1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273
|
class infoflow
class infoflow2
class infoflow3
class infoflow4
class infoflow5
class infoflow6
class infoflow7
sid kernel
sid security
common infoflow
{
low_w
med_w
hi_w
low_r
med_r
hi_r
}
class infoflow
inherits infoflow
class infoflow2
inherits infoflow
{
super_w
super_r
}
class infoflow3
{
null
}
class infoflow4
inherits infoflow
class infoflow5
inherits infoflow
class infoflow6
inherits infoflow
class infoflow7
inherits infoflow
{
super_w
super_r
super_none
super_both
super_unmapped
}
sensitivity s0;
sensitivity s1;
sensitivity s2;
sensitivity s3;
sensitivity s4;
sensitivity s5;
sensitivity s6;
dominance { s0 s1 s2 s3 s4 s5 s6 }
category c0;
category c1;
category c2;
category c3;
category c4;
#level decl
level s0:c0.c4;
level s1:c0.c4;
level s2:c0.c4;
level s3:c0.c4;
level s4:c0.c4;
level s5:c0.c4;
level s6:c0.c4;
#some constraints
mlsconstrain infoflow hi_r ((l1 dom l2) or (t1 == mls_exempt));
attribute mls_exempt;
type system;
role system;
role system types system;
role role30_r;
role role31a_r;
role role31b_r;
role role31c_r;
role role30_r types system;
role role31a_r types system;
role role31b_r types system;
role role31c_r types system;
type type40;
type type41a;
type type41b;
type type41c;
role system types { type40 type41a type41b type41c };
################################################################################
# Type enforcement declarations and rules
allow system system:infoflow3 null;
################################################################################
#users
user system roles { system role30_r role31a_r role31b_r role31c_r } level s0 range s0 - s6:c0.c4;
user user20 roles system level s0 range s0 - s2:c0.c4;
user user21a roles system level s0 range s0 - s2:c0.c4;
user user21b roles system level s0 range s0 - s2:c0.c4;
user user21c roles system level s0 range s0 - s2:c0.c4;
#normal constraints
constrain infoflow hi_w (u1 == u2);
#isids
sid kernel system:system:system:s0
sid security system:system:system:s0
#fs_use
fs_use_trans devpts system:object_r:system:s0;
fs_use_xattr ext3 system:object_r:system:s0;
fs_use_task pipefs system:object_r:system:s0;
#genfscon
genfscon proc / system:object_r:system:s1
genfscon proc /sys system:object_r:system:s0
genfscon selinuxfs / system:object_r:system:s2:c0.c4
portcon tcp 80 system:object_r:system:s0
netifcon eth0 system:object_r:system:s0 system:object_r:system:s0
# test 1:
# subnet_prefix: fe81::
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: unset
ibpkeycon fe81:: 1 system:system:system:s0:c0.c1
# test 10:
# subnet_prefix: unset
# pkeys: 10, exact
# user: unset
# role: unset
# type: unset
# range: unset
ibpkeycon ffff:: 0x10c-0x10e system:system:system:s0:c0.c1
# test 20:
# subnet_prefix: unset
# pkeys: unset
# user: user20, exact
# role: unset
# type: unset
# range: unset
ibpkeycon ffff:: 20 user20:system:system:s0:c0.c1
# test 21:
# subnet_prefix: unset
# pkeys: unset
# user: user21(a|b), regex
# role: unset
# type: unset
# range: unset
ibpkeycon ffff:: 0x21a user21a:system:system:s0:c0.c1
ibpkeycon ffff:: 0x21b user21b:system:system:s0:c0.c1
ibpkeycon ffff:: 0x21c user21c:system:system:s0:c0.c1
# test 30:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: role30_r, exact
# type: unset
# range: unset
ibpkeycon ffff:: 30 system:role30_r:system:s0:c0.c1
# test 31:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: role30(a|c)_r, regex
# type: unset
# range: unset
ibpkeycon ffff:: 0x31a system:role31a_r:system:s0:c0.c1
ibpkeycon ffff:: 0x31b system:role31b_r:system:s0:c0.c1
ibpkeycon ffff:: 0x31c system:role31c_r:system:s0:c0.c1
# test 40:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: type40
# range: unset
ibpkeycon ffff:: 40 system:system:type40:s0:c0.c1
# test 41:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: type41(b|c)
# range: unset
ibpkeycon ffff:: 0x41a system:system:type41a:s0:c0.c1
ibpkeycon ffff:: 0x41b system:system:type41b:s0:c0.c1
ibpkeycon ffff:: 0x41c system:system:type41c:s0:c0.c1
# test 50:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: equal
ibpkeycon ffff:: 50 system:system:system:s0:c1 - s0:c0.c4
# test 51:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: overlap
ibpkeycon ffff:: 51 system:system:system:s1:c1 - s1:c1.c3
# test 52:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: subset
ibpkeycon ffff:: 52 system:system:system:s2:c1 - s2:c1.c3
# test 53:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: superset
ibpkeycon ffff:: 53 system:system:system:s3:c1 - s3:c1.c3
# test 54:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: proper subset
ibpkeycon ffff:: 54 system:system:system:s4:c1 - s4:c1.c3
# test 55:
# subnet_prefix: unset
# pkeys: unset
# user: unset
# role: unset
# type: unset
# range: proper superset
ibpkeycon ffff:: 55 system:system:system:s5:c1 - s5:c1.c3
|