1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277
|
class infoflow
class infoflow2
class infoflow3
class infoflow4
class infoflow5
class infoflow6
class infoflow7
sid kernel
sid security
sid unlabeled
sid fs
sid file
sid file_labels
sid init
sid any_socket
sid port
sid netif
sid netmsg
sid node
sid igmp_packet
sid icmp_socket
sid tcp_socket
sid sysctl_modprobe
sid sysctl
sid sysctl_fs
sid sysctl_kernel
sid sysctl_net
sid sysctl_net_unix
common infoflow
{
low_w
med_w
hi_w
low_r
med_r
hi_r
}
class infoflow
inherits infoflow
class infoflow2
inherits infoflow
{
super_w
super_r
}
class infoflow3
{
null
}
class infoflow4
inherits infoflow
class infoflow5
inherits infoflow
class infoflow6
inherits infoflow
class infoflow7
inherits infoflow
{
super_w
super_r
super_none
super_both
super_unmapped
}
sensitivity s0;
sensitivity s1;
sensitivity s2;
sensitivity s3;
sensitivity s4;
sensitivity s5;
sensitivity s6;
dominance { s0 s1 s2 s3 s4 s5 s6 }
category c0;
category c1;
category c2;
category c3;
category c4;
#level decl
level s0:c0.c4;
level s1:c0.c4;
level s2:c0.c4;
level s3:c0.c4;
level s4:c0.c4;
level s5:c0.c4;
level s6:c0.c4;
#some constraints
mlsconstrain infoflow hi_r ((l1 dom l2) or (t1 == mls_exempt));
attribute mls_exempt;
type system;
role system;
role system types system;
role role20_r;
role role21a_r;
role role21b_r;
role role21c_r;
role role20_r types system;
role role21a_r types system;
role role21b_r types system;
role role21c_r types system;
type type30;
type type31a;
type type31b;
type type31c;
role system types { type30 type31a type31b type31c };
allow system self:infoflow hi_w;
#users
user system roles { system role20_r role21a_r role21b_r role21c_r } level s0 range s0 - s6:c0.c4;
user user10 roles system level s0 range s0 - s2:c0.c4;
user user11a roles system level s0 range s0 - s2:c0.c4;
user user11b roles system level s0 range s0 - s2:c0.c4;
user user11c roles system level s0 range s0 - s2:c0.c4;
#normal constraints
constrain infoflow hi_w (u1 == u2);
#########################################
#
# Initial SID query tests
#
# test 1:
# name: kernel, exact
# user: unset
# role: unset
# type: unset
# range: unset
sid kernel system:system:system:s0:c0.c4
# test 2:
# name: (security|unlabeled), regex
# user: unset
# role: unset
# type: unset
# range: unset
sid security system:system:system:s0:c0.c1
sid unlabeled system:system:system:s0:c2.c4
# test 10:
# name: unset
# user: user10, exact
# role: unset
# type: unset
# range: unset
sid fs user10:system:system:s0:c0.c1
# test 11:
# name: unset
# user: user11(a|b), regex
# role: unset
# type: unset
# range: unset
sid file user11a:system:system:s0:c0.c1
sid file_labels user11b:system:system:s0:c0.c1
sid init user11c:system:system:s0:c0.c1
# test 20:
# name: unset
# user: unset
# role: role20_r, exact
# type: unset
# range: unset
sid any_socket system:role20_r:system:s0:c0.c1
# test 21:
# name: unset
# user: unset
# role: role20(a|c)_r, regex
# type: unset
# range: unset
sid port system:role21a_r:system:s0:c0.c1
sid netif system:role21b_r:system:s0:c0.c1
sid netmsg system:role21c_r:system:s0:c0.c1
# test 30:
# name: unset
# user: unset
# role: unset
# type: type30
# range: unset
sid node system:system:type30:s0:c0.c1
# test 31:
# name: unset
# user: unset
# role: unset
# type: type31(b|c)
# range: unset
sid igmp_packet system:system:type31a:s0:c0.c1
sid icmp_socket system:system:type31b:s0:c0.c1
sid tcp_socket system:system:type31c:s0:c0.c1
# test 40:
# name: unset
# user: unset
# role: unset
# type: unset
# range: equal
sid sysctl_modprobe system:system:system:s0:c1 - s0:c0.c4
# test 41:
# name: unset
# user: unset
# role: unset
# type: unset
# range: overlap
sid sysctl system:system:system:s1:c1 - s1:c1.c3
# test 42:
# name: unset
# user: unset
# role: unset
# type: unset
# range: subset
sid sysctl_fs system:system:system:s2:c1 - s2:c1.c3
# test 43:
# name: unset
# user: unset
# role: unset
# type: unset
# range: superset
sid sysctl_kernel system:system:system:s3:c1 - s3:c1.c3
# test 44:
# name: unset
# user: unset
# role: unset
# type: unset
# range: proper subset
sid sysctl_net system:system:system:s4:c1 - s4:c1.c3
# test 45:
# name: unset
# user: unset
# role: unset
# type: unset
# range: proper superset
sid sysctl_net_unix system:system:system:s5:c1 - s5:c1.c3
#fs_use
fs_use_trans devpts system:object_r:system:s0;
fs_use_xattr ext3 system:object_r:system:s0;
fs_use_task pipefs system:object_r:system:s0;
#genfscon
genfscon proc / system:object_r:system:s1
genfscon proc /sys system:object_r:system:s0
genfscon selinuxfs / system:object_r:system:s2:c0.c4
portcon tcp 80 system:object_r:system:s0
netifcon eth0 system:object_r:system:s0 system:object_r:system:s0
nodecon 127.0.0.1 255.255.255.255 system:object_r:system:s0
nodecon ::1 ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff system:object_r:system:s0
|