enable support for upstart as the init program.

Allow all daemons to use tcp wrappers.

Allow all daemons the ability to read/write terminals

Allow all daemons to write corefiles to /

Enable cluster mode for daemons.

TCP/IP encryption Execute ipsec in the ipsec domain. The type of the process performing this action. Execute ipsec in the ipsec_mgmt domain. The type of the process performing this action. Connect to IPSEC using a unix domain stream socket. The type of the process performing this action. Connect to racoon using a unix domain stream socket. The type of the process performing this action. Get the attributes of an IPSEC key socket. The type of the process performing this action. Execute the IPSEC management program in the caller domain. The type of the process performing this action. Read the IPSEC configuration The type of the process performing this action. Match the default SPD entry. Domain allowed access. Set the context of a SPD entry to the default context. Domain allowed access. write the ipsec_var_run_t files. Domain allowed access. Allow read the IPSEC pid files. Domain allowed access. Create, read, write, and delete the IPSEC pid files. The type of the process performing this action. Execute racoon in the racoon domain. The type of the process performing this action. Execute racoon and allow the specified role the domain. Domain allowed access. Role allowed access. Execute setkey in the setkey domain. The type of the process performing this action. Execute setkey and allow the specified role the domains. Domain allowed access. The role to be allowed the racoon and setkey domains. Send the kill signal to ipsec-mgmt Domain allowed access. Send a generic signal to ipsec-mgmt Domain allowed access. Send a generic signull to ipsec-mgmt. Domain allowed access. Send and receive messages from ipsec-mgmt over dbus. Domain allowed access. Create, read, write, and delete ipsec-mgmt lock files. The type of the process performing this action.

Allow racoon to read shadow

Policy for iptables. Execute iptables in the iptables domain. Domain allowed access. Execute iptables in the iptables domain, and allow the specified role the iptables domain. Domain allowed access. The role to be allowed the iptables domain. Execute iptables in the caller domain. Domain allowed access. Execute iptables in the iptables domain. The type of the process performing this action. Set the attributes of iptables config files. Domain allowed access. Read iptables config files. Domain allowed access. Create files in /etc with the type used for the iptables config files. The type of the process performing this action. Manage iptables config files. Domain allowed access. Establish connections to iSCSI devices Execute a domain transition to run iscsid. Domain allowed to transition. Connect to ISCSI using a unix domain stream socket. The type of the process performing this action. Read iscsi lib files. Domain allowed access. Manage iscsid sempaphores. Domain allowed access. Kernel crash dumping mechanism Execute kdump in the kdump domain. The type of the process performing this action. Execute kdump in the kdump domain. The type of the process performing this action. Read kdump configuration file. Domain allowed access. Manage kdump configuration file. Domain allowed access. All of the rules required to administrate an kdump environment Domain allowed access. The role to be allowed to manage the kdump domain. Policy for system libraries. Execute ldconfig in the ldconfig domain. Domain allowed access. Execute ldconfig in the caller domain. Domain allowed access. Execute ldconfig in the ldconfig domain. Domain allowed access. The role to allow the ldconfig domain. Use the dynamic link/loader for automatic loading of shared libraries. Domain allowed access. Use the dynamic link/loader for automatic loading of shared libraries with legacy support. Domain allowed access. Execute the dynamic link/loader in the caller's domain. Domain allowed access. Create, read, write, and delete the dynamic link/loader. Domain allowed access. Relabel to and from the type used for the dynamic link/loader. Domain allowed access. Modify the dynamic link/loader's cached listing of shared libraries. Domain allowed access. Search library directories. Domain allowed access. Do not audit attempts to write to library directories.

Do not audit attempts to write to library directories. Typically this is used to quiet attempts to recompile python byte code.

Domain allowed access.
Create, read, write, and delete library directories. Domain allowed access. Read files in the library directories, such as static libraries. Domain allowed access. Execute library scripts in the caller domain. Domain allowed access. Load and execute functions from generic lib files as shared libraries. Domain allowed access. Create, read, write, and delete generic files in library directories. Domain allowed access. Relabel files to the type used in library directories. Domain allowed access. Relabel to and from the type used for generic lib files. Domain allowed access. Relabel to and from the type used for generic lib files. Domain allowed access. Delete generic symlinks in library directories. Domain allowed access. Delete generic symlinks in library directories. Domain allowed access. Create, read, write, and delete shared libraries. Domain allowed access. Load and execute functions from shared libraries. Domain allowed access. Load and execute functions from shared libraries, with legacy support. Domain allowed access. Relabel to and from the type used for shared libraries. Domain allowed access. Create an object in lib directories, with the shared libraries type using a type transition. Domain allowed access. The object class of the object being created. Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

lib_filetrans_shared_lib() should be used instead.

Domain allowed access. The object class of the object being created.
Policy for local logins. Execute local logins in the local login domain. The type of the process performing this action. Allow processes to inherit local login file descriptors. The type of the process performing this action. Do not audit attempts to inherit local login file descriptors. Domain to not audit. Send a null signal to local login processes. Domain allowed access. Search for key. Domain allowed access. Allow link to the local_login key ring. Domain allowed access. Execute local logins in the local login domain. Domain allowed access. Allow domain to gettatr local login home content Domain allowed access. Policy for the kernel message logger and system logging daemon. Make the specified type usable for log files in a filesystem.

Make the specified type usable for log files in a filesystem. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a log file type may result in problems with log rotation, log analysis, and log monitoring programs.

Related interfaces:

  • logging_log_filetrans()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Type to be used for files.
Send audit messages. Domain allowed access. dontaudit attempts to send audit messages. Domain allowed access. Set login uid Domain allowed access. Set tty auditing Domain allowed access. Set up audit Domain allowed access. Read the audit log. Domain allowed access. dontaudit search of auditd log files. Domain to not audit. Execute auditctl in the auditctl domain. Domain allowed access. Execute auditctl in the auditctl domain, and allow the specified role the auditctl domain. Domain allowed access. The role to be allowed the auditctl domain. Execute auditd in the auditd domain. Domain allowed access. Execute auditd in the auditd domain, and allow the specified role the auditd domain. Domain allowed access. The role to be allowed the auditd domain. Connect to auditdstored over an unix stream socket. Domain allowed access. Execute a domain transition to run the audit dispatcher. Domain allowed to transition. Signal the audit dispatcher. Domain allowed to transition. Create a domain for processes which can be started by the system audit dispatcher Type to be used as a domain. Type of the program to be used as an entry point to this domain. Connect to the audit dispatcher over an unix stream socket. Domain allowed access. Manage the auditd configuration files. Domain allowed access. Manage the audit log. Domain allowed access. Execute klogd in the klog domain. Domain allowed access. Check if syslogd is executable. Domain allowed access. Execute syslogd in the syslog domain. Domain allowed access. Create an object in the log directory, with a private type.

Allow the specified domain to create an object in the general system log directories (e.g., /var/log) with a private type. Typically this is used for creating private log files in /var/log with the private type instead of the general system log type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.

Related interfaces:

  • logging_log_file()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Domain allowed access. The type of the object to be created. The object class of the object being created.
Send system log messages.

Allow the specified domain to connect to the system log service (syslog), to send messages be added to the system logs. Typically this is used by services that do not have their own log file in /var/log.

This does not allow messages to be sent to the auditing system.

Programs which use the libc function syslog() will require this access.

Related interfaces:

  • logging_send_audit_msgs()
Domain allowed access.
Connect to the syslog control unix stream socket. Domain allowed access. Read the auditd configuration files. Domain allowed access. dontaudit search of auditd configuration files. Domain allowed access. Read syslog configuration files. Domain allowed access. Allows the domain to open a file in the log directory, but does not allow the listing of the contents of the log directory. Domain allowed access. Do not audit attempts to search the var log directory. Domain not to audit. List the contents of the generic log directory (/var/log). Domain allowed access. Read and write the generic log directory (/var/log). Domain allowed access. Do not audit attempts to get the atttributes of any log files. Domain allowed access. Append to all log files. Domain allowed access. Append to all log files. Domain allowed access. Read all log files. Domain allowed access. dontaudit Read all log files. Domain allowed access. dontaudit Read all log files. Domain allowed access. Execute all log files in the caller domain. Domain allowed access. read/write to all log files. Domain allowed access. Create, read, write, and delete all log files. Domain allowed access. Read generic log files. Domain allowed access. Write generic log files. Domain allowed access. Dontaudit read/Write inherited generic log files. Domain to not audit. Dontaudit Write generic log files. Domain allowed access. Read and write generic log files. Domain allowed access. Create, read, write, and delete generic log files. Domain allowed access. All of the rules required to administrate the audit environment Domain allowed access. User role allowed access. All of the rules required to administrate the syslog environment Domain allowed access. User role allowed access. All of the rules required to administrate the logging environment Domain allowed access. User role allowed access.

Allow syslogd daemon to send mail

Allow syslogd daemon to read user tmp content

Allow syslogd the ability to read/write terminals

Allow syslogd the ability to call nagios plugins. It is turned on by omprog rsyslog plugin.

Policy for logical volume management programs. Execute lvm programs in the lvm domain. The type of the process performing this action. Execute lvm programs in the caller domain. The type of the process performing this action. Execute lvm programs in the lvm domain. The type of the process performing this action. The role to allow the LVM domain. Read LVM configuration files. The type of the process performing this action. Manage LVM configuration files. Domain allowed access. Connect to lvm using a unix domain stream socket. Domain allowed access. Execute a domain transition to run clvmd. Domain allowed to transition. Read and write to clvmd temporary file system. Domain allowed access. Delete lvm temporary file system. Domain allowed access. Send a message to lvm over the datagram socket. Domain allowed access. Miscelaneous files. Make the specified type usable as a cert file.

Make the specified type usable for cert files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with cert management tools.

Related interfaces:

  • files_type()

Example:

type mycertfile_t; cert_type(mycertfile_t) allow mydomain_t mycertfile_t:file read_file_perms; files_search_etc(mydomain_t)

Type to be used for files.
Read system SSL certificates. Domain allowed access. Dontaudit read/writei certificates. Domain allowed access. manange system SSL certificates. Domain allowed access. manange system SSL certificates. Domain allowed access. Read fonts. Domain allowed access. Set the attributes on a fonts directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts directory. Domain allowed access. Do not audit attempts to write fonts. Domain allowed access. Create, read, write, and delete fonts. Domain allowed access. Set the attributes on a fonts cache directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts cache directory. Domain allowed access. Create, read, write, and delete fonts cache. Domain allowed access. Read hardware identification data. Domain allowed access. Allow process to setattr localization info Domain allowed access. Allow process to read localization information.

Allow the specified domain to read the localization files. This is typically for time zone configuration files, such as /etc/localtime and files in /usr/share/zoneinfo. Typically, any domain which needs to know the GMT/UTC offset of the current timezone will need access to these files. Generally, it should be safe for any domain to read these files.

Domain allowed access.
Allow process to write localization info Domain allowed access. Allow process to relabel localization info Domain allowed access. Allow process to read legacy time localization info Domain allowed access. Search man pages. Domain to not audit. Do not audit attempts to search man pages. Domain to not audit. Read man pages Domain allowed access. Delete man pages Domain allowed access. Create, read, write, and delete man pages Domain allowed access. Read public files used for file transfer services. Domain allowed access. Create, read, write, and delete public files and directories used for file transfer services. Domain allowed access. Read TeX data Domain allowed access. Execute TeX data programs in the caller domain. Domain allowed access. Let test files be an entry point for a specified domain. Domain to be entered. Read test files and directories. Domain allowed access. Execute test files. Domain allowed access. Execute test files. Domain allowed access. Create, read, write, and delete localization Domain allowed access. Dontaudit attempts to write generic SSL certificates. Domain allowed access. Do not audit attempts to access check cert dirs/files. Domain to not audit.
Policy for kernel module utilities Getattr the dependencies of kernel modules. Domain allowed access. Read the dependencies of kernel modules. Domain allowed access. list the configuration options used when loading modules. Domain allowed access. Read the configuration options used when loading modules. Domain allowed access. Rename a file with the configuration options used when loading modules. Domain allowed access. Unlink a file with the configuration options used when loading modules. Domain allowed access. Manage files with the configuration options used when loading modules. Domain allowed access. Unconditionally execute insmod in the insmod domain. Domain allowed access. Execute insmod in the insmod domain. Domain allowed access. Execute insmod in the insmod domain, and allow the specified role the insmod domain, and use the caller's terminal. Has a sigchld backchannel. Domain allowed access. The role to be allowed the insmod domain. Execute insmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. The role to be allowed the depmod domain. Execute depmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed access. Execute update_modules in the update_modules domain. Domain allowed access. The role to be allowed the update_modules domain. Execute update_modules in the caller domain. Domain allowed access. Policy for mount. Execute mount in the mount domain. The type of the process performing this action. Execute mount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the mount domain. Execute fusermount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the mount domain. Execute mount in the caller domain. The type of the process performing this action. Send a generic signal to mount. Domain allowed access. Manage mount PID files. Domain allowed access. Use file descriptors for mount. The type of the process performing this action. Allow the mount domain to send nfs requests for mounting network drives

Allow the mount domain to send nfs requests for mounting network drives

This interface has been deprecated as these rules were a side effect of leaked mount file descriptors. This interface has no effect.

Domain allowed access.
Execute mount in the unconfined mount domain. Domain allowed access. Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, and use the caller's terminal. Domain allowed access. The role to be allowed the unconfined mount domain. Execute fusermount in the mount domain. The type of the process performing this action. Execute fusermount. The type of the process performing this action. dontaudit Execute fusermount. The type of the process performing this action. Execute a domain transition to run showmount. Domain allowed to transition. Execute showmount in the showmount domain, and allow the specified role the showmount domain. Domain allowed access The role to be allowed the showmount domain.

Allow the mount command to mount any directory or file.

NetLabel/CIPSO labeled networking management Execute netlabel_mgmt in the netlabel_mgmt domain. Domain allowed access. Execute netlabel_mgmt in the netlabel_mgmt domain, and allow the specified role the netlabel_mgmt domain. Domain allowed access. The role to be allowed the netlabel_mgmt domain. PCMCIA card management services PCMCIA stub interface. No access allowed. Domain allowed access. Execute cardmgr in the cardmgr domain. The type of the process performing this action. Inherit and use file descriptors from cardmgr. Domain allowed access. Execute cardctl in the cardmgr domain. The type of the process performing this action. Execute cardmgr in the cardctl domain, and allow the specified role the cardmgr domain. The type of the process performing this action. The role to be allowed the cardmgr domain. Read cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr runtime character nodes. Domain allowed access. RAID array management tools Execute software raid tools in the mdadm domain. The type of the process performing this action. Create, read, write, and delete the mdadm pid files.

Create, read, write, and delete the mdadm pid files.

Added for use in the init module.

The type of the process performing this action.
Read mdadm map file. The type of the process performing this action.
Policy for SELinux policy and userland applications. Execute checkpolicy in the checkpolicy domain. Domain allowed access. Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, and use the caller's terminal. Domain allowed access. The role to be allowed the checkpolicy domain. Execute checkpolicy in the caller domain. Domain allowed access. Execute load_policy in the load_policy domain. Domain allowed access. Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, and use the caller's terminal. Domain allowed access. The role to be allowed the load_policy domain. Execute load_policy in the caller domain. Domain allowed access. Read the load_policy program file. Domain allowed access. Execute newrole in the newole domain. Domain allowed access. Execute newrole in the newrole domain, and allow the specified role the newrole domain, and use the caller's terminal. Domain allowed access. The role to be allowed the newrole domain. Execute newrole in the caller domain. Domain allowed access. Do not audit the caller attempts to send a signal to newrole. Domain allowed access. Send a SIGCHLD signal to newrole.

Allow the specified domain to send a SIGCHLD signal to newrole. This signal is automatically sent from a process that is terminating to its parent. This may be needed by domains that are executed from newrole.

Domain allowed access.
Inherit and use newrole file descriptors. Domain allowed access. Do not audit attempts to inherit and use newrole file descriptors. Domain to not audit. Execute restorecon in the restorecon domain. (Deprecated) Domain allowed access. Execute restorecon in the restorecon domain, and allow the specified role the restorecon domain, and use the caller's terminal. (Deprecated) Domain allowed access. The role to be allowed the restorecon domain. Execute restorecon in the caller domain. (Deprecated) Domain allowed access. Execute restorecond in the caller domain. Domain allowed access. Execute run_init in the run_init domain. Domain allowed access. Execute init scripts in the run_init domain.

Execute init scripts in the run_init domain. This is used for the Gentoo integrated run_init.

Domain allowed access.
Execute run_init in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. Domain allowed access. The role to be allowed the run_init domain. Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

This is used for the Gentoo integrated run_init.

Domain allowed access. The role to be allowed the run_init domain.
Inherit and use run_init file descriptors. Domain allowed access. Execute setfiles in the setfiles domain. Domain allowed access. Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setfiles domain. Execute setfiles in the setfiles domain. Domain allowed access. Execute setfiles in the setfiles_mac domain, and allow the specified role the setfiles_mac domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setfiles_mac domain. Execute setfiles in the caller domain. Domain allowed access. Do not audit attempts to search the SELinux configuration directory (/etc/selinux). Domain to not audit. Do not audit attempts to read the SELinux userland configuration (/etc/selinux). Domain to not audit. Read the general SELinux configuration files. Domain allowed access. Read and write the general SELinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. (Deprecated)

Create, read, write, and delete the general selinux configuration files.

This interface has been deprecated, please use the seutil_manage_config() interface instead.

Domain allowed access.
Create, read, write, and delete the general selinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. Do not audit attempts to search the SELinux login configuration directory. Domain to not audit. Do not audit attempts to read the SELinux login configuration. Domain to not audit. Read the SELinux login configuration files. Domain allowed access. Read and write the SELinux login configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. manage the login selinux configuration files. Domain allowed access. Search the policy directory with default_context files. Domain allowed access. Read the default_contexts files. Domain allowed access. Create, read, write, and delete the default_contexts files. Domain allowed access. Read the file_contexts files. Domain allowed access. Do not audit attempts to read the file_contexts files. Domain allowed access. Read and write the file_contexts files. Domain allowed access. Create, read, write, and delete the file_contexts files. Domain allowed access. Read the SELinux binary policy. Domain allowed access. Create the SELinux binary policy. Domain allowed access. Allow the caller to relabel a file to the binary policy type. Domain allowed access. Create, read, write, and delete the SELinux binary policy. Domain allowed access. Read SELinux policy source files. Domain allowed access. Create, read, write, and delete SELinux policy source files. Domain allowed access. Execute a domain transition to run semanage. Domain allowed to transition. Execute a domain transition to run setsebool. Domain allowed to transition. Execute semanage in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. Domain allowed access. The role to be allowed the semanage domain. Execute setsebool in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. Domain allowed access. The role to be allowed the setsebool domain. Full management of the semanage module store. Domain allowed access. Full management of the semanage module store. Domain allowed access. Get read lock on module store Domain allowed access. Get trans lock on module store Domain allowed access. SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will allow access required for the libselinux constructor to function.

Domain allowed access.
Do not audit SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will dontaudit access required for the libselinux constructor to function.

Generally this should not be used on anything but simple SELinux-enabled programs that do not rely on data initialized by the libselinux constructor.

Domain allowed access.
All rules necessary to run semanage command Domain allowed access. All rules necessary to run setfiles command Domain allowed access.
SELinux MLS/MCS label translation service. Execute setrans server in the setrans domain. The type of the process performing this action. Allow a domain to translate contexts. Domain allowed access. policy for sosreport Execute a domain transition to run sosreport. Domain allowed to transition. Execute sosreport in the sosreport domain, and allow the specified role the sosreport domain. Domain allowed access The role to be allowed the sosreport domain. Role access for sosreport Role allowed access User domain for the role Allow the specified domain to read sosreport tmp files. Domain allowed access. Delete sosreport tmp files. Domain allowed access. Append sosreport tmp files. Domain allowed access. Policy for network configuration: ifconfig and dhcp client. Execute dhcp client in dhcpc domain. The type of the process performing this action. Execute DHCP clients in the dhcpc domain, and allow the specified role the dhcpc domain. The type of the process performing this action. The role to be allowed the clock domain. Send a SIGCHLD signal to the dhcp client. The domain sending the SIGCHLD. Send a kill signal to the dhcp client. The domain sending the SIGKILL. Send a SIGSTOP signal to the dhcp client. The domain sending the SIGSTOP. Send a null signal to the dhcp client. The domain sending the null signal. Send a generic signal to the dhcp client. The domain sending the signal. Send and receive messages from dhcpc over dbus. Domain allowed access. Read and write dhcp configuration files. The domain allowed access. Read dhcp client state files. The domain allowed access. Delete the dhcp client state files. Domain allowed access. Allow caller to relabel dhcpc_state files Domain allowed access. Manage the dhcp client state files. Domain allowed access. Set the attributes of network config files. Domain allowed access. Allow caller to relabel net_conf files Domain allowed access. Allow caller to relabel net_conf files Domain allowed access. Read network config files.

Allow the specified domain to read the general network configuration files. A common example of this is the /etc/resolv.conf file, which has domain name system (DNS) server IP addresses. Typically, most networking processes will require the access provided by this interface.

Higher-level interfaces which involve networking will generally call this interface, for example:

  • sysnet_dns_name_resolve()
  • sysnet_use_ldap()
  • sysnet_use_portmap()
Domain allowed access.
Do not audit attempts to read network config files. Domain to not audit. Write network config files. Domain allowed access. Create network config files. Domain allowed access. Create files in /etc with the type used for the network config files. The type of the process performing this action. Create, read, write, and delete network config files. The type of the process performing this action. Read the dhcp client pid file. The type of the process performing this action. Delete the dhcp client pid file. The type of the process performing this action. Manage the dhcp client pid file. The type of the process performing this action. Execute ifconfig in the ifconfig domain. The type of the process performing this action. Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, and use the caller's terminal. The type of the process performing this action. The role to be allowed the ifconfig domain. Execute ifconfig in the caller domain. Domain allowed access. Send a generic signal to ifconfig. Domain allowed access. Read the DHCP configuration files. Domain allowed access. Search the DHCP state data directory. Domain allowed access. Create DHCP state data.

Create DHCP state data.

This is added for DHCP server, as the server and client put their state files in the same directory.

Domain allowed access. The type of the object to be created The object class.
Perform a DNS name resolution. Domain allowed access. Connect and use a LDAP server. Domain allowed access. Connect and use remote port mappers. Domain allowed access. Do not audit attempts to use the dhcp file descriptors. The domain sending the SIGCHLD. Transition to system_r when execute an dhclient script

Execute dhclient script in a specified role

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Role to transition from.

Allow dhcpc client applications to execute iptables commands

Policy for udev. Execute udev in the udev domain, and allow the specified role the udev domain. Domain allowed access. The role to be allowed the iptables domain. Send generic signals to udev. Domain allowed access. Execute udev in the udev domain. The type of the process performing this action. Execute udev in the caller domain. Domain allowed access. Execute a udev helper in the udev domain. The type of the process performing this action. Allow process to read udev process state. Domain allowed access. Do not audit attempts to inherit a udev file descriptor. Domain to not audit. Do not audit attempts to read or write to a udev unix datagram socket. Domain to not audit. Do not audit search of udev database directories. Domain to not audit. Read the udev device table.

Allow the specified domain to read the udev device table.

Domain allowed access.
Allow process to modify list of devices. The type of the process performing this action. Allow process to delete list of devices. The type of the process performing this action. Create, read, write, and delete udev pid files. Domain allowed access. Create, read, write, and delete udev pid files. Domain allowed access. Create a domain for processes which can be started by udev. Type to be used as a domain. Type of the program to be used as an entry point to this domain.
The unconfined domain. Make the specified domain unconfined. Domain to make unconfined. Make the specified domain unconfined and audit executable heap usage.

Make the specified domain unconfined and audit executable heap usage. With exception of memory protections, usage of this interface will result in the level of access the domain has is like SELinux was not being used.

Only completely trusted domains should use this interface.

Domain to make unconfined.
Add an alias type to the unconfined domain. (Deprecated)

Add an alias type to the unconfined domain. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined domain.
Add an alias type to the unconfined execmem program file type. (Deprecated)

Add an alias type to the unconfined execmem program file type. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined execmem program type.
Policy for user domains Allow a home directory for which the role has read-only access.

Allow a home directory for which the role has read-only access.

This does not allow execute access.

The user role The user domain
Allow a home directory for which the role has full access.

Allow a home directory for which the role has full access.

This does not allow execute access.

The user role The user domain
Manage user temporary files Role allowed access. Domain allowed access. Execute user bin files. Domain allowed access. The execute access user temporary files. Domain allowed access. Role access for the user tmpfs type that the user has full access.

Role access for the user tmpfs type that the user has full access.

This does not allow execute access.

Role allowed access. Domain allowed access.
The interface allowing the user basic network permissions The user domain Make the specified type usable as a user application domain. Type to be used as a user application domain. Type to be used as the domain entry point. Make the specified type usable in a user home directory. Type to be used as a file in the user home directory. Make the specified type usable in a generic temporary directory. Type to be used as a file in the generic temporary directory. Make the specified type usable in a generic tmpfs_t directory. Type to be used as a file in the generic temporary directory. Allow domain to attach to TUN devices created by administrative users. Domain allowed access. Set the attributes of a user pty. Domain allowed access. Create a user pty. Domain allowed access. Get the attributes of user home directories. Domain allowed access. Do not audit attempts to get the attributes of user home directories. Domain allowed access. Search user home directories. Domain allowed access. Do not audit attempts to search user home directories.

Do not audit attempts to search user home directories. This will supress SELinux denial messages when the specified domain is denied the permission to search these directories.

Domain to not audit.
List user home directories. Domain allowed access. Do not audit attempts to list user home subdirectories. Domain to not audit Create user home directories. Domain allowed access. Create user home directories. Domain allowed access. Relabel to user home directories. Domain allowed access. Relabel to user home files. Domain allowed access. Relabel user home files. Domain allowed access. Create directories in the home dir root with the user home directory type. Domain allowed access. Do a domain transition to the specified domain when executing a program in the user home directory.

Do a domain transition to the specified domain when executing a program in the user home directory.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed access. Domain to transition to.
Do not audit attempts to search user home content directories. Domain to not audit List contents of users home directory. Domain allowed access. Create, read, write, and delete directories in a user home subdirectory. Domain allowed access. Delete directories in a user home subdirectory. Domain allowed access. Set the attributes of user home files. Domain allowed access. Do not audit attempts to set the attributes of user home files. Domain allowed access. Mmap user home files. Domain allowed access. Read user home files. Domain allowed access. Do not audit attempts to getattr user home files. Domain to not audit. Do not audit attempts to read user home files. Domain to not audit. Do not audit attempts to append user home files. Domain to not audit. Do not audit attempts to write user home files. Domain to not audit. Delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to write user home files. Domain to not audit. Read user home subdirectory symbolic links. Domain allowed access. Execute user home files. Domain allowed access. Do not audit attempts to execute user home files. Domain allowed access. Create, read, write, and delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. Domain allowed access. Create, read, write, and delete symbolic links in a user home subdirectory. Domain allowed access. Delete symbolic links in a user home directory. Domain allowed access. Create, read, write, and delete named pipes in a user home subdirectory. Domain allowed access. Create, read, write, and delete named sockets in a user home subdirectory. Domain allowed access. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in a user home directory with an automatic type transition to the user home file type. Domain allowed access. The class of the object to be created. Write to user temporary named sockets. Domain allowed access. List user temporary directories. Domain allowed access. Do not audit attempts to search user temporary directories. Domain to not audit. Do not audit attempts to list user temporary directories. Domain to not audit. Do not audit attempts to manage users temporary directories. Domain to not audit. Read user temporary files. Domain allowed access. Do not audit attempts to read users temporary files. Domain to not audit. Do not audit attempts to append users temporary files. Domain to not audit. Read and write user temporary files. Domain allowed access. Do not audit attempts to write users temporary files. Domain to not audit. Do not audit attempts to read/write users temporary fifo files. Domain to not audit. Do not audit attempts to use user ttys. Domain to not audit. Do not audit attempts to manage users temporary files. Domain to not audit. Read user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary directories. Domain allowed access. Create, read, write, and delete user temporary files. Domain allowed access. Create, read, write, and delete user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary named pipes. Domain allowed access. Create, read, write, and delete user temporary named sockets. Domain allowed access. Create objects in a user temporary directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Create objects in the temporary directory with an automatic type transition to the user temporary type. Domain allowed access. The class of the object to be created. Read user tmpfs files. Domain allowed access. Read/Write user tmpfs files. Domain allowed access. Read/Write inherited user tmpfs files. Domain allowed access. Execute user tmpfs files. Domain allowed access. Delete user tmpfs files. Domain allowed access. Get the attributes of a user domain tty. Domain allowed access. Do not audit attempts to get the attributes of a user domain tty. Domain allowed access. Set the attributes of a user domain tty. Domain allowed access. Do not audit attempts to set the attributes of a user domain tty. Domain allowed access. Read and write a user domain tty. Domain allowed access. Read and write inherited user domain tty. Domain allowed access. Read and write a user domain pty. Domain allowed access. Read and write inherited user domain pty. Domain allowed access. Read and write inherited user domain pty. Domain allowed access. Read and write a user TTYs and PTYs.

Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access.

However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains.

Domain allowed access.
Do not audit attempts to read and write a user domain tty and pty. Domain allowed access. Execute a shell in all user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Allow domain dyntrans to unpriv userdomain. Domain allowed access. Allow domain dyntrans to admin userdomain. Domain allowed access. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Manage unpriviledged user SysV sempaphores. Domain allowed access. Manage unpriviledged user SysV shared memory segments. Domain allowed access. Read/Write unpriviledged user SysV shared memory segments. Domain allowed access. Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Search users home directories. Domain allowed access. Send general signals to unprivileged user domains. Domain allowed access. Inherit the file descriptors from unprivileged user domains. Domain allowed access. Do not audit attempts to inherit the file descriptors from unprivileged user domains.

Do not audit attempts to inherit the file descriptors from unprivileged user domains. This will supress SELinux denial messages when the specified domain is denied the permission to inherit these file descriptors.

Domain to not audit.
Do not audit attempts to use user ptys. Domain to not audit. Relabel files to unprivileged user pty types. Domain allowed access. Do not audit attempts to relabel files from user pty types. Domain allowed access. Write all users files in /tmp Domain allowed access. Read the process state of all user domains. Domain allowed access. Get the attributes of all user domains. Domain allowed access. Inherit the file descriptors from all user domains Domain allowed access. Do not audit attempts to inherit the file descriptors from any user domains. Domain to not audit. Send general signals to all user domains. Domain allowed access. Send a SIGCHLD signal to all user domains. Domain allowed access. Create keys for all user domains. Domain allowed access. Send a dbus message to all user domains. Domain allowed access. Allow apps to set rlimits on userdomain Domain allowed access. Connect to users over an unix stream socket. Domain allowed access. Dontaudit connectto to users over an unix stream socket. Domain allowed access. Ptrace user domains. Domain allowed access. dontaudit Search /root Domain allowed access. dontaudit list /root Domain allowed access. dontaudit write /root Domain allowed access. Allow domain to list /root Domain allowed access. Allow Search /root Domain allowed access. RW unpriviledged user SysV sempaphores. Domain allowed access. Send a message to unpriv users over a unix domain datagram socket. Domain allowed access. Send a message to users over a unix domain datagram socket. Domain allowed access. Allow execmod on files in homedirectory Domain allowed access. Read admin home files. Domain allowed access. Read admin home files. Domain allowed access. Execute admin home files. Domain allowed access. Append files inherited in the /root directory. Domain allowed access. Manage all files/directories in the homedir The user domain Create objects in a user home directory with an automatic type transition to the user home file type. Domain allowed access. The class of the object to be created. Create objects in the /root directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. Send signull to unprivileged user domains. Domain allowed access. Write all users files in /tmp Domain allowed access. Manage keys for all user domains. Domain allowed access. Do not audit attempts to read and write unserdomain stream. Domain to not audit. Append files in a user home subdirectory. Domain allowed access. Read files inherited in a user home subdirectory. Domain allowed access. Append files inherited in a user home subdirectory. Domain allowed access. Append files inherited in a user tmp files. Domain allowed access. Read system SSL certificates in the users homedir. Domain allowed access. Manage system SSL certificates in the users homedir. Domain allowed access. Dontaudit Write system SSL certificates in the users homedir. Domain to not audit. Read audio files in the users homedir. Domain allowed access. Do not audit attempts to write all user home content files. Domain to not audit. Do not audit attempts to write all user tmp content files. Domain to not audit. Manage all user temporary content. Domain allowed access. List all user temporary content. Domain allowed access. Manage all user tmpfs content. Domain allowed access. Delete all user temporary content. Domain allowed access. dontaudit Search getatrr /root files Domain allowed access. dontaudit read /root lnk files Domain allowed access. Create, read, write, and delete user temporary chr files. Domain allowed access. Create, read, write, and delete user temporary blk files. Domain allowed access. Dontaudit attempt to set attributes on user temporary directories. Domain to not audit. Read all inherited users files in /tmp Domain allowed access. Dontaudit search user temporary directories. Domain allowed access. Write all inherited users files in /tmp Domain allowed access. Delete all users files in /tmp Domain allowed access. Send kill signals to all user domains. Domain allowed access. Read/write all inherited users files in /tmp Domain allowed access. Read and write userdomain stream. Domain allowed access.

Allow users to connect to mysql

Allow users to connect to PostgreSQL

Allow regular users direct mouse access

Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)

Allow user processes to change their priority

Allow w to display everyone

Xen hypervisor Execute a domain transition to run xend. Domain allowed to transition. Inherit and use xen file descriptors. Domain to not audit. Do not audit attempts to inherit xen file descriptors. Domain to not audit. Read xend image files. Domain allowed access. Allow the specified domain to read/write xend image files. Domain allowed to transition. Allow the specified domain to append xend log files. Domain allowed to transition. Create, read, write, and delete the xend log files. Domain allowed access. Do not audit attempts to read and write Xen unix domain stream sockets. These are leaked file descriptors. Domain to not audit. Connect to xenstored over an unix stream socket. Domain allowed access. Connect to xend over an unix domain stream socket. Domain allowed access. Execute a domain transition to run xm. Domain allowed to transition. Connect to xm over an unix stream socket. Domain allowed access.

Allow xen to manage nfs files

Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla

Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla)

Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t)

Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla)

Enable polyinstantiated directory support.

Allow system to run with NIS

Enable reading of urandom for all domains.

This should be enabled when all programs are compiled with ProPolice/SSP stack smashing protection. All domains will be allowed to read from /dev/urandom.

Support NFS home directories

Support fusefs home directories

Support SAMBA home directories

Allow users to run TCP servers (bind to ports and accept connection from the same domain and outside users) disabling this forces FTP passive mode and may change other protocols.

Allow direct login to the console device. Required for System 390

Allow certain domains to map low memory in the kernel

Enabling secure mode disallows programs, such as newrole, from transitioning to administrative user domains.

Disable transitions to insmod.

boolean to determine whether the system permits loading policy, setting enforcing mode, and changing boolean values. Set this to true and you have to reboot to set it back