Layer: services
Determine whether ABRT can modify public files used for public file transfer services.
Layer: services
Determine whether ABRT can run in the abrt_handle_event_t domain to handle ABRT event scripts.
Layer: services
Determine whether abrt-handle-upload can modify public files used for public file transfer services in /var/spool/abrt-upload/.
Layer: admin
Control if AIDE can mmap files. AIDE can be compiled with the option 'with-mmap' in which case it will attempt to mmap files while running.
Layer: services
Determine whether cvs can read shadow password files.
Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")
Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")
Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")
Layer: services
Determine whether ftpd can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether ftpd can login to local users and can read and write all files on the system, governed by DAC.
Layer: services
Determine whether ftpd can use CIFS used for public file transfer services.
Layer: services
Determine whether ftpd can use NFS used for public file transfer services.
Layer: services
Determine whether gssd can read generic user temporary content.
Layer: services
Determine whether gssd can write generic user temporary content.
Layer: services
Determine whether httpd can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: apps
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: apps
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: apps
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether httpd can use mod_auth_pam.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: apps
Determine whether the script domain can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: apps
Determine whether java can make its stack executable.
Layer: services
Determine whether kerberos is supported.
Layer: system
Allow the mount command to mount any directory or file.
Layer: apps
Determine whether mplayer can make its stack executable.
Layer: services
Determine whether nfs can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Enable polyinstantiated directory support.
Allow raw memory device (/dev/mem, /dev/kmem, /dev/mergemem, dev/oldmem, /dev/port) access for confined executables. This is extremely dangerous as it can bypass the SELinux protections, and should only be used by trusted domains.
Layer: services
Determine whether rsync can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether sasl can read shadow files.
Layer: services
Determine whether samba can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: system
Allow users to connect to mysql
Layer: system
Allow users to connect to PostgreSQL
Layer: services
Allows clients to write to the X server shared memory segments.
Allow system to run with NIS
Layer: services
Determine whether zebra daemon can manage its configuration files.
Layer: services
Determine whether amavis can use JIT compiler.
Layer: system
Allow users to resolve user passwd entries directly from ldap rather then using a sssd server
Layer: system
Allow PAM usage. If disabled, read access /etc/shadow is allowed for domains that normally use PAM.
Layer: apps
Determine whether awstats can purge httpd log files.
Layer: services
Determine whether boinc can execmem/execstack.
Layer: apps
Determine whether cdrecord can read various content. nfs, samba, removable devices, user temp and untrusted content files
Layer: services
Determine whether additional rules should be enabled to support acme.sh
Layer: apps
Allow chromium to bind to tcp ports
Although not needed for regular browsing, some chrome extensions need to bind to tcp ports and accept connections.
Layer: apps
Allow chromium to access direct rendering interface
Needed for good performance on complex sites
Layer: apps
Grant the chromium domains manage rights on all user content
Layer: apps
Grant the chromium domains manage rights on generic user content
Layer: apps
Grant the chromium domains read access to all user content
Layer: apps
Grant the chromium domains read access to generic user content
Layer: apps
Allow chromium to read system information
Although not needed for regular browsing, this will allow chromium to update its own memory consumption based on system state, support additional debugging, detect specific devices, etc.
Layer: apps
Allow chromium to read/write USB devices
Although not needed for regular browsing, used for debugging over usb or using FIDO U2F tokens.
Layer: services
Determine whether chronyd can access NIC hardware timestamping features
Layer: services
Determine whether clamscan can read all non-security files.
Layer: services
Determine whether clamscan can read user content files.
Layer: services
Determine whether can clamd use JIT compiler.
Layer: services
Determine whether Cobbler can modify public files used for public file transfer services.
Layer: services
Determine whether Cobbler can connect to the network using TCP.
Layer: services
Determine whether Cobbler can access cifs file systems.
Layer: services
Determine whether Cobbler can access nfs file systems.
Layer: services
Determine whether collectd can connect to the network using TCP.
Layer: services
Determine whether Condor can connect to the network using TCP.
Allow logging in and using the system from /dev/console.
Layer: services
Allow containers to manage cgroups. This is required for systemd to run inside containers.
Layer: services
Allow containers to manage all read-writable public content.
Layer: services
Allow container engines to mount on all non-security files.
Layer: services
Allow containers to read all public content.
Layer: services
Allow containers to use eCryptfs filesystems.
Layer: services
Allow containers to use NFS filesystems.
Layer: services
Allow containers to use CIFS filesystems.
Layer: services
Determine whether system cron jobs can relabel filesystem for restoring file contexts.
Layer: apps
Grant the cryfs domains manage rights on all user content
Layer: apps
Grant the cryfs domains manage rights on generic user content
Layer: apps
Grant the cryfs domains read access to all user content
Layer: apps
Grant the cryfs domains read access to generic user content
Layer: services
Allows legacy ld_so for old printer filters
Layer: roles
Determine whether dbadm can manage generic user files.
Layer: roles
Determine whether dbadm can read generic user files.
Layer: services
Allow dbus-daemon system bus to to run systemd transient units. This is used by dbus-broker for dbus-activated services when the unit file for the service does not exist.
Layer: services
Enable additional rules to support using dbus-broker as the dbus-daemon system bus.
Layer: services
Allow dbus-daemon system bus to access /dev/net/tun which is needed to pass tun/tap device file descriptors over D-Bus. This is needed by openvpn3-linux.
Layer: system
Determine whether DHCP client can manage samba
Layer: services
Determine whether DHCP daemon can use LDAP backends.
Layer: services
Determine whether dovecot can connect to databases.
Layer: services
Determine whether entropyd can use audio devices as the source for the entropy feeds.
Layer: apps
Grant the evolution domains manage rights on all user content
Layer: apps
Grant the evolution domains manage rights on generic user content
Layer: apps
Allow evolution to create and write user certificates in addition to being able to read them
Layer: apps
Grant the evolution domains read access to all user content
Layer: apps
Grant the evolution domains read access to generic user content
Layer: services
Determine whether exim can connect to databases.
Layer: services
Determine whether exim can create, read, write, and delete generic user content files.
Layer: services
Determine whether exim can read generic user content files.
Layer: admin
Grant the firstboot domains manage rights on all user content
Layer: admin
Grant the firstboot domains manage rights on generic user content
Layer: admin
Grant the firstboot domains read access to all user content
Layer: admin
Grant the firstboot domains read access to generic user content
Layer: services
Determine whether ftpd can read and write files in user home directories.
Layer: services
Determine whether ftpd can connect to all unreserved ports.
Layer: services
Determine whether ftpd can connect to databases over the TCP network.
Layer: services
Determine whether ftpd can bind to all unreserved ports for passive mode.
Layer: services
Determine whether Git CGI can search home directories.
Layer: services
Determine whether Git CGI can access cifs file systems.
Layer: services
Determine whether Git CGI can access nfs file systems.
Layer: services
Determine whether Git client domains can manage all user home content, including application-specific data.
Layer: services
Determine whether Git session daemon can bind TCP sockets to all unreserved ports.
Layer: services
Determine whether Git session daemons can send syslog messages.
Layer: services
Determine whether calling user domains can execute Git daemon in the git_session_t domain.
Layer: services
Determine whether Git system daemon can search home directories.
Layer: services
Determine whether Git system daemon can access cifs file systems.
Layer: services
Determine whether Git system daemon can access nfs file systems.
Layer: apps
Determine whether Gitosis can send mail.
Enable reading of urandom for all domains.
This should be enabled when all programs are compiled with ProPolice/SSP stack smashing protection. All domains will be allowed to read from /dev/urandom.
Layer: services
Allow the gluster daemon to automatically add and remove file contexts from the local SELinux policy when adding and removing bricks.
Layer: apps
Determine whether GPG agent can manage generic user home content files. This is required by the --write-env-file option.
Layer: apps
Determine whether GPG agent can use OpenPGP cards or Yubikeys over USB
Layer: apps
Grant the gpg domains manage rights on all user content
Layer: apps
Grant the gpg domains manage rights on generic user content
Layer: apps
Grant the gpg domains read access to all user content
Layer: apps
Grant the gpg domains read access to generic user content
Layer: roles
Determine whether guest can configure network manager.
Layer: services
Determine whether httpd can use built in scripting.
Layer: services
Determine whether httpd can check spam.
Layer: services
Determine whether httpd scripts and modules can connect to the network using TCP.
Layer: services
Determine whether httpd scripts and modules can connect to cobbler over the network.
Layer: services
Determine whether scripts and modules can connect to databases over the network.
Layer: services
Determine whether httpd can connect to ldap over the network.
Layer: services
Determine whether httpd can connect to memcache server over the network.
Layer: services
Determine whether httpd daemon can connect to zabbix over the network.
Layer: services
Determine whether httpd can act as a relay.
Layer: services
Determine whether httpd can send mail.
Layer: services
Determine whether httpd can communicate with avahi service via dbus.
Layer: services
Determine whether httpd can use support.
Layer: services
Determine whether httpd can act as a FTP server by listening on the ftp port.
Layer: services
Determine whether httpd can traverse user home directories.
Layer: services
Determine whether httpd scripts and modules can use execmem and execstack.
Layer: services
Determine whether httpd gpg can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether httpd can connect to port 80 for graceful shutdown.
Layer: services
Determine whether httpd can manage IPA content files.
Layer: services
Determine whether httpd can use mod_auth_ntlm_winbind.
Layer: services
Determine whether httpd can read generic user home content files.
Layer: services
Determine whether httpd can change its resource limits.
Layer: services
Determine whether httpd can run SSI executables in the same domain as system CGI scripts.
Layer: services
Determine whether httpd can execute its temporary content.
Layer: services
Determine whether httpd can communicate with the terminal. Needed for entering the passphrase for certificates at the terminal.
Layer: services
Determine whether httpd can have full access to its content types.
Layer: services
Determine whether httpd can use cifs file systems.
Layer: services
Determine whether httpd can use fuse file systems.
Layer: services
Determine whether httpd can use nfs file systems.
Layer: services
Grant the i18n_input domains read access to generic user content
Layer: services
Determine whether icecast can listen on and connect to any TCP port.
Layer: system
Enable systemd to create mountpoints.
Layer: system
Allow all daemons the ability to read/write terminals
Layer: system
Enable systemd to mount on all non-security files.
Layer: system
Enable support for upstart as the init program.
Layer: apps
Grant the irc domains manage rights on all user content
Layer: apps
Grant the irc domains manage rights on generic user content
Layer: apps
Grant the irc domains read access to all user content
Layer: apps
Grant the irc domains read access to generic user content
Layer: apps
Determine whether irc clients can listen on and connect to any unreserved TCP ports.
Layer: apps
Grant the java domains manage rights on all user content
Layer: apps
Grant the java domains manage rights on generic user content
Layer: apps
Grant the java domains read access to all user content
Layer: apps
Grant the java domains read access to generic user content
Layer: apps
Determine whether libmtp can read and manage the user home directories and files.
Layer: admin
Determine whether logwatch can connect to mail over the network.
Allow email client to various content. nfs, samba, removable devices, and user temp files
Layer: services
Determine whether Matrixd is allowed to federate (bind all UDP ports and connect to all TCP ports).
Layer: services
Determine whether Matrixd can connect to the Postgres database.
Layer: admin
Determine whether mcelog supports client mode.
Layer: admin
Determine whether mcelog can execute scripts.
Layer: admin
Determine whether mcelog can use all the user ttys.
Layer: admin
Determine whether mcelog supports server mode.
Layer: services
Determine whether minidlna can read generic user content.
Layer: kernel
Control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.
Layer: services
Allow monit to start/stop services
Layer: apps
Determine whether mozilla can make its stack executable.
Layer: apps
Grant the mozilla domains manage rights on all user content
Layer: apps
Grant the mozilla domains manage rights on generic user content
Layer: apps
Grant the mozilla domains read access to all user content
Layer: apps
Grant the mozilla domains read access to generic user content
Layer: services
Determine whether mpd can traverse user home directories.
Layer: services
Determine whether mpd can use cifs file systems.
Layer: services
Determine whether mpd can use nfs file systems.
Layer: apps
Grant the mplayer domains manage rights on all user content
Layer: apps
Grant the mplayer domains manage rights on generic user content
Layer: apps
Grant the mplayer_mencoder domains manage rights on all user content
Layer: apps
Grant the mplayer_mencoder domains manage rights on generic user content
Layer: apps
Grant the mplayer_mencoder domains read access to all user content
Layer: apps
Grant the mplayer_mencoder domains read access to generic user content
Layer: apps
Grant the mplayer domains read access to all user content
Layer: apps
Grant the mplayer domains read access to generic user content
Layer: services
Determine whether mysqld can connect to all TCP ports.
Layer: services
Determine whether Bind can bind tcp socket to http ports.
Layer: services
Determine whether Bind can write to master zone files. Generally this is used for dynamic DNS or zone transfers.
Allow any files/directories to be exported read/only via NFS.
Allow any files/directories to be exported read/write via NFS.
Layer: services
Determine whether confined applications can use nscd shared memory.
Layer: services
Determine whether obfs4proxy can bind tcp sockets to all unreserved ports.
Layer: services
Determine whether obfs4proxy can bind tcp sockets to all http ports.
Layer: apps
Determine whether openoffice writer can send emails directly (print to email). This is different from the functionality of sending emails through external clients which is always enabled.
Layer: apps
Determine whether openoffice can download software updates from the network (application and/or extensions).
Layer: apps
Grant the openoffice domains manage rights on all user content
Layer: apps
Grant the openoffice domains manage rights on generic user content
Layer: apps
Grant the openoffice domains read access to all user content
Layer: apps
Grant the openoffice domains read access to generic user content
Layer: services
Determine whether openvpn can connect to the TCP network.
Layer: services
Determine whether openvpn can read generic user home content files.
Layer: services
Allow pacemaker to start/stop services
Layer: admin
Determine whether portage can use nfs filesystems.
Layer: services
Determine whether postfix local can manage mail spool content.
Layer: services
Grant the postfix domains manage rights on all user content
Layer: services
Grant the postfix domains manage rights on generic user content
Layer: services
Grant the postfix domains read access to all user content
Layer: services
Grant the postfix domains read access to generic user content
Layer: services
Determine whether pppd can load kernel modules.
Layer: services
Determine whether common users can run pppd with a domain transition.
Layer: services
Determine whether privoxy can connect to all tcp ports.
Layer: apps
Allow pulseaudio to execute code in writable memory
Layer: admin
Determine whether puppet can manage all non-security files.
Layer: apps
Determine whether qemu has full access to the network.
Layer: admin
Determine whether rkhunter can connect to http ports. This is required by the --update option.
Layer: services
Determine whether extra rules should be enabled to support rspamd.
Layer: services
Determine whether rsync can run as a client
Layer: services
Determine whether rsync can export all content read only.
Layer: services
Determine whether rsync can use cifs file systems.
Layer: services
Determine whether rsync can use fuse file systems.
Layer: services
Determine whether rsync can use nfs file systems.
Layer: services
Determine whether samba can create home directories via pam.
Layer: services
Determine whether samba can act as the domain controller, add users, groups and change passwords.
Layer: services
Determine whether samba can share users home directories.
Layer: services
Determine whether samba can share any content read only.
Layer: services
Determine whether samba can share any content readable and writable.
Layer: services
Determine whether samba can act as a portmapper.
Layer: services
Determine whether smbd_t can read shadow files.
Layer: services
Determine whether samba can run unconfined scripts.
Layer: services
Determine whether samba can use fuse file systems.
Layer: services
Determine whether samba can use nfs file systems.
Layer: services
Determine whether sanlock can use nfs file systems.
Layer: services
Determine whether sanlock can use cifs file systems.
Layer: services
Allow unprived users to execute DDL statement
Layer: services
Allow transmit client label to foreign database
Layer: services
Allow database admins to execute DML statement
Layer: services
Determine whether sftpd can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether sftpd-can read and write files in user home directories.
Layer: services
Determine whether sftpd-can login to local users and read and write all files on the system, governed by DAC.
Layer: services
Determine whether sftpd can read and write files in user ssh home directories.
Layer: admin
Determine whether the user application exec domain attribute should be respected for shutdown access. If not enabled, only user domains themselves may use shutdown.
Layer: services
Determine whether smartmon can support devices on 3ware controllers.
Layer: services
Determine whether spamassassin clients can use the network.
Layer: services
Determine whether spamd can manage generic user home content.
Layer: services
Determine whether squid can connect to all TCP ports.
Layer: services
Determine whether squid can use the pinger daemon (needs raw net access)
Layer: services
Determine whether squid can run as a transparent proxy.
Layer: admin
Determine whether the user application exec domain attribute should be respected for su access. If not enabled, only user domains themselves may use su.
Layer: admin
Determine whether all sudo domains can connect to TCP HTTP ports. This is needed if an additional authentication mechanism via an HTTP server is required for users to use sudo.
Layer: admin
Determine whether the user application exec domain attribute should be respected for sudo access. If not enabled, only user domains themselves may use sudo.
Layer: apps
Grant the syncthing domains manage rights on all user content
Layer: apps
Grant the syncthing domains manage rights on generic user content
Layer: apps
Grant the syncthing domains read access to all user content
Layer: apps
Grant the syncthing domains read access to generic user content
Layer: system
Allow systemd-logind to interact with the bootloader (read which one is installed on fixed disks, enumerate entries for dbus property BootLoaderEntries, etc.)
Layer: system
Allow systemd-networkd to run its DHCPd server component
Layer: system
Allow systemd-nspawn to create a labelled namespace with the same types as parent environment
Layer: system
Allow systemd-socket-proxyd to bind any port instead of one labelled with systemd_socket_proxyd_port_t.
Layer: system
Allow systemd-socket-proxyd to connect to any port instead of labelled ones.
Layer: system
Enable support for systemd-tmpfiles to manage all non-security files.
Layer: apps
Determine whether telepathy connection managers can connect to any port.
Layer: apps
Determine whether telepathy connection managers can connect to generic tcp ports.
Layer: services
Determine whether tftp can modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.
Layer: services
Determine whether tftp can manage generic user home content.
Layer: apps
Grant the thunderbird domains manage rights on all user content
Layer: apps
Grant the thunderbird domains manage rights on generic user content
Layer: apps
Grant the thunderbird domains read access to all user content
Layer: apps
Grant the thunderbird domains read access to generic user content
Layer: services
Determine whether tor can bind tcp sockets to all unreserved ports.
Layer: admin
Determine whether authorized users can control the daemon, which requires usbguard-daemon to be able modify its rules in /etc/usbguard.
Layer: services
Determine whether to support lpd server.
Support NFS home directories
Support SAMBA home directories
Layer: system
Allow regular users direct mouse access
Layer: system
Allow user to execute files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)
Layer: system
Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)
Allow users to run TCP servers (bind to ports and accept connection from the same domain and outside users) disabling this forces FTP passive mode and may change other protocols.
Allow users to run UDP servers (bind to ports and accept connection from the same domain and outside users)
Layer: system
Allow user to write files on removable devices (e.g. external USB memory devices or floppies)
Layer: services
Determine whether varnishd can use the full TCP network.
Layer: admin
Determine whether attempts by vbetool to mmap low regions should be silently blocked.
Layer: services
Determine whether confined virtual guests can use serial/parallel communication ports.
Layer: services
Determine whether confined virtual guests can use input devices via evdev pass through.
Layer: services
Determine whether confined virtual guests can use executable memory and can make their stack executable.
Layer: services
Determine whether confined virtual guests can use fuse file systems.
Layer: services
Determine whether confined virtual guests can use nfs file systems.
Layer: services
Determine whether confined virtual guests can use cifs file systems.
Layer: services
Determine whether confined virtual guests can manage device configuration.
Layer: services
Determine whether confined virtual guests can use usb devices.
Layer: services
Determine whether confined virtual guests can use vfio for pci device pass through (vt-d).
Layer: services
Determine whether confined virtual guests can interact with xserver.
Layer: roles
Determine whether webadm can manage generic user files.
Layer: roles
Determine whether webadm can read generic user files.
Layer: apps
Determine whether attempts by wine to mmap low regions should be silently blocked.
Layer: apps
Grant the wireshark domains manage rights on all user content
Layer: apps
Grant the wireshark domains manage rights on generic user content
Layer: apps
Grant the wireshark domains read access to all user content
Layer: apps
Grant the wireshark domains read access to generic user content
Layer: apps
Grant the window manager domains write access to xdg data
Layer: system
Determine whether xen can use fusefs file systems.
Layer: system
Determine whether xen can use nfs file systems.
Layer: system
Determine whether xen can use samba file systems.
Layer: system
Determine whether xend can run blktapctrl and tapdisk.
Layer: roles
Determine whether xguest can configure network manager.
Layer: roles
Determine whether xguest can mount removable media.
Layer: roles
Determine whether xguest can use blue tooth devices.
Layer: apps
Grant the xscreensaver domains read access to generic user content
Layer: services
Use gnome-shell in gdm mode as the X Display Manager (XDM)