Policy modules for administrative functions, such as package management. Policy for the kernel modules, kernel image, and bootloader. Execute bootloader in the bootloader domain. Domain allowed to transition. Execute bootloader interactively and do a domain transition to the bootloader domain. Domain allowed to transition. Role allowed access. Read the bootloader configuration file. Domain allowed access. Read and write the bootloader configuration file. Domain allowed access. Read and write the bootloader temporary data in /tmp. Domain allowed access. Read and write the bootloader temporary data in /tmp. Domain allowed access. Determine of the console connected to the controlling terminal. Execute consoletype in the consoletype domain. Domain allowed to transition. Execute consoletype in the consoletype domain, and allow the specified role the consoletype domain. Domain allowed to transition. Role allowed access. Execute consoletype in the caller domain. Domain allowed access. Policy for dmesg. Execute dmesg in the dmesg domain. Domain allowed to transition. Execute dmesg in the caller domain. Domain allowed access. Network analysis utilities Execute network utilities in the netutils domain. Domain allowed to transition. Execute network utilities in the netutils domain, and allow the specified role the netutils domain. Domain allowed to transition. Role allowed access. Execute network utilities in the caller domain. Domain allowed access. Send generic signals to network utilities. Domain allowed access. Execute ping in the ping domain. Domain allowed to transition. Send a kill (SIGKILL) signal to ping. Domain allowed access. Send generic signals to ping. Domain allowed access. Execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed to transition. Role allowed access. Conditionally execute ping in the ping domain, and allow the specified role the ping domain. Domain allowed to transition. Role allowed access. Execute ping in the caller domain. Domain allowed access. Execute traceroute in the traceroute domain. Domain allowed to transition. Execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed to transition. Role allowed access. Conditionally execute traceroute in the traceroute domain, and allow the specified role the traceroute domain. Domain allowed to transition. Role allowed access. Execute traceroute in the caller domain. Domain allowed access.

Control users use of ping and traceroute

Run shells with substitute user and group Execute su in the caller domain. Domain allowed access. Execute a command with a substitute user Send a SIGCHLD signal to the sudo domain. Domain allowed access. Policy for managing user accounts. Execute chfn in the chfn domain. Domain allowed to transition. Execute chfn in the chfn domain, and allow the specified role the chfn domain. Domain allowed to transition. Role allowed access. Execute groupadd in the groupadd domain. Domain allowed to transition. Execute groupadd in the groupadd domain, and allow the specified role the groupadd domain. Domain allowed to transition. Role allowed access. Execute passwd in the passwd domain. Domain allowed to transition. Send sigkills to passwd. Domain allowed access. Execute passwd in the passwd domain, and allow the specified role the passwd domain. Domain allowed to transition. Role allowed access. Execute password admin functions in the admin passwd domain. Domain allowed to transition. Execute passwd admin functions in the admin passwd domain, and allow the specified role the admin passwd domain. Domain allowed to transition. Role allowed access. Do not audit attempts to use useradd fds. Domain to not audit. Execute useradd in the useradd domain. Domain allowed to transition. Execute useradd in the useradd domain, and allow the specified role the useradd domain. Domain allowed to transition. Role allowed access. Read the crack database. Domain allowed access.
Policy modules for applications Filesystem namespacing/polyinstantiation application. Execute a domain transition to run seunshare. Domain allowed to transition. Execute seunshare in the seunshare domain, and allow the specified role the seunshare domain. Domain allowed to transition. Role allowed access. Role access for seunshare Role allowed access. User domain for the role. Contributed Reference Policy modules. ABRT - automated bug-reporting tool Execute abrt in the abrt domain. Domain allowed to transition. Execute abrt in the caller domain. Domain allowed access. Send a null signal to abrt. Domain allowed access. Allow the domain to read abrt state files in /proc. Domain allowed access. Connect to abrt over an unix stream socket. Domain allowed access. Send and receive messages from abrt over dbus. Domain allowed access. Execute abrt-helper in the abrt-helper domain. Domain allowed to transition. Execute abrt helper in the abrt_helper domain, and allow the specified role the abrt_helper domain. Domain allowed to transition. Role allowed access. Send and receive messages from abrt over dbus. Domain allowed access. Read abrt configuration file. Domain allowed access. Read abrt logs. Domain allowed access. Read abrt PID files. Domain allowed access. Create, read, write, and delete abrt PID files. Domain allowed access. All of the rules required to administrate an abrt environment Domain allowed access. The role to be allowed to manage the abrt domain. AccountsService and daemon for manipulating user account information via D-Bus Execute a domain transition to run accountsd. Domain allowed access. Do not audit attempts to read and write Accounts Daemon fifo file. Domain allowed access. Send and receive messages from accountsd over dbus. Domain allowed access. Search accountsd lib directories. Domain allowed access. Read accountsd lib files. Domain allowed access. Create, read, write, and delete accountsd lib files. Domain allowed access. All of the rules required to administrate an accountsd environment Domain allowed access. Role allowed access. Berkeley process accounting Transition to the accounting management domain. Domain allowed to transition. Execute accounting management tools in the caller domain. Domain allowed access. Execute accounting management data in the caller domain. Domain allowed access. Create, read, write, and delete process accounting data. Domain allowed access. GNAT Ada95 compiler Execute the ada program in the ada domain. Domain allowed to transition. Execute ada in the ada domain, and allow the specified role the ada domain. Domain allowed to transition. Role allowed access. Andrew Filesystem server Execute a domain transition to run the afs client. Domain allowed to transition. Read and write afs client UDP sockets. Domain allowed access. read/write afs cache files Domain allowed access. Execute afs server in the afs domain. Domain allowed to transition. All of the rules required to administrate an afs environment Domain allowed access. The role to be allowed to manage the afs domain. Automatic IPv6 Connectivity Client Utility. Execute a domain transition to run aiccu. Domain allowed to transition. Execute aiccu server in the aiccu domain. Domain allowed to transition. Read aiccu PID files. Domain allowed access. All of the rules required to administrate an aiccu environment Domain allowed access. Role allowed access. Aide filesystem integrity checker Execute aide in the aide domain Domain allowed to transition. Execute aide programs in the AIDE domain. Domain allowed to transition. The role to allow the AIDE domain. All of the rules required to administrate an aide environment Domain allowed access. Aisexec Cluster Engine Execute a domain transition to run aisexec. Domain allowed to transition. Connect to aisexec over a unix domain stream socket. Domain allowed access. Allow the specified domain to read aisexec's log files. Domain allowed access. All of the rules required to administrate an aisexec environment Domain allowed access. The role to be allowed to manage the aisexecd domain. Ainit ALSA configuration tool. Execute a domain transition to run Alsa. Domain allowed to transition. Execute a domain transition to run Alsa, and allow the specified role the Alsa domain. Domain allowed to transition. Role allowed access. Read and write Alsa semaphores. Domain allowed access. Read and write Alsa shared memory. Domain allowed access. Read writable Alsa config files. Domain allowed access. Manage writable Alsa config files. Domain allowed access. Manage alsa home files. Domain allowed access. Read Alsa home files. Domain allowed access. Relabel alsa home files. Domain allowed access. Read Alsa lib files. Domain allowed access. Advanced Maryland Automatic Network Disk Archiver. Execute a domain transition to run Amanda recover. Domain allowed to transition. Execute a domain transition to run Amanda recover, and allow the specified role the Amanda recover domain. Domain allowed to transition. Role allowed access. Search Amanda library directories. Domain allowed access. Do not audit attempts to read /etc/dumpdates. Domain to not audit. Read and write /etc/dumpdates. Domain allowed access. Search Amanda library directories. Domain allowed access. Read and append amanda logs. Domain allowed access. Search Amanda var library directories. Domain allowed access. Daemon that interfaces mail transfer agents and content checkers, such as virus scanners. Execute a domain transition to run amavis. Domain allowed to transition. Execute amavis server in the amavis domain. Domain allowed to transition. Read amavis spool files. Domain allowed access. Manage amavis spool files. Domain allowed access. Create objects in the amavis spool directories with a private type. Domain allowed access. Private file type. Class of the object being created. Search amavis lib directories. Domain allowed access. Read amavis lib files. Domain allowed access. Create, read, write, and delete amavis lib files. Domain allowed access. Set the attributes of amavis pid files. Domain allowed access. Create of amavis pid files. Domain allowed access. All of the rules required to administrate an amavis environment Domain allowed access. Role allowed access. Abstract Machine Test Utility. Execute a domain transition to run Amtu. Domain allowed to transition. Execute a domain transition to run Amtu, and allow the specified role the Amtu domain. Domain allowed to transition. Role allowed access. Anaconda installer. Apache web server Role access for apache Role allowed access User domain for the role Read httpd user scripts executables. Domain allowed access. Read user web content. Domain allowed access. Transition to apache. Domain allowed to transition. Send a generic signal to apache. Domain allowed access. Send a null signal to apache. Domain allowed access. Send a SIGCHLD signal to apache. Domain allowed access. Inherit and use file descriptors from Apache. Domain allowed access. Do not audit attempts to read and write Apache unnamed pipes. Domain to not audit. Do not audit attempts to read and write Apache unix domain stream sockets. Domain to not audit. Do not audit attempts to read and write Apache TCP sockets. Domain to not audit. Create, read, write, and delete all web content. Domain allowed access. Allow domain to set the attributes of the APACHE cache directory. Domain allowed access. Allow the specified domain to list Apache cache. Domain allowed access. Allow the specified domain to read and write Apache cache files. Domain allowed access. Allow the specified domain to delete Apache cache. Domain allowed access. Allow the specified domain to read apache configuration files. Domain allowed access. Allow the specified domain to manage apache configuration files. Domain allowed access. Execute the Apache helper program with a domain transition. Domain allowed access. Execute the Apache helper program with a domain transition, and allow the specified role the Apache helper domain. Domain allowed to transition. Role allowed access. Allow the specified domain to read apache log files. Domain allowed access. Allow the specified domain to append to apache log files. Domain allowed access. Do not audit attempts to append to the Apache logs. Domain to not audit. Allow the specified domain to manage to apache log files. Domain allowed access. Do not audit attempts to search Apache module directories. Domain to not audit. Allow the specified domain to list the contents of the apache modules directory. Domain allowed access. Allow the specified domain to execute apache modules. Domain allowed access. Execute a domain transition to run httpd_rotatelogs. Domain allowed to transition. Allow the specified domain to list apache system content files. Domain allowed access. Allow the specified domain to manage apache system content files. Domain allowed access. Execute all web scripts in the system script domain. Domain allowed to transition. Do not audit attempts to read and write Apache system script unix domain stream sockets. Domain to not audit. Execute all user scripts in the user script domain. Domain allowed to transition. Execute all user scripts in the user script domain. Add user script domains to the specified role. Domain allowed to transition. Role allowed access.. Allow the specified domain to read apache squirrelmail data. Domain allowed access. Allow the specified domain to append apache squirrelmail data. Domain allowed access. Search apache system content. Domain allowed access. Read apache system content. Domain allowed access. Search apache system CGI directories. Domain allowed access. Create, read, write, and delete all user web content. Domain allowed access. Search system script state directory. Domain allowed access. Allow the specified domain to read apache tmp files. Domain allowed access. Dontaudit attempts to write apache tmp files. Domain to not audit. Execute CGI in the specified domain.

Execute CGI in the specified domain.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Domain run the cgi script in. Type of the executable to enter the cgi domain.
All of the rules required to administrate an apache environment Prefix of the domain. Example, user would be the prefix for the uder_t domain. Domain allowed access. Role allowed access.

Allow Apache to modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.

Allow Apache to use mod_auth_pam

Allow httpd to use built in scripting (usually php)

Allow HTTPD scripts and modules to connect to the network using TCP.

Allow HTTPD scripts and modules to connect to databases over the network.

Allow httpd to act as a relay

Allow http daemon to send mail

Allow Apache to communicate with avahi service via dbus

Allow httpd cgi support

Allow httpd to act as a FTP server by listening on the ftp port.

Allow httpd to read home directories

Allow httpd daemon to change its resource limits

Allow HTTPD to run SSI executables in the same domain as system CGI scripts.

Unify HTTPD to communicate with the terminal. Needed for entering the passphrase for certificates at the terminal.

Unify HTTPD handling of all content files.

Allow httpd to access cifs file systems

Allow httpd to run gpg

Allow httpd to access nfs file systems

APC UPS monitoring daemon Execute a domain transition to run apcupsd. Domain allowed to transition. Execute apcupsd server in the apcupsd domain. Domain allowed to transition. Read apcupsd PID files. Domain allowed access. Allow the specified domain to read apcupsd's log files. Domain allowed access. Allow the specified domain to append apcupsd log files. Domain allowed access. Execute a domain transition to run httpd_apcupsd_cgi_script. Domain allowed to transition. All of the rules required to administrate an apcupsd environment Domain allowed access. The role to be allowed to manage the apcupsd domain. Advanced power management daemon Execute APM in the apm domain. Domain allowed to transition. Use file descriptors for apmd. Domain allowed access. Write to apmd unnamed pipes. Domain allowed access. Read and write to an apm unix stream socket. Domain allowed access. Append to apm's log file. Domain allowed access. Connect to apmd over an unix stream socket. Domain allowed access. APT advanced package tool. Execute apt programs in the apt domain. Domain allowed to transition. Execute apt programs in the apt domain. Domain allowed to transition. The role to allow the apt domain. Inherit and use file descriptors from apt. Domain allowed access. Do not audit attempts to use file descriptors from apt. Domain to not audit. Read from an unnamed apt pipe. Domain allowed access. Read and write an unnamed apt pipe. Domain allowed access. Read from and write to apt ptys. Domain allowed access. Read the apt package cache. Domain allowed access. Read the apt package database. Domain allowed access. Create, read, write, and delete the apt package database. Domain allowed access. Do not audit attempts to create, read, write, and delete the apt package database. Domain to not audit. Ethernet activity monitor. Execute arpwatch server in the arpwatch domain. Domain allowed to transition. Search arpwatch's data file directories. Domain allowed access. Create arpwatch data files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Read and write arpwatch temporary files. Domain allowed access. Do not audit attempts to read and write arpwatch packet sockets. Domain to not audit. All of the rules required to administrate an arpwatch environment Domain allowed access. The role to be allowed to manage the arpwatch domain. Asterisk IP telephony server Execute asterisk in the asterisk domain. Domain allowed to transition. Connect to asterisk over a unix domain stream socket. Domain allowed access. Allow changing the attributes of the asterisk log files and directories Domain allowed access. Allow changing the attributes of the asterisk PID files Domain allowed access. All of the rules required to administrate an asterisk environment Domain allowed access. The role to be allowed to manage the asterisk domain. Tool for non-root processes to bind to reserved ports Use authbind to bind to a reserved port. Domain allowed to transition. Filesystem automounter service. Execute automount in the automount domain. Domain allowed to transition. Send automount a signal Domain allowed access. Execute automount in the caller domain. Domain allowed access. Allow the domain to read state files in /proc. Domain to allow access. Do not audit attempts to file descriptors for automount. Domain to not audit. Do not audit attempts to write automount daemon unnamed pipes. Domain to not audit. Do not audit attempts to get the attributes of automount temporary directories. Domain to not audit. All of the rules required to administrate an automount environment Domain allowed access. The role to be allowed to manage the automount domain. mDNS/DNS-SD daemon implementing Apple ZeroConf architecture Execute avahi server in the avahi domain. Domain allowed to transition. Send avahi a signal Domain allowed access. Send avahi a kill signal. Domain allowed access. Send avahi a signull Domain allowed access. Send and receive messages from avahi over dbus. Domain allowed access. Connect to avahi using a unix domain stream socket. Domain allowed access. Do not audit attempts to search the avahi pid directory. Domain to not audit. All of the rules required to administrate an avahi environment Domain allowed access. The role to be allowed to manage the avahi domain. AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. Read and write awstats unnamed pipes. Domain allowed access. Execute awstats cgi scripts in the caller domain. Domain allowed access. System backup scripts Execute backup in the backup domain. Domain allowed to transition. Execute backup in the backup domain, and allow the specified role the backup domain. Domain allowed to transition. Role allowed access. bacula backup program Execute user interfaces in the bacula_admin domain. Domain allowed to transition. Execute user interfaces in the bacula_admin domain, and allow the specified role to transition to the bacula_admin domain. Domain allowed to transition. Role allowed access. bcfg2-server daemon which serves configurations to clients based on the data in its repository Execute bcfg2 in the bcfg2 domain.. Domain allowed to transition. Execute bcfg2 server in the bcfg2 domain. Domain allowed access. Search bcfg2 lib directories. Domain allowed access. Read bcfg2 lib files. Domain allowed access. Manage bcfg2 lib files. Domain allowed access. Manage bcfg2 lib directories. Domain allowed access. All of the rules required to administrate an bcfg2 environment Domain allowed access. Role allowed access. Berkeley internet name domain DNS server. Execute bind server in the bind domain. Domain allowed to transition. Execute ndc in the ndc domain. Domain allowed to transition. Send generic signals to BIND. Domain allowed access. Send null sigals to BIND. Domain allowed access. Send BIND the kill signal Domain allowed access. Execute ndc in the ndc domain, and allow the specified role the ndc domain. Domain allowed to transition. Role allowed access. Execute bind in the named domain. Domain allowed to transition. Read DNSSEC keys. Domain allowed access. Read BIND named configuration files. Domain allowed access. Write BIND named configuration files. Domain allowed access. Create, read, write, and delete BIND configuration directories. Domain allowed access. Search the BIND cache directory. Domain allowed access. Create, read, write, and delete BIND cache files. Domain allowed access. Set the attributes of the BIND pid directory. Domain allowed access. Set the attributes of the BIND zone directory. Domain allowed access. Read BIND zone files. Domain allowed access. Manage BIND zone files. Domain allowed access. Send and receive datagrams to and from named. (Deprecated) Domain allowed access. All of the rules required to administrate an bind environment Domain allowed access. The role to be allowed to manage the bind domain.

Allow BIND to write the master zone files. Generally this is used for dynamic DNS or zone transfers.

Bitlbee service Read bitlbee configuration files Domain allowed accesss. All of the rules required to administrate an bitlbee environment Domain allowed access. The role to be allowed to manage the bitlbee domain. Blueman is a tool to manage Bluetooth devices Execute blueman in the blueman domain.. Domain allowed to transition. Send and receive messages from blueman over dbus. Domain allowed access. Search blueman lib directories. Domain allowed access. Read blueman lib files. Domain allowed access. Create, read, write, and delete blueman lib files. Domain allowed access. Bluetooth tools and system services. Role access for bluetooth Role allowed access User domain for the role Connect to bluetooth over a unix domain stream socket. Domain allowed access. Execute bluetooth in the bluetooth domain. Domain allowed to transition. Read bluetooth daemon configuration. Domain allowed access. Send and receive messages from bluetooth over dbus. Domain allowed access. Execute bluetooth_helper in the bluetooth_helper domain. (Deprecated) Domain allowed to transition. Execute bluetooth_helper in the bluetooth_helper domain, and allow the specified role the bluetooth_helper domain. (Deprecated) Domain allowed to transition. Role allowed access. The type of the terminal allow the bluetooth_helper domain to use. Read bluetooth helper state files. Domain to not audit. All of the rules required to administrate an bluetooth environment Domain allowed access. The role to be allowed to manage the bluetooth domain. Utilities for configuring the linux ethernet bridge Execute a domain transition to run brctl. Domain allowed to transition. Bugzilla server Allow the specified domain to search bugzilla directories. Domain allowed access. Do not audit attempts to read and write bugzilla script unix domain stream sockets. Domain to not audit. All of the rules required to administrate an bugzilla environment Domain allowed access. The role to be allowed to manage the bugzilla domain. Squid log analysis Allow domain to read calamaris www files. Domain allowed access. Canna - kana-kanji conversion server Connect to Canna using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an canna environment Domain allowed access. The role to be allowed to manage the canna domain. Cluster Configuration System Execute a domain transition to run ccs. Domain allowed to transition. Connect to ccs over an unix stream socket. Domain allowed access. Read cluster configuration files. Domain allowed access. Manage cluster configuration files. Domain allowed access. Policy for cdrecord Role access for cdrecord Role allowed access User domain for the role

Allow cdrecord to read various content. nfs, samba, removable devices, user temp and untrusted content files

Certmaster SSL certificate distribution service Execute a domain transition to run certmaster. Domain allowed to transition. Execute certmaster in the caller domain. Domain allowed access. read certmaster logs. Domain allowed access. Append to certmaster logs. Domain allowed access. Create, read, write, and delete certmaster logs. Domain allowed access. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the syslog domain. Certificate status monitor and PKI enrollment client Execute a domain transition to run certmonger. Domain allowed to transition. Send and receive messages from certmonger over dbus. Domain allowed access. Execute certmonger server in the certmonger domain. Domain allowed to transition. Read certmonger PID files. Domain allowed access. Search certmonger lib directories. Domain allowed access. Read certmonger lib files. Domain allowed access. Create, read, write, and delete certmonger lib files. Domain allowed access. All of the rules required to administrate an certmonger environment Domain allowed access. Role allowed access. Digital Certificate Tracking Domain transition to certwatch. Domain allowed to transition. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. Domain allowed to transition. Role allowed access. Execute certwatch in the certwatch domain, and allow the specified role the certwatch domain, and use the caller's terminal. Has a sigchld backchannel. (Deprecated) Domain allowed to transition. Role allowed access. The type of the terminal allow the certwatch domain to use. libcg is a library that abstracts the control group file system in Linux. Execute a domain transition to run CG Clear. Domain allowed to transition. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG config parser. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. Domain allowed to transition. Execute a domain transition to run CG rules engine daemon. domain. Domain allowed to transition. Execute a domain transition to run CG Clear and allow the specified role the CG Clear domain. Domain allowed to transition. Role allowed access. Connect to CG rules engine daemon over unix stream sockets. Domain allowed access. All of the rules required to administrate an cgroup environment. Domain allowed access. Role allowed access. Chrony NTP background daemon Execute chronyd in the chronyd domain. Domain allowed to transition. Execute chronyd Domain allowed access. Read chronyd logs. Domain allowed access. All of the rules required to administrate an chronyd environment Domain allowed access. The role to be allowed to manage the chronyd domain. Encrypted tunnel daemon ClamAV Virus Scanner Execute a domain transition to run clamd. Domain allowed to transition. Connect to run clamd. Domain allowed access. Allow the specified domain to append to clamav log files. Domain allowed access. Read clamav configuration files. Domain allowed access. Search clamav libraries directories. Domain allowed access. Execute a domain transition to run clamscan. Domain allowed to transition. Execute clamscan without a transition. Domain allowed access. All of the rules required to administrate an clamav environment Domain allowed access. The role to be allowed to manage the clamav domain.

Allow clamd to use JIT compiler

Clockspeed simple network time protocol client Execute clockspeed utilities in the clockspeed_cli domain. Domain allowed to transition. Allow the specified role the clockspeed_cli domain. Domain allowed to transition. Role allowed access. clogd - Clustered Mirror Log Server Execute a domain transition to run clogd. Domain allowed to transition. Connect to clogd over a unix domain stream socket. Domain allowed access. Allow read and write access to clogd semaphores. Domain allowed access. Read and write to group shared memory. Domain allowed access. Cluster mirror log daemon Execute a domain transition to run cmirrord. Domain allowed to transition. Execute cmirrord server in the cmirrord domain. Domain allowed to transition. Read cmirrord PID files. Domain allowed access. Read and write to cmirrord shared memory. Domain allowed access. All of the rules required to administrate an cmirrord environment Domain allowed access. Role allowed access. Cobbler installation server.

Cobbler is a Linux installation server that allows for rapid setup of network installation environments. It glues together and automates many associated Linux tasks so you do not have to hop between lots of various commands and applications when rolling out new systems, and, in some cases, changing existing ones.

Execute a domain transition to run cobblerd. Domain allowed to transition. Execute cobblerd server in the cobblerd domain. Domain allowed to transition. Read Cobbler content in /etc Domain allowed access. Do not audit attempts to read and write Cobbler log files (leaked fd). Domain to not audit. Search cobbler dirs in /var/lib Domain allowed access. Read cobbler files in /var/lib Domain allowed access. Manage cobbler files in /var/lib Domain allowed access. All of the rules required to administrate an cobblerd environment Domain allowed access. Role allowed access.

Allow Cobbler to modify public files used for public file transfer services.

GNOME color manager Execute a domain transition to run colord. Domain allowed access. Send and receive messages from colord over dbus. Domain allowed access. Read colord lib files. Domain allowed access. Comsat, a biff server. Framework for facilitating multiple user sessions on desktops. Execute a domain transition to run consolekit. Domain allowed to transition. Send and receive messages from consolekit over dbus. Domain allowed access. Read consolekit log files. Domain allowed access. Manage consolekit log files. Domain allowed access. Read consolekit PID files. Domain allowed access. Corosync Cluster Engine Execute a domain transition to run corosync. Domain allowed to transition. Allow the specified domain to read corosync's log files. Domain allowed access. Connect to corosync over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an corosync environment Domain allowed access. The role to be allowed to manage the corosyncd domain. Courier IMAP and POP3 email servers Execute the courier authentication daemon with a domain transition. Domain allowed to transition. Execute the courier POP3 and IMAP server with a domain transition. Domain allowed to transition. Read courier config files Domain allowed access. Create, read, write, and delete courier spool directories. Domain allowed access. Create, read, write, and delete courier spool files. Domain allowed access. Read courier spool files. Domain allowed access. Read and write to courier spool pipes. Domain allowed access. Services for loading CPU microcode and CPU frequency scaling. CPUcontrol stub interface. No access allowed. Domain allowed access. Command-line CPU frequency settings. Send and receive messages from cpufreq-selector over dbus. Domain allowed access. Periodic execution of scheduled commands. Role access for cron Role allowed access User domain for the role Role access for unconfined cronjobs Role allowed access User domain for the role Role access for cron Role allowed access User domain for the role Make the specified program domain accessable from the system cron jobs. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Execute cron in the cron system domain. Domain allowed to transition. Execute crond_exec_t Domain allowed access. Execute crond server in the nscd domain. Domain allowed to transition. Inherit and use a file descriptor from the cron daemon. Domain allowed access. Send a SIGCHLD signal to the cron daemon. Domain allowed access. Read a cron daemon unnamed pipe. Domain allowed access. Do not audit attempts to write cron daemon unnamed pipes. Domain to not audit. Read and write a cron daemon unnamed pipe. Domain allowed access. Read, and write cron daemon TCP sockets. Domain allowed access. Dontaudit Read, and write cron daemon TCP sockets. Domain to not audit. Search the directory containing user cron tables. Domain allowed access. Manage pid files used by cron Domain allowed access. Execute anacron in the cron system domain. Domain allowed to transition. Inherit and use a file descriptor from system cron jobs. Domain allowed access. Write a system cron job unnamed pipe. Domain allowed access. Read and write a system cron job unnamed pipe. Domain allowed access. Allow read/write unix stream sockets from the system cron jobs. Domain allowed access. Read temporary files from the system cron jobs. Domain allowed access. Do not audit attempts to append temporary files from the system cron jobs. Domain to not audit. Do not audit attempts to write temporary files from the system cron jobs. Domain to not audit.

Allow system cron jobs to relabel filesystem for restoring file contexts.

Enable extra rules in the cron domain to support fcron.

Common UNIX printing system Setup cups to transtion to the cups backend domain Domain allowed access. Execute cups in the cups domain. Domain allowed to transition. Connect to cupsd over an unix domain stream socket. Domain allowed access. Connect to cups over TCP. (Deprecated) Domain allowed access. Send and receive messages from cups over dbus. Domain allowed access. Read cups PID files. Domain allowed access. Execute cups_config in the cups_config domain. Domain allowed to transition. Send generic signals to the cups configuration daemon. Domain allowed access. Send and receive messages from cupsd_config over dbus. Domain allowed access. Read cups configuration files. Domain allowed access. Read cups-writable configuration files. Domain allowed access. Read cups log files. Domain allowed access. Append cups log files. Domain allowed access. Write cups log files. Domain allowed access. Connect to ptal over an unix domain stream socket. Domain allowed access. All of the rules required to administrate an cups environment Domain allowed access. The role to be allowed to manage the cups domain. Concurrent versions system Read the CVS data and metadata. Domain allowed access. Allow the specified domain to execute cvs in the caller domain. Domain allowed access. All of the rules required to administrate an cvs environment Domain allowed access. The role to be allowed to manage the cvs domain.

Allow cvs daemon to read shadow

Cyphesis WorldForge game server Execute a domain transition to run cyphesis. Domain allowed to transition. Cyrus is an IMAP service intended to be run on sealed servers Allow caller to create, read, write, and delete cyrus data files. Domain allowed access. Connect to Cyrus using a unix domain stream socket. Domain allowed access. All of the rules required to administrate an cyrus environment Domain allowed access. The role to be allowed to manage the cyrus domain. Collection of tools for managing UNIX services

Policy for DJB's daemontools

An ipc channel between the supervised domain and svc_start_t Domain allowed access. Define a specified domain as a supervised service. Domain allowed access. The type associated with the process program. Execute in the svc_start_t domain. Domain allowed to transition. Execute svc_start in the svc_start domain, and allow the specified role the svc_start domain. Domain allowed access. The role to be allowed the svc_start domain. Execute in the svc_run_t domain. Domain allowed to transition. Send a SIGCHLD signal to svc_run domain. Domain allowed access. Execute in the svc_multilog_t domain. Domain allowed to transition. Search svc_svc_t directory. Domain allowed access. Allow a domain to read svc_svc_t files. Domain allowed access. Allow a domain to create svc_svc_t files. Domain allowed access.
Dante msproxy and socks4/5 proxy server Database administrator role Change to the database administrator role. Role allowed access. Change from the database administrator role.

Change from the database administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow dbadm to manage files in users home directories

Allow dbadm to read files in users home directories

Dictionary server for the SKK Japanese input method system. Desktop messaging bus DBUS stub interface. No access allowed. Domain allowed access Template for creating connections to the system DBUS. Domain allowed access. Template for creating connections to a user DBUS. Domain allowed access. Send a message the session DBUS. Domain allowed access. Read dbus configuration. Domain allowed access. Read system dbus lib files. Domain allowed access. Create, read, write, and delete system dbus lib files. Domain allowed access. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Allow a application domain to be started by the session dbus. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Connect to the system DBUS for service (acquire_svc). Domain allowed access. Send a message on the system DBUS. Domain allowed access. Allow unconfined access to the system DBUS. Domain allowed access. Create a domain for processes which can be started by the system dbus Type to be used as a domain. Type of the program to be used as an entry point to this domain. Use and inherit system DBUS file descriptors. Domain allowed access. Dontaudit Read, and write system dbus TCP sockets. Domain to not audit. Allow unconfined access to the system DBUS. Domain allowed access. Distributed checksum clearinghouse spam filtering Execute cdcc in the cdcc domain. Domain allowed to transition. Execute cdcc in the cdcc domain, and allow the specified role the cdcc domain. Domain allowed to transition. Role allowed access. Execute dcc_client in the dcc_client domain. Domain allowed to transition. Send a signal to the dcc_client. Domain allowed access. Execute dcc_client in the dcc_client domain, and allow the specified role the dcc_client domain. Domain allowed to transition. Role allowed access. Execute dbclean in the dcc_dbclean domain. Domain allowed to transition. Execute dbclean in the dcc_dbclean domain, and allow the specified role the dcc_dbclean domain. Domain allowed to transition. Role allowed access. Connect to dccifd over a unix domain stream socket. Domain allowed access. Update dynamic IP address at DynDNS.org Execute ddclient in the ddclient domain. Domain allowed to transition. Execute ddclient daemon on behalf of a user or staff type. Domain allowed to transition. Role allowed access. All of the rules required to administrate an ddclient environment Domain allowed access. The role to be allowed to manage the ddclient domain. ddcprobe retrieves monitor and graphics card information Execute ddcprobe in the ddcprobe domain. Domain allowed to transition. Execute ddcprobe in the ddcprobe domain, and allow the specified role the ddcprobe domain. Domain allowed to transition. Role to be authenticated for ddcprobe domain. DenyHosts SSH dictionary attack mitigation

DenyHosts is a script intended to be run by Linux system administrators to help thwart SSH server attacks (also known as dictionary based attacks and brute force attacks).

Execute a domain transition to run denyhosts. Domain allowed to transition. Execute denyhost server in the denyhost domain. Domain allowed to transition. All of the rules required to administrate an denyhosts environment. Domain allowed access. Role allowed access.
Devicekit modular hardware abstraction layer Execute a domain transition to run devicekit. Domain allowed to transition. Send to devicekit over a unix domain datagram socket. Domain allowed access. Send and receive messages from devicekit over dbus. Domain allowed access. Send and receive messages from devicekit disk over dbus. Domain allowed access. Send signal devicekit power Domain allowed access. Send and receive messages from devicekit power over dbus. Domain allowed access. Read devicekit PID files. Domain allowed access. All of the rules required to administrate an devicekit environment Domain allowed access. The role to be allowed to manage the devicekit domain. The type of the user terminal. Dynamic host configuration protocol (DHCP) server Transition to dhcpd. Domain allowed to transition. Set the attributes of the DCHP server state files. Domain allowed access. Execute dhcp server in the dhcp domain. Domain allowed to transition. All of the rules required to administrate an dhcp environment Domain allowed access. The role to be allowed to manage the dhcp domain.

Allow DHCP daemon to use LDAP backends

Dictionary daemon Use dictionary services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an dictd environment Domain allowed access. The role to be allowed to manage the dictd domain. Distributed compiler daemon small and secure DNS daemon Allow search the djbdns-tinydns key ring. Domain allowed access. Allow link to the djbdns-tinydns key ring. Domain allowed access. DomainKeys Identified Mail milter. Decode DMI data for x86/ia64 bioses. Execute dmidecode in the dmidecode domain. Domain allowed to transition. Execute dmidecode in the dmidecode domain, and allow the specified role the dmidecode domain. Domain allowed to transition. Role allowed access. dnsmasq DNS forwarder and DHCP server Execute dnsmasq server in the dnsmasq domain. Domain allowed to transition. Execute the dnsmasq init script in the init script domain. Domain allowed to transition. Send dnsmasq a signal Domain allowed access. Send dnsmasq a signull Domain allowed access. Send dnsmasq a kill signal. Domain allowed access. Read dnsmasq config files. Domain allowed access. Write to dnsmasq config files. Domain allowed access. Delete dnsmasq pid files Domain allowed access. Read dnsmasq pid files Domain allowed access. All of the rules required to administrate an dnsmasq environment Domain allowed access. The role to be allowed to manage the dnsmasq domain. Dovecot POP and IMAP mail server Connect to dovecot auth unix domain stream socket. Domain allowed access. Execute dovecot_deliver in the dovecot_deliver domain. Domain allowed to transition. Create, read, write, and delete the dovecot spool files. Domain allowed access. Do not audit attempts to delete dovecot lib files. Domain to not audit. All of the rules required to administrate an dovecot environment Domain allowed access. The role to be allowed to manage the dovecot domain. Policy for the Debian package manager. Execute dpkg programs in the dpkg domain. Domain allowed to transition. Execute dpkg_script programs in the dpkg_script domain. Domain allowed to transition. Execute dpkg programs in the dpkg domain. Domain allowed to transition. The role to allow the dpkg domain. Inherit and use file descriptors from dpkg. Domain allowed access. Read from an unnamed dpkg pipe. Domain allowed access. Read and write an unnamed dpkg pipe. Domain allowed access. Inherit and use file descriptors from dpkg scripts. Domain allowed access. Read the dpkg package database. Domain allowed access. Create, read, write, and delete the dpkg package database. Domain allowed access. Do not audit attempts to create, read, write, and delete the dpkg package database. Domain to not audit. Lock the dpkg package database. Domain allowed access. Generate entropy from audio input

Allow the use of the audio devices as the source for the entropy feeds

Evolution email client Role access for evolution Role allowed access User domain for the role Create objects in users evolution home folders. Domain allowed access. Private file type. The object class of the object being created. Connect to evolution unix stream socket. Domain allowed access. Send and receive messages from evolution over dbus. Domain allowed access. Send and receive messages from evolution_alarm over dbus. Domain allowed access. Exim mail transfer agent Execute a domain transition to run exim. Domain allowed to transition. Do not audit attempts to read, exim tmp files Domain to not audit. Allow domain to read, exim tmp files Domain allowed access. Read exim PID files. Domain allowed access. Allow the specified domain to read exim's log files. Domain allowed access. Allow the specified domain to append exim log files. Domain allowed access. Allow the specified domain to manage exim's log files. Domain allowed access. Create, read, write, and delete exim spool dirs. Domain allowed access. Read exim spool files. Domain allowed access. Create, read, write, and delete exim spool files. Domain allowed access.

Allow exim to connect to databases (postgres, mysql)

Allow exim to read unprivileged user files.

Allow exim to create, read, write, and delete unprivileged user files.

Update firewall filtering to ban IP addresses with too many password failures. Execute a domain transition to run fail2ban. Domain allowed to transition. Connect to fail2ban over a unix domain stream socket. Domain allowed access. Read and write to an fail2ban unix stream socket. Domain allowed access. Read fail2ban lib files. Domain allowed access. Allow the specified domain to read fail2ban's log files. Domain allowed access. Allow the specified domain to append fail2ban log files. Domain allowed access. Read fail2ban PID files. Domain allowed access. All of the rules required to administrate an fail2ban environment Domain allowed access. The role to be allowed to manage the fail2ban domain. Remote-mail retrieval and forwarding utility All of the rules required to administrate an fetchmail environment Domain allowed access. Finger user information service. Execute fingerd in the fingerd domain. Domain allowed to transition. Allow the specified domain to connect to fingerd with a tcp socket. (Deprecated) Domain allowed access. Final system configuration run during the first boot after installation of Red Hat/Fedora systems. Execute firstboot in the firstboot domain. Domain allowed to transition. Execute firstboot in the firstboot domain, and allow the specified role the firstboot domain. Domain allowed to transition. Role allowed access. Inherit and use a file descriptor from firstboot. Domain allowed access. Do not audit attempts to inherit a file descriptor from firstboot. Domain to not audit. Write to a firstboot unnamed pipe. Domain allowed access. Read and Write to a firstboot unnamed pipe. Domain allowed access. Do not audit attemps to read and write to a firstboot unnamed pipe. Domain to not audit. Do not audit attemps to read and write to a firstboot unix domain stream socket. Domain to not audit. DBus fingerprint reader service Execute a domain transition to run fprintd. Domain allowed to transition. Send and receive messages from fprintd over dbus. Domain allowed access. File transfer protocol service Allow domain dyntransition to sftpd_anon domain. Domain allowed to transition. Use ftp by connecting over TCP. (Deprecated) Domain allowed access. Read ftpd etc files Domain allowed access. Execute FTP daemon entry point programs. Domain allowed access. Read FTP transfer logs Domain allowed access. Execute the ftpdctl program in the ftpdctl domain. Domain allowed to transition. Execute the ftpdctl program in the ftpdctl domain. Domain allowed to transition. The role to allow the ftpdctl domain. Allow domain dyntransition to sftpd domain. Domain allowed to transition. All of the rules required to administrate an ftp environment Domain allowed access. The role to be allowed to manage the ftp domain.

Allow ftp servers to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Allow ftp servers to login to local users and read/write all files on the system, governed by DAC.

Allow ftp servers to use cifs used for public file transfer services.

Allow ftp servers to use nfs used for public file transfer services.

Allow ftp to read and write files in the user home directories

Allow anon internal-sftp to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Allow sftp-internal to read and write files in the user home directories

Allow sftp-internal to login to local users and read/write all files on the system, governed by DAC.

Games Role access for games Role allowed access User domain for the role Allow the specified domain to read/write games data. Domain allowed access. OpenH.323 Voice-Over-IP Gatekeeper giFT peer to peer file sharing tool Role access for gift Role allowed access User domain for the role GIT revision control system.

Determine whether Git CGI can search home directories.

Determine whether Git CGI can access cifs file systems.

Determine whether Git CGI can access nfs file systems.

Determine whether calling user domains can execute Git daemon in the git_session_t domain.

Determine whether Git session daemons can send syslog messages.

Determine whether Git system daemon can search home directories.

Determine whether Git system daemon can access cifs file systems.

Determine whether Git system daemon can access nfs file systems.

Tools for managing and hosting git repositories. Execute a domain transition to run gitosis. Domain allowed to transition. Execute gitosis-serve in the gitosis domain, and allow the specified role the gitosis domain. Domain allowed access Role allowed access. Allow the specified domain to read gitosis lib files. Domain allowed access. Allow the specified domain to manage gitosis lib files. Domain allowed access. policy for glance Transition to glance registry. Domain allowed to transition. Transition to glance api. Domain allowed to transition. Read glance's log files. Domain allowed access. Append to glance log files. Domain allowed access. Manage glance log files Domain allowed access. Search glance lib directories. Domain allowed access. Read glance lib files. Domain allowed access. Manage glance lib files. Domain allowed access. Manage glance lib directories. Domain allowed access. Read glance PID files. Domain allowed access. Manage glance PID files. Domain allowed access. All of the rules required to administrate an glance environment Domain allowed access. Role allowed access. GNU network object model environment (GNOME) Role access for gnome Role allowed access User domain for the role Execute gconf programs in in the caller domain. Domain allowed access. Create, read, write, and delete gconf config files. Domain allowed access. gconf connection template. Domain allowed access. Run gconfd in gconfd domain. Domain allowed access. Set attributes of Gnome config dirs. Domain allowed access. manage gnome homedir content (.config) Domain allowed access. Gnome clock handler for setting the time. Execute a domain transition to run gnomeclock. Domain allowed to transition. Execute gnomeclock in the gnomeclock domain, and allow the specified role the gnomeclock domain. Domain allowed to transition. Role allowed access. Send and receive messages from gnomeclock over dbus. Domain allowed access. Policy for GNU Privacy Guard and related programs. Role access for gpg Role allowed access User domain for the role Transition to a user gpg domain. Domain allowed to transition. Execute the gpg application without transitioning Domain allowed to execute gpg Send generic signals to user gpg processes. Domain allowed access. Read and write GPG agent pipes. Domain allowed access. Send messages to and from GPG Pinentry over DBUS. Domain allowed access. List Gnu Privacy Guard user secrets. Domain allowed access.

Allow usage of the gpg-agent --write-env-file option. This also allows gpg-agent to manage user files.

General Purpose Mouse driver Connect to GPM over a unix domain stream socket. Domain allowed access. Get the attributes of the GPM control channel named socket. Domain allowed access. Do not audit attempts to get the attributes of the GPM control channel named socket. Domain to not audit. Set the attributes of the GPM control channel named socket. Domain allowed access. gpsd monitor daemon Execute a domain transition to run gpsd. Domain allowed to transition. Execute gpsd in the gpsd domain, and allow the specified role the gpsd domain. Domain allowed to transition. Role allowed access. Read and write gpsd shared memory. Domain allowed access. Least privledge terminal user role Change to the guest role. Role allowed access. Change from the guest role.

Change from the guest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Software for reliable, scalable, distributed computing. Role access for hadoop. Role allowed access. Domain allowed access. Execute hadoop in the hadoop domain. Domain allowed to transition. Give permission to a domain to recvfrom hadoop_t Domain needing recvfrom permission Execute zookeeper client in the zookeeper client domain. Domain allowed to transition. Give permission to a domain to recvfrom zookeeper_t Domain needing recvfrom permission Execute zookeeper server in the zookeeper server domain. Domain allowed to transition. Give permission to a domain to recvfrom zookeeper_server_t Domain needing recvfrom permission Execute zookeeper server in the zookeeper domain. Domain allowed to transition. Give permission to a domain to recvfrom hadoop_datanode_t Domain needing recvfrom permission Give permission to a domain to read hadoop_etc_t Domain needing read permission Give permission to a domain to execute hadoop_etc_t Domain needing read and execute permission Give permission to a domain to recvfrom hadoop_jobtracker_t Domain needing recvfrom permission Give permission to a domain to polmatch on hadoop_lan_t Domain needing polmatch permission Give permission to a domain to recvfrom hadoop_namenode_t Domain needing recvfrom permission Give permission to a domain to recvfrom hadoop_secondarynamenode_t Domain needing recvfrom permission Give permission to a domain to recvfrom hadoop_tasktracker_t Domain needing recvfrom permission Hardware abstraction layer Execute hal in the hal domain. Domain allowed to transition. Get the attributes of a hal process. Domain allowed access. Read hal system state Domain allowed access. Allow ptrace of hal domain Domain allowed access. Allow domain to use file descriptors from hal. Domain allowed access. Do not audit attempts to use file descriptors from hal. Domain to not audit. Allow attempts to read and write to hald unnamed pipes. Domain allowed access. Do not audit attempts to read and write to hald unnamed pipes. Domain to not audit. Send to hal over a unix domain datagram socket. Domain allowed access. Send to hal over a unix domain stream socket. Domain allowed access. Dontaudit read/write to a hal unix datagram socket. Domain to not audit. Send a dbus message to hal. Domain allowed access. Send and receive messages from hal over dbus. Domain allowed access. Execute hal mac in the hal mac domain. Domain allowed to transition. Allow attempts to write the hal log files. Domain allowed access. Do not audit attempts to write the hal log files. Domain to not audit. Manage hald log files. Domain allowed access. Read hald tmp files. Domain allowed access. Do not audit attempts to read or write HAL libraries files Domain to not audit. Read hald PID files. Domain allowed access. Read/Write hald PID files. Domain allowed access. Manage hald PID dirs. Domain allowed access. Manage hald PID files. Domain allowed access. hddtemp hard disk temperature tool running as a daemon. Execute a domain transition to run hddtemp. Domain allowed to transition. Execute hddtemp. Domain allowed access. All of the rules required to administrate an hddtemp environment. Domain allowed access. Role allowed access. Port of Apple Rendezvous multicast DNS Send generic signals to howl. Domain allowed access. IIIMF htt server Use i18n_input over a TCP connection. (Deprecated) Domain allowed access. ShoutCast compatible streaming media server Execute a domain transition to run icecast. Domain allowed to transition. Allow domain signal icecast Domain allowed access. Execute icecast server in the icecast domain. Domain allowed to transition. Read icecast PID files. Domain allowed access. Manage icecast pid files. Domain allowed access. Allow the specified domain to read icecast's log files. Domain allowed access. Allow the specified domain to append icecast log files. Domain allowed access. Allow domain to manage icecast log files Domain allow access. All of the rules required to administrate an icecast environment Domain allowed access. Role allowed access. Bring up/down ethernet interfaces based on cable detection. Execute a domain transition to run ifplugd. Domain allowed to transition. Send a generic signal to ifplugd Domain allowed access. Read ifplugd etc configuration files. Domain allowed access. Manage ifplugd etc configuration files. Domain allowed access. Read ifplugd PID files. Domain allowed access. All of the rules required to administrate an ifplugd environment Domain allowed access. The role to be allowed to manage the ifplugd domain. iMaze game server Internet services daemon. Define the specified domain as a inetd service.

Define the specified domain as a inetd service. The inetd_service_domain(), inetd_tcp_service_domain(), or inetd_udp_service_domain() interfaces should be used instead of this interface, as this interface only provides the common rules to these three interfaces.

The type associated with the inetd service process. The type associated with the process program.
Define the specified domain as a TCP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Define the specified domain as a TCP and UDP inetd service. The type associated with the inetd service process. The type associated with the process program. Inherit and use file descriptors from inetd. Domain allowed access. Connect to the inetd service using a TCP connection. (Deprecated) Domain allowed access. Run inetd child process in the inet child domain Domain allowed to transition. Send UDP network traffic to inetd. (Deprecated) Domain allowed access. Read and write inetd TCP sockets. Domain allowed access.
Internet News NNTP server Allow the specified domain to execute innd in the caller domain. Domain allowed access. Allow the specified domain to execute inn configuration files in /etc. Domain allowed access. Create, read, write, and delete the innd log. Domain allowed access. Create, read, write, and delete the innd pid files. Domain allowed access. Read innd configuration files. Domain allowed access. Read innd news library files. Domain allowed access. Read innd news library files. Domain allowed access. Send to a innd unix dgram socket. Domain allowed access. Execute inn in the inn domain. Domain allowed to transition. All of the rules required to administrate an inn environment Domain allowed access. The role to be allowed to manage the inn domain. IRC client policy Role access for IRC Role allowed access User domain for the role IRC server IRQ balancing daemon Establish connections to iSCSI devices Execute a domain transition to run iscsid. Domain allowed to transition. Manage iscsid sempaphores. Domain allowed access. Connect to ISCSI using a unix domain stream socket. Domain allowed access. Read iscsi lib files. Domain allowed access. Jabber instant messaging server Connect to jabber over a TCP socket (Deprecated) Domain allowed access. All of the rules required to administrate an jabber environment Domain allowed access. The role to be allowed to manage the jabber domain. Java virtual machine Role access for java Role allowed access User domain for the role Execute java in the java domain, and allow the specified role the java domain. Domain allowed to transition. Role allowed access. Execute the java program in the unconfined java domain. Domain allowed to transition. Execute the java program in the unconfined java domain. Domain allowed to transition. Role allowed access. Execute the java program in the java domain. Domain allowed access.

Allow java executable stack

Kernel crash dumping mechanism Execute kdump in the kdump domain. Domain allowed to transition. Execute kdump in the kdump domain. Domain allowed to transition. Read kdump configuration file. Domain allowed access. Manage kdump configuration file. Domain allowed access. All of the rules required to administrate an kdump environment Domain allowed access. The role to be allowed to manage the kdump domain. system-config-kdump GUI MIT Kerberos admin and KDC

This policy supports:

Servers:

  • kadmind
  • krb5kdc

Clients:

  • kinit
  • kdestroy
  • klist
  • ksu (incomplete)

Execute kadmind in the current domain Domain allowed access. Execute a domain transition to run kpropd. Domain allowed to transition. Use kerberos services Domain allowed access. Read the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Do not audit attempts to write the kerberos configuration file (/etc/krb5.conf). Domain to not audit. Read and write the kerberos configuration file (/etc/krb5.conf). Domain allowed access. Read the kerberos key table. Domain allowed access. Read/Write the kerberos key table. Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Read the kerberos kdc configuration file (/etc/krb5kdc.conf). Domain allowed access. Connect to krb524 service Domain allowed access. All of the rules required to administrate an kerberos environment Domain allowed access. The role to be allowed to manage the kerberos domain.

Allow confined applications to run with kerberos.

Service for reporting kernel oopses to kerneloops.org Execute a domain transition to run kerneloops. Domain allowed to transition. Send and receive messages from kerneloops over dbus. Domain allowed access. dontaudit attempts to Send and receive messages from kerneloops over dbus. Domain to not audit. Allow domain to manage kerneloops tmp files Domain allowed access. All of the rules required to administrate an kerneloops environment Domain allowed access. The role to be allowed to manage the kerneloops domain. Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Execute a domain transition to run kismet. Domain allowed to transition. Execute kismet in the kismet domain, and allow the specified role the kismet domain. Domain allowed to transition. Role allowed access. Read kismet PID files. Domain allowed access. Manage kismet var_run files. Domain allowed access. Search kismet lib directories. Domain allowed access. Read kismet lib files. Domain allowed access. Create, read, write, and delete kismet lib files. Domain allowed access. Manage kismet var_lib files. Domain allowed access. Allow the specified domain to read kismet's log files. Domain allowed access. Allow the specified domain to append kismet log files. Domain allowed access. Allow domain to manage kismet log files Domain allowed access. All of the rules required to administrate an kismet environment Domain allowed access. Kernel Samepage Merging (KSM) Tuning Daemon Execute a domain transition to run ksmtuned. Domain allowed to transition. Execute ksmtuned server in the ksmtuned domain. Domain allowed to transition. All of the rules required to administrate an ksmtuned environment Domain allowed access. Role allowed access. KDE Talk daemon Hardware detection and configuration tools Execute kudzu in the kudzu domain. Domain allowed to transition. Execute kudzu in the kudzu domain, and allow the specified role the kudzu domain. Domain allowed to transition. Role allowed access. Get attributes of kudzu executable. Domain allowed access. OpenLDAP directory server Read the contents of the OpenLDAP database directories. Domain allowed access. Read the OpenLDAP configuration files. Domain allowed access. Use LDAP over TCP connection. (Deprecated) Domain allowed access. Connect to slapd over an unix stream socket. Domain allowed access. All of the rules required to administrate an ldap environment Domain allowed access. The role to be allowed to manage the ldap domain. Likewise Active Directory support for UNIX.

Likewise Open is a free, open source application that joins Linux, Unix, and Mac machines to Microsoft Active Directory to securely authenticate users with their domain credentials.

Connect to lsassd. Domain allowed access.
Linux infared remote control daemon Execute a domain transition to run lircd. Domain allowed to transition. Connect to lircd over a unix domain stream socket. Domain allowed access. Read lircd etc file Domain allowed access. All of the rules required to administrate a lircd environment Domain allowed access. The role to be allowed to manage the syslog domain. Livecd tool for building alternate livecd for different os and policy versions. Execute a domain transition to run livecd. Domain allowed to transition. Execute livecd in the livecd domain, and allow the specified role the livecd domain. Domain allowed to transition. Role allowed access. Read livecd temporary files. Domain allowed access. Read and write livecd temporary files. Domain allowed access. Allow read and write access to livecd semaphores. Domain allowed access. Load keyboard mappings. Execute the loadkeys program in the loadkeys domain. Domain allowed to transition. Execute the loadkeys program in the loadkeys domain. Domain allowed to transition. The role to allow the loadkeys domain. Execute the loadkeys program in the caller domain. Domain allowed access. device locking policy for lockdev Role access for lockdev Role allowed access User domain for the role Rotate and archive system logs Execute logrotate in the logrotate domain. Domain allowed to transition. Execute logrotate in the logrotate domain, and allow the specified role the logrotate domain. Domain allowed to transition. Role allowed access. Execute logrotate in the caller domain. Domain allowed access. Inherit and use logrotate file descriptors. Domain allowed access. Do not audit attempts to inherit logrotate file descriptors. Domain to not audit. Read a logrotate temporary files. Domain allowed access. System log analyzer and reporter Read logwatch temporary files. Domain allowed access. Search logwatch cache directory. Domain allowed access. Line printer daemon Role access for lpd Role allowed access User domain for the role Execute lpd in the lpd domain. Domain allowed to transition. Execute amrecover in the lpd domain, and allow the specified role the lpd domain. Domain allowed to transition. Role allowed access. List the contents of the printer spool directories. Domain allowed access. Read the printer spool files. Domain allowed access. Create, read, write, and delete printer spool files. Domain allowed access. Relabel from and to the spool files. Domain allowed access. List the contents of the printer spool directories. Domain allowed access. Allow the specified domain to execute lpr in the caller domain. Domain allowed access.

Use lpd server instead of cups

Mailman is for managing electronic mail discussion and e-newsletter lists Execute mailman in the mailman domain. Domain allowed to transition. Execute mailman CGI scripts in the mailman CGI domain. Domain allowed to transition. Execute mailman in the caller domain. Domain allowd access. Send generic signals to the mailman cgi domain. Domain allowed access. Allow domain to search data directories. Domain allowed access. Allow domain to to read mailman data files. Domain allowed access. Allow domain to to create mailman data files and write the directory. Domain allowed access. List the contents of mailman data directories. Domain allowed access. Allow read acces to mailman data symbolic links. Domain allowed access. Read mailman logs. Domain allowed access. Append to mailman logs. Domain allowed access. Create, read, write, and delete mailman logs. Domain allowed access. Allow domain to read mailman archive files. Domain allowed access. Execute mailman_queue in the mailman_queue domain. Domain allowed to transition. policy for mcelog Execute a domain transition to run mcelog. Domain allowed to transition. Mediawiki policy high-performance memory object caching system Execute a domain transition to run memcached. Domain allowed to transition. Read memcached PID files. Domain allowed access. All of the rules required to administrate an memcached environment Domain allowed access. The role to be allowed to manage the memcached domain. Milter mail filters MTA communication with milter sockets Domain allowed access. Allow getattr of milter sockets Domain allowed access. Manage spamassassin milter state Domain allowed access. Provides a DBus interface to communicate with mobile broadband (GSM, CDMA, UMTS, ...) cards. Execute a domain transition to run modemmanager. Domain allowed to transition. Send and receive messages from modemmanager over dbus. Domain allowed access. MojoMojo Wiki All of the rules required to administrate an mojomojo environment Domain allowed access. Role allowed access. Run .NET server and client applications on Linux. Execute the mono program in the mono domain. Domain allowed to transition. Execute mono in the mono domain, and allow the specified role the mono domain. Domain allowed to transition. Role allowed access. Execute the mono program in the caller domain. Domain allowed access. Read and write to mono shared memory. Domain allowed access. Monopoly daemon Policy for Mozilla and related web browsers Role access for mozilla Role allowed access User domain for the role Read mozilla home directory content Domain allowed access. Write mozilla home directory content Domain allowed access. Dontaudit attempts to read/write mozilla home directory content Domain to not audit. Dontaudit attempts to write mozilla home directory content Domain to not audit. Execute mozilla home directory content. Domain allowed access. Execmod mozilla home directory content. Domain allowed access. Run mozilla in the mozilla domain. Domain allowed to transition. Execute a domain transition to run mozilla_plugin. Domain allowed access. Execute mozilla_plugin in the mozilla_plugin domain, and allow the specified role the mozilla_plugin domain. Domain allowed access The role to be allowed the mozilla_plugin domain. Send and receive messages from mozilla over dbus. Domain allowed access. read/write mozilla per user tcp_socket Domain allowed access. Read mozilla_plugin tmpfs files Domain allowed access Delete mozilla_plugin tmpfs files Domain allowed access

Allow confined web browsers to read home directory content

Music Player Daemon Execute a domain transition to run mpd. Domain allowed to transition. Execute mpd server in the mpd domain. Domain allowed to transition. Read mpd data files. Domain allowed access. Manage mpd data files. Domain allowed access. Read mpd tmpfs files. Domain allowed access. Manage mpd tmpfs files. Domain allowed access. Search mpd lib directories. Domain allowed access. Read mpd lib files. Domain allowed access. Create, read, write, and delete mpd lib files. Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Manage mpd lib dirs files. Domain allowed access. All of the rules required to administrate an mpd environment Domain allowed access. Role allowed access. Mplayer media player and encoder Role access for mplayer Role allowed access User domain for the role Run mplayer in mplayer domain. Domain allowed to transition. Execute mplayer in the caller domain. Domain allowed access. Read mplayer per user homedir Domain allowed access.

Allow mplayer executable stack

Network traffic graphing Create and append mrtg logs. Domain allowed access. Policy common to all email tranfer agents. MTA stub interface. No access allowed. Domain allowed access. Role access for mta Role allowed access User domain for the role Make the specified domain usable for a mail server. Type to be used as a mail server domain. Type of the program to be used as an entry point to this domain. Make the specified type a MTA executable file. Type to be used as a mail client. Make the specified type by a system MTA. Type to be used as a mail client. Modified mailserver interface for sendmail daemon use.

A modified MTA mail server interface for the sendmail program. It's design does not fit well with policy, and using the regular interface causes a type_transition conflict if direct running of init scripts is enabled.

This interface should most likely only be used by the sendmail policy.

The type to be used for the mail server.
Make a type a mailserver type used for sending mail. Mail server domain type used for sending mail. Make a type a mailserver type used for delivering mail to local users. Mail server domain type used for delivering mail. Make a type a mailserver type used for sending mail on behalf of local users to the local mail spool. Mail server domain type used for sending local mail. Send mail from the system. Domain allowed to transition. Execute send mail in a specified domain.

Execute send mail in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. Domain to transition to.
Send system mail client a signal Domain allowed access. Execute sendmail in the caller domain. Domain allowed access. Read mail server configuration. Domain allowed access. write mail server configuration. Domain allowed access. Read mail address aliases. Domain allowed access. Create, read, write, and delete mail address aliases. Domain allowed access. Type transition files created in /etc to the mail address aliases type. Domain allowed access. Read and write mail aliases. Domain allowed access. Do not audit attempts to read and write TCP sockets of mail delivery domains. Domain to not audit. Connect to all mail servers over TCP. (Deprecated) Domain allowed access. Do not audit attempts to read a symlink in the mail spool. Domain to not audit. Get the attributes of mail spool files. Domain allowed access. Do not audit attempts to get the attributes of mail spool files. Domain to not audit. Create private objects in the mail spool directory. Domain allowed access. The type of the object to be created. The object class of the object being created. Read and write the mail spool. Domain allowed access. Create, read, and write the mail spool. Domain allowed access. Delete from the mail spool. Domain allowed access. Create, read, write, and delete mail spool files. Domain allowed access. Search mail queue dirs. Domain allowed access. List the mail queue. Domain allowed access. Read the mail queue. Domain allowed access. Do not audit attempts to read and write the mail queue. Domain to not audit. Create, read, write, and delete mail queue files. Domain allowed access. Read sendmail binary. Domain allowed access. Read and write unix domain stream sockets of user mail domains. Domain allowed access.
Munin network-wide load graphing (formerly LRRD) Connect to munin over a unix domain stream socket. Domain allowed access. Read munin configuration files. Domain allowed access. Append to the munin log. Domain allowed access. Search munin library directories. Domain allowed access. Do not audit attempts to search munin library directories. Domain to not audit. All of the rules required to administrate an munin environment Domain allowed access. The role to be allowed to manage the munin domain. Policy for MySQL Execute MySQL in the mysql domain. Domain allowed to transition. Send a generic signal to MySQL. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Connect to MySQL using a unix domain stream socket. Domain allowed access. Read MySQL configuration files. Domain allowed access. Search the directories that contain MySQL database storage. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database directories. Domain allowed access. Append to the MySQL database directory. Domain allowed access. Read and write to the MySQL database directory. Domain allowed access. Create, read, write, and delete MySQL database files. Domain allowed access. Read and write to the MySQL database named socket. Domain allowed access. Write to the MySQL log. Domain allowed access. Execute MySQL server in the mysql domain. Domain allowed to transition. Read MySQL PID files. Domain allowed access. Search MySQL PID files. Domain allowed access. All of the rules required to administrate an mysql environment Domain allowed access. The role to be allowed to manage the mysql domain.

Allow mysqld to connect to all ports

Net Saint / NAGIOS - network monitoring server Do not audit attempts to read or write nagios unnamed pipes. Domain to not audit. Allow the specified domain to read nagios configuration files. Domain allowed access. Read nagios logs. Domain allowed access. Do not audit attempts to read or write nagios logs. Domain to not audit. Search nagios spool directories. Domain allowed access. Allow the specified domain to read nagios temporary files. Domain allowed access. Execute the nagios NRPE with a domain transition. Domain allowed to transition. All of the rules required to administrate an nagios environment Domain allowed access. The role to be allowed to manage the nagios domain. Netcf network configuration tool (ncftool). Execute a domain transition to run ncftool. Domain allowed to transition. Execute ncftool in the ncftool domain, and allow the specified role the ncftool domain. Domain allowed access The role to be allowed the ncftool domain. Nessus network scanning daemon Connect to nessus over a TCP socket (Deprecated) Domain allowed access. Manager for dynamically switching between networks. Read and write NetworkManager UDP sockets. Domain allowed access. Read and write NetworkManager packet sockets. Domain allowed access. Allow caller to relabel tun_socket Domain allowed access. Read and write NetworkManager netlink routing sockets. Domain allowed access. Execute NetworkManager with a domain transition. Domain allowed to transition. Execute NetworkManager scripts with an automatic domain transition to initrc. Domain allowed to transition. Send and receive messages from NetworkManager over dbus. Domain allowed access. Send a generic signal to NetworkManager Domain allowed access. Read NetworkManager lib files. Domain allowed access. Read NetworkManager PID files. Domain allowed access. Policy for NIS (YP) servers and clients Use the ypbind service to access NIS services unconditionally.

Use the ypbind service to access NIS services unconditionally.

This interface was added because of apache and spamassassin, to fix a nested conditionals problem. When that support is added, this should be removed, and the regular interface should be used.

Domain allowed access.
Use the ypbind service to access NIS services.

Allow the specified domain to use the ypbind service to access Network Information Service (NIS) services. Information that can be retreived from NIS includes usernames, passwords, home directories, and groups. If the network is configured to have a single sign-on using NIS, it is likely that any program that does authentication will need this access.

Domain allowed access.
Use the nis to authenticate passwords Domain allowed access. Execute ypbind in the ypbind domain. Domain allowed to transition. Execute ypbind in the ypbind domain, and allow the specified role the ypbind domain. Domain allowed to transition. Role allowed access. Send generic signals to ypbind. Domain allowed access. List the contents of the NIS data directory. Domain allowed access. Send UDP network traffic to NIS clients. (Deprecated) Domain allowed access. Connect to ypbind over TCP. (Deprecated) Domain allowed access. Read ypbind pid files. Domain allowed access. Delete ypbind pid files. Domain allowed access. Read ypserv configuration files. Domain allowed access. Execute ypxfr in the ypxfr domain. Domain allowed to transition. Execute nis server in the nis domain. Domain allowed to transition. Execute nis server in the nis domain. Domain allowed to transition. All of the rules required to administrate an nis environment Domain allowed access. Role allowed access.
Name service cache daemon Send generic signals to NSCD. Domain allowed access. Send NSCD the kill signal. Domain allowed access. Send signulls to NSCD. Domain allowed access. Execute NSCD in the nscd domain. Domain allowed to transition. Allow the specified domain to execute nscd in the caller domain. Domain allowed access. Use NSCD services by connecting using a unix stream socket. Domain allowed access. Use NSCD services by mapping the database from an inherited NSCD file descriptor. Domain allowed access. Do not audit attempts to search the NSCD pid directory. Domain to not audit. Read NSCD pid file. Domain allowed access. Unconfined access to NSCD services. Domain allowed access. Execute nscd in the nscd domain, and allow the specified role the nscd domain. Domain allowed to transition. Role allowed access. Execute the nscd server init script. Domain allowed to transition. All of the rules required to administrate an nscd environment Domain allowed access. The role to be allowed to manage the nscd domain. Authoritative only name server Send and receive datagrams from NSD. (Deprecated) Domain allowed access. Connect to NSD over a TCP socket (Deprecated) Domain allowed access. nslcd - local LDAP name service daemon. Execute a domain transition to run nslcd. Domain allowed to transition. Execute nslcd server in the nslcd domain. Domain allowed to transition. Read nslcd PID files. Domain allowed access. Connect to nslcd over an unix stream socket. Domain allowed access. All of the rules required to administrate an nslcd environment Domain allowed access. Role allowed access. Network Top Network time protocol daemon NTP stub interface. No access allowed. Domain allowed access. Execute ntp server in the ntpd domain. Domain allowed to transition. Execute ntp in the ntp domain, and allow the specified role the ntp domain. Domain allowed to transition. Role allowed access. Execute ntp server in the ntpd domain. Domain allowed to transition. Execute ntp server in the ntpd domain. Domain allowed to transition. Read and write ntpd shared memory. Domain allowed access. All of the rules required to administrate an ntp environment Domain allowed access. The role to be allowed to manage the ntp domain. nut - Network UPS Tools NX remote desktop Transition to NX server. Domain allowed to transition. Read nx home directory content Domain allowed access. Read nx /var/lib content Domain allowed access. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. Open AntiVirus scannerdaemon and signature update Execute oav_update in the oav_update domain. Domain allowed to transition. Execute oav_update in the oav_update domain, and allow the specified role the oav_update domain. Domain allowed to transition. Role allowed access. Oddjob provides a mechanism by which unprivileged applications can request that specified privileged operations be performed on their behalf. Execute a domain transition to run oddjob. Domain allowed to transition. Make the specified program domain accessable from the oddjob. The type of the process to transition to. The type of the file used as an entrypoint to this domain. Send and receive messages from oddjob over dbus. Domain allowed access. Execute a domain transition to run oddjob_mkhomedir. Domain allowed to transition. Execute the oddjob_mkhomedir program in the oddjob_mkhomedir domain. Domain allowed to transition. Role allowed access. SELinux policy for Oident daemon.

Oident daemon is a server that implements the TCP/IP standard IDENT user identification protocol as specified in the RFC 1413 document.

Allow the specified domain to read Oidentd personal configuration files. Domain allowed access. Allow the specified domain to create, read, write, and delete Oidentd personal configuration files. Domain allowed access. Allow the specified domain to relabel Oidentd personal configuration files. Domain allowed access.
OpenCA - Open Certificate Authority Execute the OpenCA program with a domain transition. Domain allowed to transition. Send OpenCA generic signals. Domain allowed access. Send OpenCA stop signals. Domain allowed access. Kill OpenCA. Domain allowed access. Service for handling smart card readers. Send openct a null signal. Domain allowed access. Execute openct in the caller domain. Domain allowed access. Execute a domain transition to run openct. Domain allowed to transition. Read openct PID files. Domain allowed access. Connect to openct over an unix stream socket. Domain allowed access. full-featured SSL VPN solution Execute OPENVPN clients in the openvpn domain. Domain allowed to transition. Execute OPENVPN clients in the openvpn domain, and allow the specified role the openvpn domain. Domain allowed to transition. Role allowed access. Send OPENVPN clients the kill signal. Domain allowed access. Send generic signals to OPENVPN clients. Domain allowed access. Send signulls to OPENVPN clients. Domain allowed access. Allow the specified domain to read OpenVPN configuration files. Domain allowed access. All of the rules required to administrate an openvpn environment Domain allowed access. The role to be allowed to manage the openvpn domain.

Allow openvpn to read home directories

Passive Asset Detection System

PADS is a libpcap based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.

All of the rules required to administrate an pads environment Domain allowed access. Role allowed access.
Ruby on rails deployment for Apache and Nginx servers. Execute passenger in the passenger domain. Domain allowed to transition. Read passenger lib files Domain allowed access. PCMCIA card management services PCMCIA stub interface. No access allowed. Domain allowed access. Execute cardmgr in the cardmgr domain. Domain allowed to transition. Inherit and use file descriptors from cardmgr. Domain allowed access. Execute cardctl in the cardmgr domain. Domain allowed to transition. Execute cardmgr in the cardctl domain, and allow the specified role the cardmgr domain. Domain allowed to transition. Role allowed access. Read cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr pid files. Domain allowed access. Create, read, write, and delete cardmgr runtime character nodes. Domain allowed access. PCSC smart card service Execute a domain transition to run pcscd. Domain allowed to transition. Read pcscd pub files. Domain allowed access. Manage pcscd pub files. Domain allowed access. Manage pcscd pub fifo files. Domain allowed access. Connect to pcscd over an unix stream socket. Domain allowed access. The Open Group Pegasus CIM/WBEM Server. Perdition POP and IMAP proxy Connect to perdition over a TCP socket (Deprecated) Domain allowed access. Pingd of the Whatsup cluster node up/down detection utility Execute a domain transition to run pingd. Domain allowed to transition. Read pingd etc configuration files. Domain allowed access. Manage pingd etc configuration files. Domain allowed access. All of the rules required to administrate an pingd environment Domain allowed access. The role to be allowed to manage the pingd domain. Plymouth graphical boot Execute a domain transition to run plymouthd. Domain allowed to transition. Execute the plymoth daemon in the current domain Domain allowed access. Allow domain to Stream socket connect to Plymouth daemon. Domain allowed access. Execute the plymoth command in the current domain Domain allowed access. Execute a domain transition to run plymouthd. Domain allowed to transition. Search plymouthd spool directories. Domain allowed access. Read plymouthd spool files. Domain allowed access. Create, read, write, and delete plymouthd spool files. Domain allowed access. Search plymouthd lib directories. Domain allowed access. Read plymouthd lib files. Domain allowed access. Create, read, write, and delete plymouthd lib files. Domain allowed access. Read plymouthd PID files. Domain allowed access. All of the rules required to administrate an plymouthd environment Domain allowed access. Role allowed access. Podsleuth is a tool to get information about an Apple (TM) iPod (TM) Execute a domain transition to run podsleuth. Domain allowed to transition. Execute podsleuth in the podsleuth domain, and allow the specified role the podsleuth domain. Domain allowed to transition. Role allowed access. Policy framework for controlling privileges for system-wide services. Send and receive messages from policykit over dbus. Domain allowed access. Execute a domain transition to run polkit_auth. Domain allowed to transition. Execute a policy_auth in the policy_auth domain, and allow the specified role the policy_auth domain, Domain allowed to transition. Role allowed access. Execute a domain transition to run polkit_grant. Domain allowed to transition. Execute a policy_grant in the policy_grant domain, and allow the specified role the policy_grant domain, Domain allowed to transition. Role allowed access. read policykit reload files Domain allowed access. rw policykit reload files Domain allowed access. Execute a domain transition to run polkit_resolve. Domain allowed to transition. Search policykit lib directories. Domain allowed access. read policykit lib files Domain allowed access. Portage Package Management System. The primary package management and distribution system for Gentoo. Execute emerge in the portage domain. Domain allowed to transition. Execute emerge in the portage domain, and allow the specified role the portage domain. Domain allowed to transition. The role to allow the portage domain. Template for portage sandbox.

Template for portage sandbox. Portage does all compiling in the sandbox.

Domain Allowed Access
Execute tree management functions (fetching, layman, ...) in the portage_fetch_t domain. Domain allowed to transition. Execute tree management functions (fetching, layman, ...) in the portage_fetch_t domain, and allow the specified role the portage_fetch_t domain. Domain allowed to transition. The role to allow the portage_fetch domain. Execute gcc-config in the gcc_config domain. Domain allowed to transition. Execute gcc-config in the gcc_config domain, and allow the specified role the gcc_config domain. Domain allowed to transition. The role to allow the gcc_config domain. Do not audit attempts to use portage file descriptors. Domain to not audit. Do not audit attempts to search the portage temporary directories. Domain to not audit. Do not audit attempts to read and write the portage temporary files. Domain to not audit.

Allow the portage domains to use NFS mounts (regular nfs_t)

RPC port mapping service. Execute portmap_helper in the helper domain. Domain allowed to transition. Execute portmap helper in the helper domain, and allow the specified role the helper domain. Communicate with portmap. Domain allowed to transition. Role allowed access. Send UDP network traffic to portmap. (Deprecated) Domain allowed access. Send and receive UDP network traffic from portmap. (Deprecated) Domain allowed access. Connect to portmap over a TCP socket (Deprecated) Domain allowed access. Reserve well-known ports in the RPC port range. Execute a domain transition to run portreserve. Domain allowed to transition. Allow the specified domain to read portreserve etcuration files. Domain allowed access. Allow the specified domain to manage portreserve etcuration files. Domain allowed access. Execute portreserve in the portreserve domain. Domain allowed to transition. All of the rules required to administrate an portreserve environment. Domain allowed access. Role allowed access. Portslave terminal server software Execute portslave with a domain transition. Domain allowed to transition. Postfix email server Postfix stub interface. No access allowed. Domain allowed access. Read postfix configuration files. Domain allowed access. Create files with the specified type in the postfix configuration directories. Domain allowed access. The type of the object to be created. The object class of the object being created. Do not audit attempts to read and write postfix local delivery TCP sockets. Domain to not audit. Allow read/write postfix local pipes TCP sockets. Domain allowed access. Allow domain to read postfix local process state Domain allowed access. Allow domain to read postfix master process state Domain allowed access. Do not audit attempts to use postfix master process file file descriptors. Domain to not audit. Execute postfix_map in the postfix_map domain. Domain allowed to transition. Execute postfix_map in the postfix_map domain, and allow the specified role the postfix_map domain. Domain allowed to transition. Role allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Execute the master postfix program in the caller domain. Domain allowed access. Connect to postfix master process using a unix domain stream socket. Domain allowed access. Execute the master postdrop in the postfix_postdrop domain. Domain allowed to transition. Execute the master postqueue in the postfix_postqueue domain. Domain allowed to transition. Execute the master postqueue in the caller domain. Domain allowed access. Create a named socket in a postfix private directory. Domain allowed access. manage named socket in a postfix private directory. Domain allowed access. Execute the master postfix program in the postfix_master domain. Domain allowed to transition. Search postfix mail spool directories. Domain allowed access. List postfix mail spool directories. Domain allowed access. Read postfix mail spool files. Domain allowed access. Create, read, write, and delete postfix mail spool files. Domain allowed access. Execute postfix user mail programs in their respective domains. Domain allowed access. Postfix policy server All of the rules required to administrate an postfixpolicyd environment Domain allowed access. The role to be allowed to manage the postfixpolicyd domain. Postfix grey-listing server Write to postgrey socket Domain allowed access. Search the spool directory Domain allowed access. All of the rules required to administrate an postgrey environment Domain allowed access. The role to be allowed to manage the postgrey domain. Point to Point Protocol daemon creates links in ppp networks Use PPP file discriptors. Domain allowed access. Do not audit attempts to inherit and use PPP file discriptors. Domain to not audit. Send a SIGCHLD signal to PPP. Domain allowed access. Send ppp a kill signal Domain allowed access. Send a generic signal to PPP. Domain allowed access. Send a generic signull to PPP. Domain allowed access. Execute domain in the ppp domain. Domain allowed to transition. Conditionally execute ppp daemon on behalf of a user or staff type. Domain allowed to transition. The role to allow the ppp domain. Unconditionally execute ppp daemon on behalf of a user or staff type. Domain allowed to transition. The role to allow the ppp domain. Execute domain in the ppp caller. Domain allowed access. Read ppp configuration files. Domain allowed access. Read PPP-writable configuration files. Domain allowed access. Read PPP secrets. Domain allowed access. Read PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Create, read, write, and delete PPP pid files. Domain allowed access. Execute ppp server in the ntpd domain. Domain allowed to transition. All of the rules required to administrate an ppp environment Domain allowed access.

Allow pppd to load kernel modules for certain modems

Allow pppd to be run for a regular user

Prelink ELF shared library mappings. Execute the prelink program in the prelink domain. Domain allowed to transition. Execute the prelink program in the current domain. Domain allowed access. Execute the prelink program in the prelink domain. Domain allowed to transition. The role to allow the prelink domain. Make the specified file type prelinkable. File type to be prelinked. Read the prelink cache. Domain allowed access. Delete the prelink cache. Domain allowed access. Create, read, write, and delete prelink log files. Domain allowed access. Create, read, write, and delete prelink var_lib files. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. Prelude hybrid intrusion detection system Execute a domain transition to run prelude. Domain allowed to transition. Execute a domain transition to run prelude_audisp. Domain allowed to transition. Signal the prelude_audisp domain. Domain allowed acccess. Read the prelude spool files Domain allowed access. Manage to prelude-manager spool files. Domain allowed access. All of the rules required to administrate an prelude environment Domain allowed access. Role allowed access. Privacy enhancing web proxy. All of the rules required to administrate an privoxy environment Domain allowed access. Role allowed access.

Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports.

Procmail mail delivery agent Execute procmail with a domain transition. Domain allowed to transition. Execute procmail in the caller domain. Domain allowed access. Read procmail tmp files. Domain allowed access. Read/write procmail tmp files. Domain allowed access. Intrusion Detection and Log Analysis with iptables Execute a domain transition to run psad. Domain allowed to transition. Send a generic signal to psad Domain allowed access. Send a null signal to psad. Domain allowed access. Read psad etc configuration files. Domain allowed access. Manage psad etc configuration files. Domain allowed access. Read psad PID files. Domain allowed access. Read psad PID files. Domain allowed access. Allow the specified domain to read psad's log files. Domain allowed access. Allow the specified domain to append to psad's log files. Domain allowed access. Read and write psad fifo files. Domain allowed access. Read and write psad tmp files. Domain allowed access. All of the rules required to administrate an psad environment Domain allowed access. The role to be allowed to manage the syslog domain. helper function for grantpt(3), changes ownship and permissions of pseudotty Execute a domain transition to run ptchown. Domain allowed to transition. Execute ptchown in the ptchown domain, and allow the specified role the ptchown domain. Domain allowed to transition. Role allowed access. publicfile supplies files to the public through HTTP and FTP Pulseaudio network sound server. Role access for pulseaudio Role allowed access User domain for the role Execute a domain transition to run pulseaudio. Domain allowed to transition. Execute pulseaudio in the pulseaudio domain, and allow the specified role the pulseaudio domain. Domain allowed to transition. Role allowed access. Execute a pulseaudio in the current domain. Domain allowed access. Do not audit to execute a pulseaudio. Domain to not audit. Send signull signal to pulseaudio processes. Domain allowed access. Connect to pulseaudio over a unix domain stream socket. Domain allowed access. Send and receive messages from pulseaudio over dbus. Domain allowed access. Set the attributes of the pulseaudio homedir. Domain allowed access. Read pulseaudio homedir files. Domain allowed access. Read and write Pulse Audio files. Domain allowed access. Create, read, write, and delete pulseaudio home directory files. Domain allowed access. Puppet client daemon

Puppet is a configuration management system written in Ruby. The client daemon is responsible for periodically requesting the desired system state from the server and ensuring the state of the client system matches.

Read / Write to Puppet temp files. Puppet uses some system binaries (groupadd, etc) that run in a non-puppet domain and redirects output into temp files. Domain allowed access.

Allow Puppet client to manage all file types.

Server for the PXE network boot protocol PyICQt is an ICQ transport for XMPP server. Pyzor is a distributed, collaborative spam detection and filtering network. Role access for pyzor Role allowed access User domain for the role Send generic signals to pyzor Domain allowed access. Execute pyzor with a domain transition. Domain allowed to transition. Execute pyzor in the caller domain. Domain allowed access. QEMU machine emulator and virtualizer Execute a domain transition to run qemu. Domain allowed to transition. Execute qemu in the qemu domain. Domain allowed to transition. The role to allow the qemu domain. Allow the domain to read state files in /proc. Domain to allow access. Set the schedule on qemu. Domain allowed access. Send a signal to qemu. Domain allowed access. Send a sigill to qemu Domain allowed access. Execute a domain transition to run qemu unconfined. Domain allowed to transition. Manage qemu temporary dirs. Domain allowed access. Manage qemu temporary files. Domain allowed access.

Allow qemu to connect fully to the network

Allow qemu to use cifs/Samba file systems

Allow qemu to use serial/parallel communication ports

Allow qemu to use nfs file systems

Allow qemu to use usb devices

Qmail Mail Server Transition to qmail_inject_t Domain allowed to transition. Transition to qmail_queue_t Domain allowed to transition. Read qmail configuration files. Domain allowed access. Define the specified domain as a qmail-smtp service. Needed by antivirus/antispam filters. Domain allowed access The type associated with the process program. Apache QPID AMQP messaging server. Execute a domain transition to run qpidd. Domain allowed to transition. Allow read and write access to qpidd semaphores. Domain allowed access. Read and write to qpidd shared memory. Domain allowed access. Execute qpidd server in the qpidd domain. Domain allowed access. Read qpidd PID files. Domain allowed access. Search qpidd lib directories. Domain allowed access. Read qpidd lib files. Domain allowed access. Create, read, write, and delete qpidd lib files. Domain allowed access. All of the rules required to administrate an qpidd environment Domain allowed access. Role allowed access. File system quota management Execute quota management tools in the quota domain. Domain allowed to transition. Execute quota management tools in the quota domain, and allow the specified role the quota domain. Domain allowed to transition. Role allowed access. Do not audit attempts to get the attributes of filesystem quota data files. Domain to not audit. Create, read, write, and delete quota flag files. Domain allowed access. RADIUS authentication and accounting server. Use radius over a UDP connection. (Deprecated) Domain allowed access. All of the rules required to administrate an radius environment Domain allowed access. Role allowed access. IPv6 router advertisement daemon All of the rules required to administrate an radvd environment Domain allowed access. Role allowed access. RAID array management tools Execute software raid tools in the mdadm domain. Domain allowed to transition. Execute a domain transition to mdadm_t for the specified role, allowing it to use the mdadm_t domain Role allowed to access mdadm_t domain Domain allowed to transition to mdadm_t Create, read, write, and delete the mdadm pid files.

Create, read, write, and delete the mdadm pid files.

Added for use in the init module.

Domain allowed access.
A distributed, collaborative, spam detection and filtering network.

A distributed, collaborative, spam detection and filtering network.

This policy will work with either the ATrpms provided config file in /etc/razor, or with the default of dumping everything into $HOME/.razor.

Role access for razor Role allowed access User domain for the role Execute razor in the system razor domain. Domain allowed to transition.
Network router discovery daemon Execute rdisc in the caller domain. Domain allowed access. Readahead, read files into page cache for improved performance Policy for rshd, rlogind, and telnetd. Domain transition to the remote login domain. Domain allowed to transition. allow Domain to signal remote login domain. Domain allowed access. Resource management daemon Connect to resmgrd over a unix domain stream socket. Domain allowed access. rgmanager - Resource Group Manager Execute a domain transition to run rgmanager. Domain allowed to transition. Connect to rgmanager over an unix stream socket. Domain allowed access. Allow manage rgmanager tmp files. Domain allowed access. Allow manage rgmanager tmpfs files. Domain allowed access.

Allow rgmanager domain to connect to the network using TCP.

RHCS - Red Hat Cluster Suite Execute a domain transition to run dlm_controld. Domain allowed to transition. Connect to dlm_controld over a unix domain stream socket. Domain allowed access. Allow read and write access to dlm_controld semaphores. Domain allowed access. Execute a domain transition to run fenced. Domain allowed to transition. Allow read and write access to fenced semaphores. Domain allowed access. Connect to fenced over an unix domain stream socket. Domain allowed access. Execute a domain transition to run gfs_controld. Domain allowed to transition. Allow read and write access to gfs_controld semaphores. Domain allowed access. Read and write to gfs_controld_t shared memory. Domain allowed access. Connect to gfs_controld_t over an unix domain stream socket. Domain allowed access. Execute a domain transition to run groupd. Domain allowed to transition. Connect to groupd over a unix domain stream socket. Domain allowed access. Allow read and write access to groupd semaphores. Domain allowed access. Read and write to group shared memory. Domain allowed access. Execute a domain transition to run qdiskd. Domain allowed to transition.

Allow fenced domain to connect to the network using TCP.

Red Hat Graphical Boot RHGB stub interface. No access allowed. N/A Use a rhgb file descriptor. Domain allowed access. Get the process group of rhgb. Domain allowed access. Send a signal to rhgb. Domain allowed access. Read and write to unix stream sockets. Domain allowed access. Do not audit attempts to read and write rhgb unix domain stream sockets. Domain to not audit. Connected to rhgb unix stream socket. Domain allowed access. Read and write to rhgb shared memory. Domain allowed access. Read from and write to the rhgb devpts. Domain allowed access. dontaudit Read from and write to the rhgb devpts. Domain to not audit. Read and write to rhgb temporary file system. Domain allowed access. Subscription Management Certificate Daemon policy Transition to rhsmcertd. Domain allowed to transition. Execute rhsmcertd server in the rhsmcertd domain. Domain allowed access. Read rhsmcertd's log files. Domain allowed access. Append to rhsmcertd log files. Domain allowed access. Manage rhsmcertd log files Domain allowed access. Search rhsmcertd lib directories. Domain allowed access. Read rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib files. Domain allowed access. Manage rhsmcertd lib directories. Domain allowed access. Read rhsmcertd PID files. Domain allowed access. Connect to rhsmcertd over a unix domain stream socket. Domain allowed access. Send and receive messages from rhsmcertd over dbus. Domain allowed access. Dontaudit Send and receive messages from rhsmcertd over dbus. Domain allowed access. All of the rules required to administrate an rhsmcertd environment Domain allowed access. Role allowed access. Ricci cluster management agent Execute a domain transition to run ricci. Domain allowed to transition. Execute a domain transition to run ricci_modcluster. Domain allowed to transition. Do not audit attempts to use ricci_modcluster file descriptors. Domain to not audit. Do not audit attempts to read write ricci_modcluster unamed pipes. Domain to not audit. Connect to ricci_modclusterd over an unix stream socket. Domain allowed access. Execute a domain transition to run ricci_modlog. Domain allowed to transition. Execute a domain transition to run ricci_modrpm. Domain allowed to transition. Execute a domain transition to run ricci_modservice. Domain allowed to transition. Execute a domain transition to run ricci_modstorage. Domain allowed to transition. Remote login daemon Execute rlogind in the rlogin domain. Domain allowed to transition. Roundup Issue Tracking System policy All of the rules required to administrate an roundup environment Domain allowed access. The role to be allowed to manage the roundup domain. Remote Procedure Call Daemon for managment of network based process communication RPC stub interface. No access allowed. Domain allowed access. Send UDP network traffic to rpc and recieve UDP traffic from rpc. (Deprecated) Domain allowed access. Do not audit attempts to get the attributes of the NFS export file. Domain to not audit. Allow read access to exports. Domain allowed access. Allow write access to exports. Domain allowed access. Execute domain in nfsd domain. Domain allowed to transition. Execute domain in nfsd domain. Domain allowed to transition. Execute domain in rpcd domain. Domain allowed to transition. Execute domain in rpcd domain. Domain allowed to transition. Read NFS exported content. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to create read and write NFS directories. Domain allowed access. Allow domain to read and write to an NFS TCP socket. Domain allowed access. Allow domain to read and write to an NFS UDP socket. Domain allowed access. Send UDP traffic to NFSd. (Deprecated) Domain allowed access. Search NFS state data in /var/lib/nfs. Domain allowed access. Read NFS state data in /var/lib/nfs. Domain allowed access. Manage NFS state data in /var/lib/nfs. Domain allowed access.

Allow gssd to read temp directory. For access to kerberos tgt.

Allow nfs servers to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Universal Addresses to RPC Program Number Mapper Execute a domain transition to run rpcbind. Domain allowed to transition. Connect to rpcbindd over an unix stream socket. Domain allowed access. Read rpcbind PID files. Domain allowed access. Search rpcbind lib directories. Domain allowed access. Read rpcbind lib files. Domain allowed access. Create, read, write, and delete rpcbind lib files. Domain allowed access. All of the rules required to administrate an rpcbind environment Domain allowed access. The role to be allowed to manage the rpcbind domain. Policy for the RPM package manager. Execute rpm programs in the rpm domain. Domain allowed to transition. Execute debuginfo_install programs in the rpm domain. Domain allowed to transition. Execute rpm_script programs in the rpm_script domain. Domain allowed to transition. Execute RPM programs in the RPM domain. Domain allowed to transition. The role to allow the RPM domain. Execute the rpm client in the caller domain. Domain allowed access. Send a null signal to rpm. Domain allowed access. Inherit and use file descriptors from RPM. Domain allowed access. Read from an unnamed RPM pipe. Domain allowed access. Read and write an unnamed RPM pipe. Domain allowed access. Send and receive messages from rpm over dbus. Domain allowed access. Do not audit attempts to send and receive messages from rpm over dbus. Domain to not audit. Send and receive messages from rpm_script over dbus. Domain allowed access. Search RPM log directory. Domain allowed access. Allow the specified domain to append to rpm log files. Domain allowed access. Create, read, write, and delete the RPM log. Domain allowed access. Inherit and use file descriptors from RPM scripts. Domain allowed access. Create, read, write, and delete RPM script temporary files. Domain allowed access. Allow the specified domain to append to rpm tmp files. Domain allowed access. Create, read, write, and delete RPM temporary files. Domain allowed access. Read RPM script temporary files. Domain allowed access. Read the RPM cache. Domain allowed access. Create, read, write, and delete the RPM package database. Domain allowed access. Read the RPM package database. Domain allowed access. Delete the RPM package database. Domain allowed access. Create, read, write, and delete the RPM package database. Domain allowed access. Do not audit attempts to create, read, write, and delete the RPM package database. Domain to not audit. Read rpm pid files. Domain allowed access. Create, read, write, and delete rpm pid files. Domain allowed access. Create files in /var/run with the rpm pid file type. Domain allowed access. Remote shell service. Domain transition to rshd. Domain allowed to transition. Restricted (scp/sftp) only shell Role access for rssh Role allowed access User domain for the role Transition to all user rssh domains. Domain allowed to transition. Execute the rssh program in the caller domain. Domain allowed access. Execute a domain transition to run rssh_chroot_helper. Domain allowed access. Read all users rssh read-only content. Domain allowed access. Fast incremental file transfer for synchronization Make rsync an entry point for the specified domain. The domain for which init scripts are an entrypoint. Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. Domain to transition to.
Execute a rsync in a specified domain.

Execute a rsync in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. Domain to transition to.
Execute rsync in the caller domain domain. Domain allowed access. Read rsync config files. Domain allowed access. Write to rsync config files. Domain allowed access.

Allow rsync to export any files/directories read only.

Allow rsync to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Realtime scheduling for user processes. Execute a domain transition to run rtkit_daemon. Domain allowed to transition. Send and receive messages from rtkit_daemon over dbus. Domain allowed access. Allow rtkit to control scheduling for your process Domain allowed access. Who is logged in on other machines? Execute a domain transition to run rwho. Domain allowed to transition. Search rwho log directories. Domain allowed access. Read rwho log files. Domain allowed access. Search rwho spool directories. Domain allowed access. Read rwho spool files. Domain allowed access. Create, read, write, and delete rwho spool files. Domain allowed access. All of the rules required to administrate an rwho environment Domain allowed access. The role allowed access. SMB and CIFS client/server programs for UNIX and name Service Switch daemon for resolving names from Windows NT servers. Execute nmbd net in the nmbd_t domain. Domain allowed to transition. Allow domain to signal samba Domain allowed access. Execute samba server in the samba domain. Domain allowed to transition. Execute samba net in the samba_net domain. Domain allowed to transition. Execute samba net in the samba_net domain, and allow the specified role the samba_net domain. Domain allowed to transition. Role allowed access. Execute smbmount in the smbmount domain. Domain allowed to transition. Execute smbmount interactively and do a domain transition to the smbmount domain. Domain allowed to transition. Role allowed access. Allow the specified domain to read samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read and write samba configuration files. Domain allowed access. Allow the specified domain to read samba's log files. Domain allowed access. Allow the specified domain to append to samba's log files. Domain allowed access. Execute samba log in the caller domain. Domain allowed access. Allow the specified domain to read samba's secrets. Domain allowed access. Allow the specified domain to read samba's shares Domain allowed access. Allow the specified domain to search samba /var directories. Domain allowed access. Allow the specified domain to read samba /var files. Domain allowed access. Do not audit attempts to write samba /var files. Domain to not audit. Allow the specified domain to read and write samba /var files. Domain allowed access. Allow the specified domain to read and write samba /var files. Domain allowed access. Execute a domain transition to run smbcontrol. Domain allowed to transition. Execute smbcontrol in the smbcontrol domain, and allow the specified role the smbcontrol domain. Domain allowed to transition. Role allowed access. Execute smbd in the smbd_t domain. Domain allowed to transition. Allow domain to signal samba Domain allowed access. Do not audit attempts to use file descriptors from samba. Domain to not audit. Allow the specified domain to write to smbmount tcp sockets. Domain allowed access. Allow the specified domain to read and write to smbmount tcp sockets. Domain allowed access. Execute winbind_helper in the winbind_helper domain. Domain allowed to transition. Execute winbind_helper in the winbind_helper domain, and allow the specified role the winbind_helper domain. Domain allowed to transition. Role allowed access. Allow the specified domain to read the winbind pid files. Domain allowed access. Connect to winbind. Domain allowed access. All of the rules required to administrate an samba environment Domain allowed access. The role to be allowed to manage the samba domain.

Allow samba to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Allow samba to create new home directories (e.g. via PAM)

Allow samba to act as the domain controller, add users, groups and change passwords.

Allow samba to share users home directories.

Allow samba to share any file/directory read only.

Allow samba to share any file/directory read/write.

Allow samba to run unconfined scripts

Allow samba to export NFS volumes.

Allow samba to export ntfs/fusefs volumes.

system-config-samba dbus service policy Samhain - check file integrity Execute samhain in the samhain domain Domain allowed to transition. Execute samhain in the samhain domain with the clearance security level and allow the specifiled role the samhain domain.

Execute samhain in the samhain domain with the clearance security level and allow the specifiled role the samhain domain.

The range_transition rule used in this interface requires that the calling domain should have the clearance security level otherwise the MLS constraint for process transition would fail.

Domain allowed to transition. Role allowed to access.
Manage samhain configuration files. Domain allowed access. Manage samhain database files. Domain allowed access. Manage samhain init script files Domain allowed access. Manage samhain log and log.lock files. Domain allowed access. Manage samhain pid files. Domain allowed access. All of the rules required to administrate the samhain environment.

This interface assumes that the calling domain has been able to remove an entry from /var/lib/ or /var/log/ and belongs to the mlsfilewrite attribute, since samhain files may be of clearance security level while their parent directories are of s0.

Domain allowed access.
policy for sanlock Execute a domain transition to run sanlock. Domain allowed access. Execute sanlock server in the sanlock domain. The type of the process performing this action. Create, read, write, and delete sanlock PID files. Domain allowed access. Connect to sanlock over an unix stream socket. Domain allowed access. All of the rules required to administrate an sanlock environment Domain allowed access. Role allowed access.

Allow confined virtual guests to manage nfs files

Allow confined virtual guests to manage cifs files

SASL authentication server Connect to SASL. Domain allowed access. All of the rules required to administrate an sasl environment Domain allowed access. Role allowed access.

Allow sasl to read shadow

policy for SBLIM Gatherer Transition to gatherd. Domain allowed to transition. Read gatherd PID files. Domain allowed access. All of the rules required to administrate an gatherd environment Domain allowed access. Role allowed access. GNU terminal multiplexer Sectool security audit tool Policy for sendmail. Sendmail stub interface. No access allowed. Domain allowed access. Allow attempts to read and write to sendmail unnamed pipes. Domain allowed access. Domain transition to sendmail. Domain allowed to transition. Execute the sendmail program in the sendmail domain. Domain allowed to transition. The role to allow the sendmail domain. Send generic signals to sendmail. Domain allowed access. Read and write sendmail TCP sockets. Domain allowed access. Do not audit attempts to read and write sendmail TCP sockets. Domain to not audit. Read and write sendmail unix_stream_sockets. Domain allowed access. Do not audit attempts to read and write sendmail unix_stream_sockets. Domain to not audit. Read sendmail logs. Domain allowed access. Create, read, write, and delete sendmail logs. Domain allowed access. Create sendmail logs with the correct type. Domain allowed access. Manage sendmail tmp files. Domain allowed access. Execute sendmail in the unconfined sendmail domain. Domain allowed to transition. Execute sendmail in the unconfined sendmail domain, and allow the specified role the unconfined sendmail domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. SELinux troubleshooting service Connect to setroubleshootd over an unix stream socket. Domain allowed access. Dontaudit attempts to connect to setroubleshootd over an unix stream socket. Domain to not audit. Send and receive messages from setroubleshoot over dbus. Domain allowed access. Do not audit send and receive messages from setroubleshoot over dbus. Domain to not audit. Send and receive messages from setroubleshoot fixit over dbus. Domain allowed access. All of the rules required to administrate an setroubleshoot environment Domain allowed access. Shoreline Firewall high-level tool for configuring netfilter Execute a domain transition to run shorewall. Domain allowed to transition. Execute a domain transition to run shorewall. Domain allowed to transition. Read shorewall etc configuration files. Domain allowed access. Read shorewall PID files. Domain allowed access. Read and write shorewall PID files. Domain allowed access. Read shorewall /var/lib files. Domain allowed access. Read and write shorewall /var/lib files. Domain allowed access. Read shorewall tmp files. Domain allowed access. All of the rules required to administrate an shorewall environment Domain allowed access. The role to be allowed to manage the syslog domain. System shutdown command Execute a domain transition to run shutdown. Domain allowed to transition. Execute shutdown in the shutdown domain, and allow the specified role the shutdown domain. Domain allowed to transition. Role allowed access. Get attributes of shutdown executable. Domain allowed access. Update database for mlocate Create the locate log with append mode. Domain allowed access. Read locate lib files. Domain allowed access. Service for downloading news feeds the slrn newsreader. Allow the domain to search slrnpull spools. Domain allowed access. Allow the domain to create, read, write, and delete slrnpull spools. Domain allowed access. Smart disk monitoring daemon policy Allow caller to read smartmon temporary files. Domain allowed access. All of the rules required to administrate an smartmon environment Domain allowed access. Role allowed access.

Enable additional permissions needed to support devices on 3ware controllers.

Smokeping network latency measurement. Execute a domain transition to run smokeping. Domain allowed to transition. Execute smokeping server in the smokeping domain. Domain allowed to transition. Read smokeping PID files. Domain allowed access. Manage smokeping PID files. Domain allowed access. Get attributes of smokeping lib files. Domain allowed access. Read smokeping lib files. Domain allowed access. Manage smokeping lib files. Domain allowed access. All of the rules required to administrate a smokeping environment Domain allowed access. Role allowed access. The Fedora hardware profiler client Simple network management protocol services Connect to snmpd using a unix domain stream socket. Domain allowed access. Use snmp over a TCP connection. (Deprecated) Domain allowed access. Send and receive UDP traffic to SNMP (Deprecated) Domain allowed access. Read snmpd libraries. Domain allowed access. dontaudit Read snmpd libraries. Domain to not audit. dontaudit write snmpd libraries files. Domain to not audit. All of the rules required to administrate an snmp environment Domain allowed access. The role to be allowed to manage the snmp domain. Snort network intrusion detection system Execute a domain transition to run snort. Domain allowed to transition. All of the rules required to administrate an snort environment Domain allowed access. The role to be allowed to manage the snort domain. sosreport - Generate debugging information for system Execute a domain transition to run sosreport. Domain allowed to transition. Execute sosreport in the sosreport domain, and allow the specified role the sosreport domain. Domain allowed access. Role allowed access. Role access for sosreport Role allowed access User domain for the role Allow the specified domain to read sosreport tmp files. Domain allowed access. Append sosreport tmp files. Domain allowed access. Delete sosreport tmp files. Domain allowed access. sound server for network audio server programs, nasd, yiff, etc Connect to the sound server over a TCP socket (Deprecated) Domain allowed access. All of the rules required to administrate an soundd environment Domain allowed access. The role to be allowed to manage the soundd domain. Filter used for removing unsolicited email. Role access for spamassassin Role allowed access User domain for the role Execute the standalone spamassassin program in the caller directory. Domain allowed access. Singnal the spam assassin daemon Domain allowed access. Execute the spamassassin daemon program in the caller directory. Domain allowed access. Execute spamassassin client in the spamassassin client domain. Domain allowed to transition. Execute the spamassassin client program in the caller directory. Domain allowed access. Execute spamassassin standalone client in the user spamassassin domain. Domain allowed to transition. read spamd lib files. Domain allowed access. Create, read, write, and delete spamd lib files. Domain allowed access. Read temporary spamd file. Domain allowed access. Do not audit attempts to get attributes of temporary spamd sockets/ Domain to not audit.

Allow user spamassassin clients to use the network.

Allow spamd to read/write user home directories.

Alcatel speedtouch USB ADSL modem Squid caching http proxy server Execute squid in the squid domain. Domain allowed to transition. Execute squid Domain allowed access. Send generic signals to squid. Domain allowed access. Allow read and write squid unix domain stream sockets. Domain allowed access. Do not audit attempts to search squid cache dirs Domain to not audit. Read squid configuration file. Domain allowed access. Append squid logs. Domain allowed access. Append squid logs. Domain allowed access. Create, read, write, and delete squid logs. Domain allowed access. Use squid services by connecting over TCP. (Deprecated) Domain allowed access. All of the rules required to administrate an squid environment Domain allowed access. The role to be allowed to manage the squid domain.

Allow squid to connect to all ports, not just HTTP, FTP, and Gopher ports.

Allow squid to run as a transparent proxy (TPROXY)

System Security Services Daemon Execute a domain transition to run sssd. Domain allowed to transition. Execute sssd server in the sssd domain. Domain allowed to transition. Read sssd public files. Domain allowed access. Read sssd PID files. Domain allowed access. Manage sssd var_run files. Domain allowed access. Search sssd lib directories. Domain allowed access. Do not audit attempts to search sssd lib directories. Domain to not audit. Read sssd lib files. Domain allowed access. Create, read, write, and delete sssd lib files. Domain allowed access. Send and receive messages from sssd over dbus. Domain allowed access. Connect to sssd over an unix stream socket. Domain allowed access. All of the rules required to administrate an sssd environment Domain allowed access. The role to be allowed to manage the sssd domain. The type of the user terminal. SSL Tunneling Proxy Define the specified domain as a stunnel inetd service. The type associated with the stunnel inetd service process. The type associated with the process program. SUID/SGID program monitoring Allow the specified domain to read sxid log files. Domain allowed access. Policy for sysstat. Reports on various system states Manage sysstat logs. Domain allowed access. Policy for TCP daemon. Execute tcpd in the tcpd domain. Domain allowed to transition. Create a domain for services that utilize tcp wrappers. Type to be used as a domain. Type of the program to be used as an entry point to this domain. TSS Core Services (TCS) daemon (tcsd) policy Execute a domain transition to run tcsd. Domain allowed access. Execute tcsd server in the tcsd domain. The type of the process performing this action. Search tcsd lib directories. Domain allowed access. Manage tcsd lib dirs files. Domain allowed access. Read tcsd lib files. Domain allowed access. Create, read, write, and delete tcsd lib files. Domain allowed access. All of the rules required to administrate an tcsd environment Domain allowed access. Role allowed access. Telepathy communications framework. Stream connect to Telepathy Gabble Domain allowed access. Send DBus messages to and from Telepathy Gabble. Domain allowed access. Read telepathy mission control state. Prefix to be used. Domain allowed access. Stream connect to telepathy MSN managers Domain allowed access. Stream connect to Telepathy Salut Domain allowed access.

Allow the Telepathy connection managers to connect to any generic TCP port.

Allow the Telepathy connection managers to connect to any network port.

Telnet daemon Trivial file transfer protocol daemon Read tftp content Domain allowed access. Manage tftp /var/lib files. Domain allowed access. All of the rules required to administrate an tftp environment Domain allowed access.

Allow tftp to modify public files used for public file transfer services.

Linux Target Framework Daemon.

Linux target framework (tgt) aims to simplify various SCSI target driver (iSCSI, Fibre Channel, SRP, etc) creation and maintenance. Our key goals are the clean integration into the scsi-mid layer and implementing a great portion of tgt in user space.

Allow read and write access to tgtd semaphores. Domain allowed access. Manage tgtd sempaphores. Domain allowed access.
Thunderbird email client Role access for thunderbird Role allowed access User domain for the role Run thunderbird in the user thunderbird domain. Domain allowed to transition. MIDI to WAV converter and player configured as a service Manage temporary directory sizes and file ages Execute tmpreaper in the caller domain. Domain allowed access. TOR, the onion router Execute a domain transition to run TOR. Domain allowed to transition. All of the rules required to administrate an tor environment Domain allowed access. The role to be allowed to manage the tor domain.

Allow tor daemon to bind tcp sockets to all unreserved ports.

HTTP transperant proxy Tripwire file integrity checker.

Tripwire file integrity checker.

NOTE: Tripwire creates temp file in its current working directory. This policy does not allow write access to home directories, so users will need to either cd to a directory where they have write permission, or set the TEMPDIRECTORY variable in the tripwire config file. The latter is preferable, as then the file_type_auto_trans rules will kick in and label the files as private to tripwire.

Execute tripwire in the tripwire domain. Domain allowed to transition. Execute tripwire in the tripwire domain, and allow the specified role the tripwire domain. Domain allowed to transition. Role allowed access. Execute twadmin in the twadmin domain. Domain allowed to transition. Execute twadmin in the twadmin domain, and allow the specified role the twadmin domain. Domain allowed to transition. Role allowed access. Execute twprint in the twprint domain. Domain allowed to transition. Execute twprint in the twprint domain, and allow the specified role the twprint domain. Domain allowed to transition. Role allowed access. Execute siggen in the siggen domain. Domain allowed to transition. Execute siggen in the siggen domain, and allow the specified role the siggen domain. Domain allowed to transition. Role allowed access.
Dynamic adaptive system tuning daemon Execute a domain transition to run tuned. Domain allowed to transition. Execute tuned in the caller domain. Domain allowed access. Read tuned PID files. Domain allowed access. Manage tuned PID files. Domain allowed access. Execute tuned server in the tuned domain. Domain allowed access. All of the rules required to administrate an tuned environment Domain allowed access. Role allowed access. tvtime - a high quality television application Role access for tvtime Role allowed access User domain for the role Time zone updater Execute a domain transition to run tzdata. Domain allowed to transition. Execute the tzdata program in the tzdata domain. Domain allowed to transition. The role to allow the tzdata domain. ucspitcp policy

Policy for DJB's ucspi-tcpd

Define a specified domain as a ucspitcp service. Domain allowed access. The type associated with the process program.
Iptables/netfilter userspace logging daemon. Execute a domain transition to run ulogd. Domain allowed to transition. Allow the specified domain to read ulogd configuration files. Domain allowed access. Allow the specified domain to read ulogd's log files. Domain allowed access. Allow the specified domain to search ulogd's log files. Domain allowed access. Allow the specified domain to append to ulogd's log files. Domain allowed access. All of the rules required to administrate an ulogd environment Domain allowed access. The role to be allowed to manage the syslog domain. Policy for UML Role access for uml Role allowed access User domain for the role Set attributes on uml utility socket files. Domain allowed access. Manage uml utility files. Domain allowed access. Red Hat utility to change /etc/fstab. Execute updfstab in the updfstab domain. Domain allowed to transition. Uptime daemon List kernel modules of USB devices Execute usbmodules in the usbmodules domain. Domain allowed to transition. Execute usbmodules in the usbmodules domain, and allow the specified role the usbmodules domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. USB multiplexing daemon for communicating with Apple iPod Touch and iPhone Execute a domain transition to run usbmuxd. Domain allowed to transition. Connect to usbmuxd over a unix domain stream socket. Domain allowed access. SELinux utility to run a shell with a new role Search the userhelper configuration directory. Domain allowed access. Do not audit attempts to search the userhelper configuration directory. Domain to not audit. Allow domain to use userhelper file descriptor. Domain allowed access. Allow domain to send sigchld to userhelper. Domain allowed access. Execute the userhelper program in the caller domain. Domain allowed access. User network interface configuration helper Execute usernetctl in the usernetctl domain. Domain allowed to transition. Execute usernetctl in the usernetctl domain, and allow the specified role the usernetctl domain. Domain allowed to transition. Role allowed access. Unix to Unix Copy Execute the uucico program in the uucpd_t domain. Domain allowed to transition. Allow the specified domain to append to uucp log files. Domain allowed access. Create, read, write, and delete uucp spool files. Domain allowed access. Execute the master uux program in the uux_t domain. Domain allowed to transition. All of the rules required to administrate an uucp environment Domain allowed access. policy for uuidd Transition to uuidd. Domain allowed to transition. Execute uuidd server in the uuidd domain. Domain allowed access. Search uuidd lib directories. Domain allowed access. Read uuidd lib files. Domain allowed access. Manage uuidd lib files. Domain allowed access. Manage uuidd lib directories. Domain allowed access. Read uuidd PID files. Domain allowed access. Connect to uuidd over an unix stream socket. Domain allowed access. All of the rules required to administrate an uuidd environment Domain allowed access. Role allowed access. University of Washington IMAP toolkit POP3 and IMAP mail server Execute the UW IMAP/POP3 servers with a domain transition. Domain allowed to transition. Varnishd http accelerator daemon Execute varnishd in the varnishd domain. Domain allowed to transition. Execute varnishd Domain allowed access. Read varnishd configuration file. Domain allowed access. Read varnish lib files. Domain allowed access. Read varnish logs. Domain allowed access. Append varnish logs. Domain allowed access. Manage varnish logs. Domain allowed access. All of the rules required to administrate an varnishlog environment Domain allowed access. The role to be allowed to manage the varnishlog domain. All of the rules required to administrate an varnishd environment Domain allowed access. The role to be allowed to manage the varnishd domain.

Allow varnishd to connect to all ports, not just HTTP.

run real-mode video BIOS code to alter hardware state Execute vbetool application in the vbetool domain. Domain allowed to transition. Execute vbetool in the vbetool domain, and allow the specified role the vbetool domain. Domain allowed to transition. Role allowed access.

Ignore vbetool mmap_zero errors.

policy for vdagent Execute a domain transition to run vdagent. Domain allowed access. Getattr on vdagent executable. Domain allowed access. Get the attributes of vdagent logs. Domain allowed access. Read vdagent PID files. Domain allowed access. Connect to vdagent over a unix domain stream socket. Domain allowed access. All of the rules required to administrate an vdagent environment Domain allowed access. Role allowed access. Virtual host metrics daemon Execute a domain transition to run vhostmd. Domain allowed to transition. Execute vhostmd server in the vhostmd domain. Domain allowed to transition. Allow domain to read, vhostmd tmpfs files Domain allowed access. Do not audit attempts to read, vhostmd tmpfs files Domain to not audit. Allow domain to read and write vhostmd tmpfs files Domain allowed access. Create, read, write, and delete vhostmd tmpfs files. Domain allowed access. Read vhostmd PID files. Domain allowed access. Manage vhostmd var_run files. Domain allowed access. Connect to vhostmd over an unix domain stream socket. Domain allowed access. Dontaudit read and write to vhostmd over an unix domain stream socket. Domain to not audit. All of the rules required to administrate an vhostmd environment Domain allowed access. Role allowed access. Libvirt virtualization API Make the specified type usable as a virt image Type to be used as a virtual image Execute a domain transition to run virt. Domain allowed to transition. Connect to virt over an unix domain stream socket. Domain allowed access. Allow domain to attach to virt TUN devices Domain allowed access. Read virt config files. Domain allowed access. manage virt config files. Domain allowed access. Allow domain to manage virt image files Domain allowed access. Read virt PID files. Domain allowed access. Manage virt pid files. Domain allowed access. Search virt lib directories. Domain allowed access. Read virt lib files. Domain allowed access. Create, read, write, and delete virt lib files. Domain allowed access. Allow the specified domain to read virt's log files. Domain allowed access. Allow the specified domain to append virt log files. Domain allowed access. Allow domain to manage virt log files Domain allowed access. Allow domain to read virt image files Domain allowed access. Create, read, write, and delete svirt cache files. Domain allowed access. Allow domain to manage virt image files Domain allowed access. All of the rules required to administrate an virt environment Domain allowed access. Role allowed access.

Allow virt to use serial/parallell communication ports

Allow virt to read fuse files

Allow virt to manage nfs files

Allow virt to manage cifs files

Allow virt to manage device configuration, (pci)

Allow virt to use usb devices

Lock one or more sessions on the Linux console. Execute vlock in the vlock domain. Domain allowed to transition. Execute vlock in the vlock domain, and allow the specified role the vlock domain. Domain allowed to transition. Role allowed to access. VMWare Workstation virtual machines Role access for vmware Role allowed access User domain for the role Execute vmware host executables Domain allowed access. Read VMWare system configuration files. Domain allowed access. Append to VMWare system configuration files. Domain allowed access. Append to VMWare log files. Domain allowed access. Console network traffic monitor. Execute a domain transition to run vnstat. Domain allowed to transition. Execute a domain transition to run vnstatd. Domain allowed to transition. Search vnstatd lib directories. Domain allowed access. Manage vnstatd lib dirs. Domain allowed access. Read vnstatd lib files. Domain allowed access. Create, read, write, and delete vnstatd lib files. Domain allowed access. All of the rules required to administrate an vnstatd environment Domain allowed access. Role allowed access. Virtual Private Networking client Execute VPN clients in the vpnc domain. Domain allowed to transition. Execute VPN clients in the vpnc domain, and allow the specified role the vpnc domain. Domain allowed to transition. Role allowed access. Send VPN clients the kill signal. Domain allowed access. Send generic signals to VPN clients. Domain allowed access. Send signull to VPN clients. Domain allowed access. Send and receive messages from Vpnc over dbus. Domain allowed access. Relabelfrom from vpnc socket. Domain allowed access. W3C Markup Validator Software watchdog Web administrator role Change to the web administrator role. Role allowed access. Change from the web administrator role.

Change from the web administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow webadm to manage files in users home directories

Allow webadm to read files in users home directories

Web server log analysis Execute webalizer in the webalizer domain. Domain allowed to transition. Execute webalizer in the webalizer domain, and allow the specified role the webalizer domain. Domain allowed to transition. Role allowed access. Wine Is Not an Emulator. Run Windows programs in Linux. Execute the wine program in the wine domain. Domain allowed to transition. Execute wine in the wine domain, and allow the specified role the wine domain. Domain allowed to transition. Role allowed access. Read and write wine Shared memory segments. Domain allowed access.

Ignore wine mmap_zero errors.

Wireshark packet capture tool. Role access for wireshark Role allowed access User domain for the role Run wireshark in wireshark domain. Domain allowed to transition. X Window Managers Execute the wm program in the wm domain. Domain allowed access. Xen hypervisor Execute a domain transition to run xend. Domain allowed to transition. Inherit and use xen file descriptors. Domain allowed access. Do not audit attempts to inherit xen file descriptors. Domain to not audit. Read xend image files. Domain allowed access. Allow the specified domain to read/write xend image files. Domain allowed access. Allow the specified domain to append xend log files. Domain allowed access. Create, read, write, and delete the xend log files. Domain allowed access. Do not audit attempts to read and write Xen unix domain stream sockets. These are leaked file descriptors. Domain to not audit. Connect to xenstored over an unix stream socket. Domain allowed access. Connect to xend over an unix domain stream socket. Domain allowed access. Execute a domain transition to run xm. Domain allowed to transition. Connect to xm over an unix stream socket. Domain allowed access.

Allow xend to run blktapctrl/tapdisk. Not required if using dedicated logical volumes for disk images.

Allow xend to run qemu-dm. Not required if using paravirt and no vfb.

Allow xen to manage nfs files

X Windows Font Server Read a X font server named socket. Domain allowed access. Connect to a X font server over a unix domain stream socket. Domain allowed access. Allow the specified domain to execute xfs in the caller domain. Domain allowed access. Least privledge xwindows user role Change to the xguest role. Role allowed access. Change from the xguest role.

Change from the xguest role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.

Allow xguest users to mount removable media

Allow xguest to configure Network Manager

Allow xguest to use blue tooth devices

X print server X Screensaver Role access for xscreensaver Role allowed access User domain for the role Yum/Apt Mirroring Execute yam in the yam domain. Domain allowed to transition. Execute yam in the yam domain, and allow the specified role the yam domain. Domain allowed to transition. Role allowed access. Read yam content. Domain allowed access. Distributed infrastructure monitoring Execute a domain transition to run zabbix. Domain allowed to transition. Allow connectivity to the zabbix server Domain allowed access. Allow the specified domain to read zabbix's log files. Domain allowed access. Allow the specified domain to append zabbix log files. Domain allowed access. Read zabbix PID files. Domain allowed access. Allow connectivity to a zabbix agent Domain allowed access. All of the rules required to administrate an zabbix environment Domain allowed access. The role to be allowed to manage the zabbix domain. Zarafa collaboration platform. Allow the specified domain to search zarafa configuration dirs. Domain allowed access. Execute a domain transition to run zarafa_deliver. Domain allowed to transition. Execute a domain transition to run zarafa_server. Domain allowed to transition. Connect to zarafa-server unix domain stream socket. Domain allowed access. Zebra border gateway protocol network routing service Read the configuration files for zebra. Domain allowed access. Connect to zebra over an unix stream socket. Domain allowed access. All of the rules required to administrate an zebra environment Domain allowed access. The role to be allowed to manage the zebra domain.

Allow zebra daemon to write it configuration files

policy for z/OS Remote-services Audit dispatcher plugin Execute a domain transition to run audispd-zos-remote. Domain allowed to transition. Allow specified type and role to transition and run in the zos_remote_t domain. Allow specified type to use zos_remote_t terminal. Domain allowed to transition. Role allowed access.
Policy modules for kernel resources. Core policy for shells, and generic programs in /bin, /sbin, /usr/bin, and /usr/sbin. Contains the base bin and sbin directory types which need to be searched for the kernel to run init. Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. Type to be used for files. Create a aliased type to generic bin files. (Deprecated)

Create a aliased type to generic bin files. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

Alias type for bin_t.
Make general progams in bin an entrypoint for the specified domain. The domain for which bin_t is an entrypoint. Make general progams in sbin an entrypoint for the specified domain. (Deprecated) The domain for which sbin programs are an entrypoint. Make the shell an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Search the contents of bin directories. Domain allowed access. Do not audit attempts to search the contents of bin directories. Domain to not audit. List the contents of bin directories. Domain allowed access. Do not audit attempts to write bin directories. Domain to not audit. Get the attributes of files in bin directories. Domain allowed access. Get the attributes of files in bin directories. Domain allowed access. Read files in bin directories. Domain allowed access. Do not audit attempts to write bin files. Domain to not audit. Read symbolic links in bin directories. Domain allowed access. Read pipes in bin directories. Domain allowed access. Read named sockets in bin directories. Domain allowed access. Execute generic programs in bin directories, in the caller domain.

Allow the specified domain to execute generic programs in system bin directories (/bin, /sbin, /usr/bin, /usr/sbin) a without domain transition.

Typically, this interface should be used when the domain executes general system progams within the privileges of the source domain. Some examples of these programs are ls, cp, sed, python, and tar. This does not include shells, such as bash.

Related interface:

  • corecmd_exec_shell()
Domain allowed access.
Create, read, write, and delete bin files. Domain allowed access. Relabel to and from the bin type. Domain allowed access. Mmap a bin file as executable. Domain allowed access. Execute a file in a bin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon().

Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the userhelper policy.

Domain allowed to transition. The type of the new process.
Execute a file in a bin directory in the specified domain.

Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the ssh-agent policy.

Domain allowed to transition. The type of the new process.
Search the contents of sbin directories. (Deprecated) Domain allowed access. Do not audit attempts to search sbin directories. (Deprecated) Domain to not audit. List the contents of sbin directories. (Deprecated) Domain allowed access. Do not audit attempts to write sbin directories. (Deprecated) Domain to not audit. Get the attributes of sbin files. (Deprecated) Domain allowed access. Do not audit attempts to get the attibutes of sbin files. (Deprecated) Domain to not audit. Read files in sbin directories. (Deprecated) Domain allowed access. Read symbolic links in sbin directories. (Deprecated) Domain allowed access. Read named pipes in sbin directories. (Deprecated) Domain allowed access. Read named sockets in sbin directories. (Deprecated) Domain allowed access. Execute generic programs in sbin directories, in the caller domain. (Deprecated) Domain allowed access. Create, read, write, and delete sbin files. (Deprecated) Domain allowed access. Relabel to and from the sbin type. (Deprecated) Domain allowed access. Mmap a sbin file as executable. (Deprecated) Domain allowed access. Execute a file in a sbin directory in the specified domain. (Deprecated)

Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated)

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the ssh-agent policy.

Domain allowed to transition. The type of the new process.
Execute a file in a sbin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon(). (Deprecated)

Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated)

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle the userhelper policy.

Domain allowed to transition. The type of the new process.
Check if a shell is executable (DAC-wise). Domain allowed access. Execute shells in the caller domain.

Allow the specified domain to execute shells without a domain transition.

Typically, this interface should be used when the domain executes shells within the privileges of the source domain. Some examples of these programs are bash, tcsh, and zsh.

Related interface:

  • corecmd_exec_bin()
Domain allowed access.
Execute ls in the caller domain. (Deprecated) Domain allowed access. Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. The type of the shell process.
Execute a shell in the specified domain.

Execute a shell in the specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. The type of the shell process.
Execute chroot in the caller domain. Domain allowed access. Get the attributes of all executable files. Domain allowed access. Read all executable files. Domain allowed access. Execute all executable files. Domain allowed access. Do not audit attempts to execute all executables. Domain to not audit. Create, read, write, and all executable files. Domain allowed access. Relabel to and from the bin type. Domain allowed access. Mmap all executables as executable. Domain allowed access.
Policy controlling access to network objects Contains the initial SIDs for network objects. Define type to be a network port type

Define type to be a network port type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define network type to be a reserved port (lt 1024)

Define network type to be a reserved port (lt 1024)

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define network type to be a rpc port ( 512 lt PORT lt 1024)

Define network type to be a rpc port ( 512 lt PORT lt 1024)

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network ports.
Define type to be a network node type

Define type to be a network node type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for network nodes.
Define type to be a network packet type

Define type to be a network packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network packet.
Define type to be a network client packet type

Define type to be a network client packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network client packet.
Define type to be a network server packet type

Define type to be a network server packet type

This is for supporting third party modules and its use is not allowed in upstream reference policy.

Type to be used for a network server packet.
Make the specified type usable for labeled ipsec. Type to be used for labeled ipsec. Send and receive TCP network traffic on generic interfaces.

Allow the specified domain to send and receive TCP network traffic on generic network interfaces.

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_connect_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send UDP network traffic on generic interfaces. Domain allowed access. Dontaudit attempts to send UDP network traffic on generic interfaces. Domain to not audit. Receive UDP network traffic on generic interfaces. Domain allowed access. Do not audit attempts to receive UDP network traffic on generic interfaces. Domain to not audit. Send and receive UDP network traffic on generic interfaces.

Allow the specified domain to send and receive UDP network traffic on generic network interfaces.

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_node()
  • corenet_udp_sendrecv_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Do not audit attempts to send and receive UDP network traffic on generic interfaces. Domain to not audit. Send raw IP packets on generic interfaces. Domain allowed access. Receive raw IP packets on generic interfaces. Domain allowed access. Send and receive raw IP packets on generic interfaces. Domain allowed access. Allow outgoing network traffic on the generic interfaces. The peer label of the outgoing network traffic. Allow incoming traffic on the generic interfaces. The peer label of the incoming network traffic. Allow incoming and outgoing network traffic on the generic interfaces. The peer label of the network traffic. Send and receive TCP network traffic on all interfaces. Domain allowed access. Send UDP network traffic on all interfaces. Domain allowed access. Receive UDP network traffic on all interfaces. Domain allowed access. Send and receive UDP network traffic on all interfaces. Domain allowed access. Send raw IP packets on all interfaces. Domain allowed access. Receive raw IP packets on all interfaces. Domain allowed access. Send and receive raw IP packets on all interfaces. Domain allowed access. Send and receive TCP network traffic on generic nodes.

Allow the specified domain to send and receive TCP network traffic to/from generic network nodes (hostnames/networks).

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_connect_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send UDP network traffic on generic nodes. Domain allowed access. Receive UDP network traffic on generic nodes. Domain allowed access. Send and receive UDP network traffic on generic nodes.

Allow the specified domain to send and receive UDP network traffic to/from generic network nodes (hostnames/networks).

Related interface:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_if()
  • corenet_udp_sendrecv_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send raw IP packets on generic nodes. Domain allowed access. Receive raw IP packets on generic nodes. Domain allowed access. Send and receive raw IP packets on generic nodes. Domain allowed access. Bind TCP sockets to generic nodes.

Bind TCP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections.

Related interface:

  • corenet_udp_bind_generic_node()
Domain allowed access.
Bind UDP sockets to generic nodes.

Bind UDP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections.

Related interface:

  • corenet_tcp_bind_generic_node()
Domain allowed access.
Bind raw sockets to genric nodes. Domain allowed access. Allow outgoing network traffic to generic nodes. The peer label of the outgoing network traffic. Allow incoming network traffic from generic nodes. The peer label of the incoming network traffic. Allow incoming and outgoing network traffic with generic nodes. The peer label of the network traffic. Send and receive TCP network traffic on all nodes. Domain allowed access. Send UDP network traffic on all nodes. Domain allowed access. Do not audit attempts to send UDP network traffic on any nodes. Domain to not audit. Receive UDP network traffic on all nodes. Domain allowed access. Do not audit attempts to receive UDP network traffic on all nodes. Domain to not audit. Send and receive UDP network traffic on all nodes. Domain allowed access. Do not audit attempts to send and receive UDP network traffic on any nodes nodes. Domain to not audit. Send raw IP packets on all nodes. Domain allowed access. Receive raw IP packets on all nodes. Domain allowed access. Send and receive raw IP packets on all nodes. Domain allowed access. Bind TCP sockets to all nodes. Domain allowed access. Bind UDP sockets to all nodes. Domain allowed access. Bind raw sockets to all nodes. Domain allowed access. Send and receive TCP network traffic on generic ports. Domain allowed access. Do not audit send and receive TCP network traffic on generic ports. Domain allowed access. Send UDP network traffic on generic ports. Domain allowed access. Receive UDP network traffic on generic ports. Domain allowed access. Send and receive UDP network traffic on generic ports. Domain allowed access. Bind TCP sockets to generic ports. Domain allowed access. Do not audit bind TCP sockets to generic ports. Domain to not audit. Bind UDP sockets to generic ports. Domain allowed access. Connect TCP sockets to generic ports. Domain allowed access. Send and receive TCP network traffic on all ports.

Send and receive TCP network traffic on all ports. Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_connect_all_ports()
  • corenet_tcp_bind_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Send UDP network traffic on all ports. Domain allowed access. Receive UDP network traffic on all ports. Domain allowed access. Send and receive UDP network traffic on all ports.

Send and receive UDP network traffic on all ports. Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_udp_sendrecv_generic_if()
  • corenet_udp_sendrecv_generic_node()
  • corenet_udp_bind_all_ports()

Example client being able to send to all ports over generic nodes, without labeled networking:

allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Bind TCP sockets to all ports. Domain allowed access. Do not audit attepts to bind TCP sockets to any ports. Domain to not audit. Bind UDP sockets to all ports. Domain allowed access. Do not audit attepts to bind UDP sockets to any ports. Domain to not audit. Connect TCP sockets to all ports.

Connect TCP sockets to all ports

Related interfaces:

  • corenet_all_recvfrom_unlabeled()
  • corenet_tcp_sendrecv_generic_if()
  • corenet_tcp_sendrecv_generic_node()
  • corenet_tcp_sendrecv_all_ports()
  • corenet_tcp_bind_all_ports()

Example client being able to connect to all ports over generic nodes, without labeled networking:

allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t)

Domain allowed access.
Do not audit attempts to connect TCP sockets to all ports. Domain to not audit. Send and receive TCP network traffic on generic reserved ports. Domain allowed access. Send UDP network traffic on generic reserved ports. Domain allowed access. Receive UDP network traffic on generic reserved ports. Domain allowed access. Send and receive UDP network traffic on generic reserved ports. Domain allowed access. Bind TCP sockets to generic reserved ports. Domain allowed access. Bind UDP sockets to generic reserved ports. Domain allowed access. Connect TCP sockets to generic reserved ports. Domain allowed access. Send and receive TCP network traffic on all reserved ports. Domain allowed access. Send UDP network traffic on all reserved ports. Domain allowed access. Receive UDP network traffic on all reserved ports. Domain allowed access. Send and receive UDP network traffic on all reserved ports. Domain allowed access. Bind TCP sockets to all reserved ports. Domain allowed access. Do not audit attempts to bind TCP sockets to all reserved ports. Domain to not audit. Bind UDP sockets to all reserved ports. Domain allowed access. Do not audit attempts to bind UDP sockets to all reserved ports. Domain to not audit. Bind TCP sockets to all ports > 1024. Domain allowed access. Bind UDP sockets to all ports > 1024. Domain allowed access. Connect TCP sockets to reserved ports. Domain allowed access. Connect TCP sockets to all ports > 1024. Domain allowed access. Do not audit attempts to connect TCP sockets all reserved ports. Domain to not audit. Connect TCP sockets to rpc ports. Domain allowed access. Do not audit attempts to connect TCP sockets all rpc ports. Domain to not audit. Read and write the TUN/TAP virtual network device. The domain allowed access. Do not audit attempts to read or write the TUN/TAP virtual network device. Domain to not audit. Getattr the point-to-point device. The domain allowed access. Read and write the point-to-point device. The domain allowed access. Bind TCP sockets to all RPC ports. Domain allowed access. Do not audit attempts to bind TCP sockets to all RPC ports. Domain to not audit. Bind UDP sockets to all RPC ports. Domain allowed access. Do not audit attempts to bind UDP sockets to all RPC ports. Domain to not audit. Send and receive messages on a non-encrypted (no IPSEC) network session.

Send and receive messages on a non-encrypted (no IPSEC) network session. (Deprecated)

The corenet_all_recvfrom_unlabeled() interface should be used instead of this one.

Domain allowed access.
Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session.

Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session.

The corenet_dontaudit_all_recvfrom_unlabeled() interface should be used instead of this one.

Domain to not audit.
Receive TCP packets from a NetLabel connection. Domain allowed access. Receive TCP packets from a NetLabel connection. Domain allowed access. Receive TCP packets from an unlabled connection. Domain allowed access. Do not audit attempts to receive TCP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive TCP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive TCP packets from an unlabeled connection. Domain to not audit. Receive UDP packets from a NetLabel connection. Domain allowed access. Receive UDP packets from a NetLabel connection. Domain allowed access. Receive UDP packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive UDP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive UDP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive UDP packets from an unlabeled connection. Domain to not audit. Receive Raw IP packets from a NetLabel connection. Domain allowed access. Receive Raw IP packets from a NetLabel connection. Domain allowed access. Receive Raw IP packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive Raw IP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive Raw IP packets from a NetLabel connection. Domain to not audit. Do not audit attempts to receive Raw IP packets from an unlabeled connection. Domain to not audit. Receive packets from an unlabeled connection.

Allow the specified domain to receive packets from an unlabeled connection. On machines that do not utilize labeled networking, this will be required on all networking domains. On machines tha do utilize labeled networking, this will be required for any networking domain that is allowed to receive network traffic that does not have a label.

Domain allowed access.
Receive packets from a NetLabel connection.

Allow the specified domain to receive NetLabel network traffic, which utilizes the Commercial IP Security Option (CIPSO) to set the MLS level of the network packets. This is required for all networking domains that receive NetLabel network traffic.

Domain allowed access.
Do not audit attempts to receive packets from an unlabeled connection. Domain allowed access. Do not audit attempts to receive packets from a NetLabel connection. Domain to not audit. Rules for receiving labeled TCP packets.

Rules for receiving labeled TCP packets.

Due to the nature of TCP, this is bidirectional.

Domain allowed access. Peer domain.
Rules for receiving labeled UDP packets. Domain allowed access. Peer domain. Rules for receiving labeled raw IP packets. Domain allowed access. Peer domain. Rules for receiving labeled packets via TCP, UDP and raw IP.

Rules for receiving labeled packets via TCP, UDP and raw IP.

Due to the nature of TCP, the rules (for TCP networking only) are bidirectional.

Domain allowed access. Peer domain.
Make the specified type usable for labeled ipsec. Type to be used for labeled ipsec. Send generic client packets. Domain allowed access. Receive generic client packets. Domain allowed access. Send and receive generic client packets. Domain allowed access. Relabel packets to the generic client packet type. Domain allowed access. Send generic server packets. Domain allowed access. Receive generic server packets. Domain allowed access. Send and receive generic server packets. Domain allowed access. Relabel packets to the generic server packet type. Domain allowed access. Send and receive unlabeled packets.

Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules.

Domain allowed access.
Send all client packets. Domain allowed access. Receive all client packets. Domain allowed access. Send and receive all client packets. Domain allowed access. Relabel packets to any client packet type. Domain allowed access. Send all server packets. Domain allowed access. Receive all server packets. Domain allowed access. Send and receive all server packets. Domain allowed access. Relabel packets to any server packet type. Domain allowed access. Send all packets. Domain allowed access. Receive all packets. Domain allowed access. Send and receive all packets. Domain allowed access. Relabel packets to any packet type. Domain allowed access. Unconfined access to network objects. The domain allowed access. Send and receive TCP traffic on the afs_bos port. Domain allowed access. Send UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_bos port. Domain to not audit. Receive UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_bos port. Domain to not audit. Send and receive UDP traffic on the afs_bos port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_bos port. Domain to not audit. Bind TCP sockets to the afs_bos port. Domain allowed access. Bind UDP sockets to the afs_bos port. Domain allowed access. Make a TCP connection to the afs_bos port. Domain allowed access. Send afs_bos_client packets. Domain allowed access. Do not audit attempts to send afs_bos_client packets. Domain to not audit. Receive afs_bos_client packets. Domain allowed access. Do not audit attempts to receive afs_bos_client packets. Domain allowed access. Send and receive afs_bos_client packets. Domain allowed access. Do not audit attempts to send and receive afs_bos_client packets. Domain to not audit. Relabel packets to afs_bos_client the packet type. Domain allowed access. Send afs_bos_server packets. Domain allowed access. Do not audit attempts to send afs_bos_server packets. Domain to not audit. Receive afs_bos_server packets. Domain allowed access. Do not audit attempts to receive afs_bos_server packets. Domain allowed access. Send and receive afs_bos_server packets. Domain allowed access. Do not audit attempts to send and receive afs_bos_server packets. Domain to not audit. Relabel packets to afs_bos_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_fs port. Domain allowed access. Send UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_fs port. Domain to not audit. Receive UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_fs port. Domain to not audit. Send and receive UDP traffic on the afs_fs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_fs port. Domain to not audit. Bind TCP sockets to the afs_fs port. Domain allowed access. Bind UDP sockets to the afs_fs port. Domain allowed access. Make a TCP connection to the afs_fs port. Domain allowed access. Send afs_fs_client packets. Domain allowed access. Do not audit attempts to send afs_fs_client packets. Domain to not audit. Receive afs_fs_client packets. Domain allowed access. Do not audit attempts to receive afs_fs_client packets. Domain allowed access. Send and receive afs_fs_client packets. Domain allowed access. Do not audit attempts to send and receive afs_fs_client packets. Domain to not audit. Relabel packets to afs_fs_client the packet type. Domain allowed access. Send afs_fs_server packets. Domain allowed access. Do not audit attempts to send afs_fs_server packets. Domain to not audit. Receive afs_fs_server packets. Domain allowed access. Do not audit attempts to receive afs_fs_server packets. Domain allowed access. Send and receive afs_fs_server packets. Domain allowed access. Do not audit attempts to send and receive afs_fs_server packets. Domain to not audit. Relabel packets to afs_fs_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_ka port. Domain allowed access. Send UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_ka port. Domain to not audit. Receive UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_ka port. Domain to not audit. Send and receive UDP traffic on the afs_ka port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_ka port. Domain to not audit. Bind TCP sockets to the afs_ka port. Domain allowed access. Bind UDP sockets to the afs_ka port. Domain allowed access. Make a TCP connection to the afs_ka port. Domain allowed access. Send afs_ka_client packets. Domain allowed access. Do not audit attempts to send afs_ka_client packets. Domain to not audit. Receive afs_ka_client packets. Domain allowed access. Do not audit attempts to receive afs_ka_client packets. Domain allowed access. Send and receive afs_ka_client packets. Domain allowed access. Do not audit attempts to send and receive afs_ka_client packets. Domain to not audit. Relabel packets to afs_ka_client the packet type. Domain allowed access. Send afs_ka_server packets. Domain allowed access. Do not audit attempts to send afs_ka_server packets. Domain to not audit. Receive afs_ka_server packets. Domain allowed access. Do not audit attempts to receive afs_ka_server packets. Domain allowed access. Send and receive afs_ka_server packets. Domain allowed access. Do not audit attempts to send and receive afs_ka_server packets. Domain to not audit. Relabel packets to afs_ka_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_pt port. Domain allowed access. Send UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_pt port. Domain to not audit. Receive UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_pt port. Domain to not audit. Send and receive UDP traffic on the afs_pt port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_pt port. Domain to not audit. Bind TCP sockets to the afs_pt port. Domain allowed access. Bind UDP sockets to the afs_pt port. Domain allowed access. Make a TCP connection to the afs_pt port. Domain allowed access. Send afs_pt_client packets. Domain allowed access. Do not audit attempts to send afs_pt_client packets. Domain to not audit. Receive afs_pt_client packets. Domain allowed access. Do not audit attempts to receive afs_pt_client packets. Domain allowed access. Send and receive afs_pt_client packets. Domain allowed access. Do not audit attempts to send and receive afs_pt_client packets. Domain to not audit. Relabel packets to afs_pt_client the packet type. Domain allowed access. Send afs_pt_server packets. Domain allowed access. Do not audit attempts to send afs_pt_server packets. Domain to not audit. Receive afs_pt_server packets. Domain allowed access. Do not audit attempts to receive afs_pt_server packets. Domain allowed access. Send and receive afs_pt_server packets. Domain allowed access. Do not audit attempts to send and receive afs_pt_server packets. Domain to not audit. Relabel packets to afs_pt_server the packet type. Domain allowed access. Send and receive TCP traffic on the afs_vl port. Domain allowed access. Send UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to send UDP traffic on the afs_vl port. Domain to not audit. Receive UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to receive UDP traffic on the afs_vl port. Domain to not audit. Send and receive UDP traffic on the afs_vl port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the afs_vl port. Domain to not audit. Bind TCP sockets to the afs_vl port. Domain allowed access. Bind UDP sockets to the afs_vl port. Domain allowed access. Make a TCP connection to the afs_vl port. Domain allowed access. Send afs_vl_client packets. Domain allowed access. Do not audit attempts to send afs_vl_client packets. Domain to not audit. Receive afs_vl_client packets. Domain allowed access. Do not audit attempts to receive afs_vl_client packets. Domain allowed access. Send and receive afs_vl_client packets. Domain allowed access. Do not audit attempts to send and receive afs_vl_client packets. Domain to not audit. Relabel packets to afs_vl_client the packet type. Domain allowed access. Send afs_vl_server packets. Domain allowed access. Do not audit attempts to send afs_vl_server packets. Domain to not audit. Receive afs_vl_server packets. Domain allowed access. Do not audit attempts to receive afs_vl_server packets. Domain allowed access. Send and receive afs_vl_server packets. Domain allowed access. Do not audit attempts to send and receive afs_vl_server packets. Domain to not audit. Relabel packets to afs_vl_server the packet type. Domain allowed access. Send and receive TCP traffic on the agentx port. Domain allowed access. Send UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to send UDP traffic on the agentx port. Domain to not audit. Receive UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to receive UDP traffic on the agentx port. Domain to not audit. Send and receive UDP traffic on the agentx port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the agentx port. Domain to not audit. Bind TCP sockets to the agentx port. Domain allowed access. Bind UDP sockets to the agentx port. Domain allowed access. Make a TCP connection to the agentx port. Domain allowed access. Send agentx_client packets. Domain allowed access. Do not audit attempts to send agentx_client packets. Domain to not audit. Receive agentx_client packets. Domain allowed access. Do not audit attempts to receive agentx_client packets. Domain allowed access. Send and receive agentx_client packets. Domain allowed access. Do not audit attempts to send and receive agentx_client packets. Domain to not audit. Relabel packets to agentx_client the packet type. Domain allowed access. Send agentx_server packets. Domain allowed access. Do not audit attempts to send agentx_server packets. Domain to not audit. Receive agentx_server packets. Domain allowed access. Do not audit attempts to receive agentx_server packets. Domain allowed access. Send and receive agentx_server packets. Domain allowed access. Do not audit attempts to send and receive agentx_server packets. Domain to not audit. Relabel packets to agentx_server the packet type. Domain allowed access. Send and receive TCP traffic on the amanda port. Domain allowed access. Send UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to send UDP traffic on the amanda port. Domain to not audit. Receive UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amanda port. Domain to not audit. Send and receive UDP traffic on the amanda port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amanda port. Domain to not audit. Bind TCP sockets to the amanda port. Domain allowed access. Bind UDP sockets to the amanda port. Domain allowed access. Make a TCP connection to the amanda port. Domain allowed access. Send amanda_client packets. Domain allowed access. Do not audit attempts to send amanda_client packets. Domain to not audit. Receive amanda_client packets. Domain allowed access. Do not audit attempts to receive amanda_client packets. Domain allowed access. Send and receive amanda_client packets. Domain allowed access. Do not audit attempts to send and receive amanda_client packets. Domain to not audit. Relabel packets to amanda_client the packet type. Domain allowed access. Send amanda_server packets. Domain allowed access. Do not audit attempts to send amanda_server packets. Domain to not audit. Receive amanda_server packets. Domain allowed access. Do not audit attempts to receive amanda_server packets. Domain allowed access. Send and receive amanda_server packets. Domain allowed access. Do not audit attempts to send and receive amanda_server packets. Domain to not audit. Relabel packets to amanda_server the packet type. Domain allowed access. Send and receive TCP traffic on the amavisd_recv port. Domain allowed access. Send UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to send UDP traffic on the amavisd_recv port. Domain to not audit. Receive UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amavisd_recv port. Domain to not audit. Send and receive UDP traffic on the amavisd_recv port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amavisd_recv port. Domain to not audit. Bind TCP sockets to the amavisd_recv port. Domain allowed access. Bind UDP sockets to the amavisd_recv port. Domain allowed access. Make a TCP connection to the amavisd_recv port. Domain allowed access. Send amavisd_recv_client packets. Domain allowed access. Do not audit attempts to send amavisd_recv_client packets. Domain to not audit. Receive amavisd_recv_client packets. Domain allowed access. Do not audit attempts to receive amavisd_recv_client packets. Domain allowed access. Send and receive amavisd_recv_client packets. Domain allowed access. Do not audit attempts to send and receive amavisd_recv_client packets. Domain to not audit. Relabel packets to amavisd_recv_client the packet type. Domain allowed access. Send amavisd_recv_server packets. Domain allowed access. Do not audit attempts to send amavisd_recv_server packets. Domain to not audit. Receive amavisd_recv_server packets. Domain allowed access. Do not audit attempts to receive amavisd_recv_server packets. Domain allowed access. Send and receive amavisd_recv_server packets. Domain allowed access. Do not audit attempts to send and receive amavisd_recv_server packets. Domain to not audit. Relabel packets to amavisd_recv_server the packet type. Domain allowed access. Send and receive TCP traffic on the amavisd_send port. Domain allowed access. Send UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to send UDP traffic on the amavisd_send port. Domain to not audit. Receive UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amavisd_send port. Domain to not audit. Send and receive UDP traffic on the amavisd_send port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amavisd_send port. Domain to not audit. Bind TCP sockets to the amavisd_send port. Domain allowed access. Bind UDP sockets to the amavisd_send port. Domain allowed access. Make a TCP connection to the amavisd_send port. Domain allowed access. Send amavisd_send_client packets. Domain allowed access. Do not audit attempts to send amavisd_send_client packets. Domain to not audit. Receive amavisd_send_client packets. Domain allowed access. Do not audit attempts to receive amavisd_send_client packets. Domain allowed access. Send and receive amavisd_send_client packets. Domain allowed access. Do not audit attempts to send and receive amavisd_send_client packets. Domain to not audit. Relabel packets to amavisd_send_client the packet type. Domain allowed access. Send amavisd_send_server packets. Domain allowed access. Do not audit attempts to send amavisd_send_server packets. Domain to not audit. Receive amavisd_send_server packets. Domain allowed access. Do not audit attempts to receive amavisd_send_server packets. Domain allowed access. Send and receive amavisd_send_server packets. Domain allowed access. Do not audit attempts to send and receive amavisd_send_server packets. Domain to not audit. Relabel packets to amavisd_send_server the packet type. Domain allowed access. Send and receive TCP traffic on the amqp port. Domain allowed access. Send UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to send UDP traffic on the amqp port. Domain to not audit. Receive UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the amqp port. Domain to not audit. Send and receive UDP traffic on the amqp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the amqp port. Domain to not audit. Bind TCP sockets to the amqp port. Domain allowed access. Bind UDP sockets to the amqp port. Domain allowed access. Make a TCP connection to the amqp port. Domain allowed access. Send amqp_client packets. Domain allowed access. Do not audit attempts to send amqp_client packets. Domain to not audit. Receive amqp_client packets. Domain allowed access. Do not audit attempts to receive amqp_client packets. Domain allowed access. Send and receive amqp_client packets. Domain allowed access. Do not audit attempts to send and receive amqp_client packets. Domain to not audit. Relabel packets to amqp_client the packet type. Domain allowed access. Send amqp_server packets. Domain allowed access. Do not audit attempts to send amqp_server packets. Domain to not audit. Receive amqp_server packets. Domain allowed access. Do not audit attempts to receive amqp_server packets. Domain allowed access. Send and receive amqp_server packets. Domain allowed access. Do not audit attempts to send and receive amqp_server packets. Domain to not audit. Relabel packets to amqp_server the packet type. Domain allowed access. Send and receive TCP traffic on the aol port. Domain allowed access. Send UDP traffic on the aol port. Domain allowed access. Do not audit attempts to send UDP traffic on the aol port. Domain to not audit. Receive UDP traffic on the aol port. Domain allowed access. Do not audit attempts to receive UDP traffic on the aol port. Domain to not audit. Send and receive UDP traffic on the aol port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the aol port. Domain to not audit. Bind TCP sockets to the aol port. Domain allowed access. Bind UDP sockets to the aol port. Domain allowed access. Make a TCP connection to the aol port. Domain allowed access. Send aol_client packets. Domain allowed access. Do not audit attempts to send aol_client packets. Domain to not audit. Receive aol_client packets. Domain allowed access. Do not audit attempts to receive aol_client packets. Domain allowed access. Send and receive aol_client packets. Domain allowed access. Do not audit attempts to send and receive aol_client packets. Domain to not audit. Relabel packets to aol_client the packet type. Domain allowed access. Send aol_server packets. Domain allowed access. Do not audit attempts to send aol_server packets. Domain to not audit. Receive aol_server packets. Domain allowed access. Do not audit attempts to receive aol_server packets. Domain allowed access. Send and receive aol_server packets. Domain allowed access. Do not audit attempts to send and receive aol_server packets. Domain to not audit. Relabel packets to aol_server the packet type. Domain allowed access. Send and receive TCP traffic on the apcupsd port. Domain allowed access. Send UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to send UDP traffic on the apcupsd port. Domain to not audit. Receive UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the apcupsd port. Domain to not audit. Send and receive UDP traffic on the apcupsd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the apcupsd port. Domain to not audit. Bind TCP sockets to the apcupsd port. Domain allowed access. Bind UDP sockets to the apcupsd port. Domain allowed access. Make a TCP connection to the apcupsd port. Domain allowed access. Send apcupsd_client packets. Domain allowed access. Do not audit attempts to send apcupsd_client packets. Domain to not audit. Receive apcupsd_client packets. Domain allowed access. Do not audit attempts to receive apcupsd_client packets. Domain allowed access. Send and receive apcupsd_client packets. Domain allowed access. Do not audit attempts to send and receive apcupsd_client packets. Domain to not audit. Relabel packets to apcupsd_client the packet type. Domain allowed access. Send apcupsd_server packets. Domain allowed access. Do not audit attempts to send apcupsd_server packets. Domain to not audit. Receive apcupsd_server packets. Domain allowed access. Do not audit attempts to receive apcupsd_server packets. Domain allowed access. Send and receive apcupsd_server packets. Domain allowed access. Do not audit attempts to send and receive apcupsd_server packets. Domain to not audit. Relabel packets to apcupsd_server the packet type. Domain allowed access. Send and receive TCP traffic on the asterisk port. Domain allowed access. Send UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to send UDP traffic on the asterisk port. Domain to not audit. Receive UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to receive UDP traffic on the asterisk port. Domain to not audit. Send and receive UDP traffic on the asterisk port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the asterisk port. Domain to not audit. Bind TCP sockets to the asterisk port. Domain allowed access. Bind UDP sockets to the asterisk port. Domain allowed access. Make a TCP connection to the asterisk port. Domain allowed access. Send asterisk_client packets. Domain allowed access. Do not audit attempts to send asterisk_client packets. Domain to not audit. Receive asterisk_client packets. Domain allowed access. Do not audit attempts to receive asterisk_client packets. Domain allowed access. Send and receive asterisk_client packets. Domain allowed access. Do not audit attempts to send and receive asterisk_client packets. Domain to not audit. Relabel packets to asterisk_client the packet type. Domain allowed access. Send asterisk_server packets. Domain allowed access. Do not audit attempts to send asterisk_server packets. Domain to not audit. Receive asterisk_server packets. Domain allowed access. Do not audit attempts to receive asterisk_server packets. Domain allowed access. Send and receive asterisk_server packets. Domain allowed access. Do not audit attempts to send and receive asterisk_server packets. Domain to not audit. Relabel packets to asterisk_server the packet type. Domain allowed access. Send and receive TCP traffic on the audit port. Domain allowed access. Send UDP traffic on the audit port. Domain allowed access. Do not audit attempts to send UDP traffic on the audit port. Domain to not audit. Receive UDP traffic on the audit port. Domain allowed access. Do not audit attempts to receive UDP traffic on the audit port. Domain to not audit. Send and receive UDP traffic on the audit port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the audit port. Domain to not audit. Bind TCP sockets to the audit port. Domain allowed access. Bind UDP sockets to the audit port. Domain allowed access. Make a TCP connection to the audit port. Domain allowed access. Send audit_client packets. Domain allowed access. Do not audit attempts to send audit_client packets. Domain to not audit. Receive audit_client packets. Domain allowed access. Do not audit attempts to receive audit_client packets. Domain allowed access. Send and receive audit_client packets. Domain allowed access. Do not audit attempts to send and receive audit_client packets. Domain to not audit. Relabel packets to audit_client the packet type. Domain allowed access. Send audit_server packets. Domain allowed access. Do not audit attempts to send audit_server packets. Domain to not audit. Receive audit_server packets. Domain allowed access. Do not audit attempts to receive audit_server packets. Domain allowed access. Send and receive audit_server packets. Domain allowed access. Do not audit attempts to send and receive audit_server packets. Domain to not audit. Relabel packets to audit_server the packet type. Domain allowed access. Send and receive TCP traffic on the auth port. Domain allowed access. Send UDP traffic on the auth port. Domain allowed access. Do not audit attempts to send UDP traffic on the auth port. Domain to not audit. Receive UDP traffic on the auth port. Domain allowed access. Do not audit attempts to receive UDP traffic on the auth port. Domain to not audit. Send and receive UDP traffic on the auth port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the auth port. Domain to not audit. Bind TCP sockets to the auth port. Domain allowed access. Bind UDP sockets to the auth port. Domain allowed access. Make a TCP connection to the auth port. Domain allowed access. Send auth_client packets. Domain allowed access. Do not audit attempts to send auth_client packets. Domain to not audit. Receive auth_client packets. Domain allowed access. Do not audit attempts to receive auth_client packets. Domain allowed access. Send and receive auth_client packets. Domain allowed access. Do not audit attempts to send and receive auth_client packets. Domain to not audit. Relabel packets to auth_client the packet type. Domain allowed access. Send auth_server packets. Domain allowed access. Do not audit attempts to send auth_server packets. Domain to not audit. Receive auth_server packets. Domain allowed access. Do not audit attempts to receive auth_server packets. Domain allowed access. Send and receive auth_server packets. Domain allowed access. Do not audit attempts to send and receive auth_server packets. Domain to not audit. Relabel packets to auth_server the packet type. Domain allowed access. Send and receive TCP traffic on the bgp port. Domain allowed access. Send UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to send UDP traffic on the bgp port. Domain to not audit. Receive UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the bgp port. Domain to not audit. Send and receive UDP traffic on the bgp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the bgp port. Domain to not audit. Bind TCP sockets to the bgp port. Domain allowed access. Bind UDP sockets to the bgp port. Domain allowed access. Make a TCP connection to the bgp port. Domain allowed access. Send bgp_client packets. Domain allowed access. Do not audit attempts to send bgp_client packets. Domain to not audit. Receive bgp_client packets. Domain allowed access. Do not audit attempts to receive bgp_client packets. Domain allowed access. Send and receive bgp_client packets. Domain allowed access. Do not audit attempts to send and receive bgp_client packets. Domain to not audit. Relabel packets to bgp_client the packet type. Domain allowed access. Send bgp_server packets. Domain allowed access. Do not audit attempts to send bgp_server packets. Domain to not audit. Receive bgp_server packets. Domain allowed access. Do not audit attempts to receive bgp_server packets. Domain allowed access. Send and receive bgp_server packets. Domain allowed access. Do not audit attempts to send and receive bgp_server packets. Domain to not audit. Relabel packets to bgp_server the packet type. Domain allowed access. Send and receive TCP traffic on the boinc port. Domain allowed access. Send UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to send UDP traffic on the boinc port. Domain to not audit. Receive UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the boinc port. Domain to not audit. Send and receive UDP traffic on the boinc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the boinc port. Domain to not audit. Bind TCP sockets to the boinc port. Domain allowed access. Bind UDP sockets to the boinc port. Domain allowed access. Make a TCP connection to the boinc port. Domain allowed access. Send boinc_client packets. Domain allowed access. Do not audit attempts to send boinc_client packets. Domain to not audit. Receive boinc_client packets. Domain allowed access. Do not audit attempts to receive boinc_client packets. Domain allowed access. Send and receive boinc_client packets. Domain allowed access. Do not audit attempts to send and receive boinc_client packets. Domain to not audit. Relabel packets to boinc_client the packet type. Domain allowed access. Send boinc_server packets. Domain allowed access. Do not audit attempts to send boinc_server packets. Domain to not audit. Receive boinc_server packets. Domain allowed access. Do not audit attempts to receive boinc_server packets. Domain allowed access. Send and receive boinc_server packets. Domain allowed access. Do not audit attempts to send and receive boinc_server packets. Domain to not audit. Relabel packets to boinc_server the packet type. Domain allowed access. Send and receive TCP traffic on the biff port. Domain allowed access. Send UDP traffic on the biff port. Domain allowed access. Do not audit attempts to send UDP traffic on the biff port. Domain to not audit. Receive UDP traffic on the biff port. Domain allowed access. Do not audit attempts to receive UDP traffic on the biff port. Domain to not audit. Send and receive UDP traffic on the biff port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the biff port. Domain to not audit. Bind TCP sockets to the biff port. Domain allowed access. Bind UDP sockets to the biff port. Domain allowed access. Make a TCP connection to the biff port. Domain allowed access. Send biff_client packets. Domain allowed access. Do not audit attempts to send biff_client packets. Domain to not audit. Receive biff_client packets. Domain allowed access. Do not audit attempts to receive biff_client packets. Domain allowed access. Send and receive biff_client packets. Domain allowed access. Do not audit attempts to send and receive biff_client packets. Domain to not audit. Relabel packets to biff_client the packet type. Domain allowed access. Send biff_server packets. Domain allowed access. Do not audit attempts to send biff_server packets. Domain to not audit. Receive biff_server packets. Domain allowed access. Do not audit attempts to receive biff_server packets. Domain allowed access. Send and receive biff_server packets. Domain allowed access. Do not audit attempts to send and receive biff_server packets. Domain to not audit. Relabel packets to biff_server the packet type. Domain allowed access. Send and receive TCP traffic on the certmaster port. Domain allowed access. Send UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to send UDP traffic on the certmaster port. Domain to not audit. Receive UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the certmaster port. Domain to not audit. Send and receive UDP traffic on the certmaster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the certmaster port. Domain to not audit. Bind TCP sockets to the certmaster port. Domain allowed access. Bind UDP sockets to the certmaster port. Domain allowed access. Make a TCP connection to the certmaster port. Domain allowed access. Send certmaster_client packets. Domain allowed access. Do not audit attempts to send certmaster_client packets. Domain to not audit. Receive certmaster_client packets. Domain allowed access. Do not audit attempts to receive certmaster_client packets. Domain allowed access. Send and receive certmaster_client packets. Domain allowed access. Do not audit attempts to send and receive certmaster_client packets. Domain to not audit. Relabel packets to certmaster_client the packet type. Domain allowed access. Send certmaster_server packets. Domain allowed access. Do not audit attempts to send certmaster_server packets. Domain to not audit. Receive certmaster_server packets. Domain allowed access. Do not audit attempts to receive certmaster_server packets. Domain allowed access. Send and receive certmaster_server packets. Domain allowed access. Do not audit attempts to send and receive certmaster_server packets. Domain to not audit. Relabel packets to certmaster_server the packet type. Domain allowed access. Send and receive TCP traffic on the chronyd port. Domain allowed access. Send UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to send UDP traffic on the chronyd port. Domain to not audit. Receive UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the chronyd port. Domain to not audit. Send and receive UDP traffic on the chronyd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the chronyd port. Domain to not audit. Bind TCP sockets to the chronyd port. Domain allowed access. Bind UDP sockets to the chronyd port. Domain allowed access. Make a TCP connection to the chronyd port. Domain allowed access. Send chronyd_client packets. Domain allowed access. Do not audit attempts to send chronyd_client packets. Domain to not audit. Receive chronyd_client packets. Domain allowed access. Do not audit attempts to receive chronyd_client packets. Domain allowed access. Send and receive chronyd_client packets. Domain allowed access. Do not audit attempts to send and receive chronyd_client packets. Domain to not audit. Relabel packets to chronyd_client the packet type. Domain allowed access. Send chronyd_server packets. Domain allowed access. Do not audit attempts to send chronyd_server packets. Domain to not audit. Receive chronyd_server packets. Domain allowed access. Do not audit attempts to receive chronyd_server packets. Domain allowed access. Send and receive chronyd_server packets. Domain allowed access. Do not audit attempts to send and receive chronyd_server packets. Domain to not audit. Relabel packets to chronyd_server the packet type. Domain allowed access. Send and receive TCP traffic on the clamd port. Domain allowed access. Send UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to send UDP traffic on the clamd port. Domain to not audit. Receive UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the clamd port. Domain to not audit. Send and receive UDP traffic on the clamd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the clamd port. Domain to not audit. Bind TCP sockets to the clamd port. Domain allowed access. Bind UDP sockets to the clamd port. Domain allowed access. Make a TCP connection to the clamd port. Domain allowed access. Send clamd_client packets. Domain allowed access. Do not audit attempts to send clamd_client packets. Domain to not audit. Receive clamd_client packets. Domain allowed access. Do not audit attempts to receive clamd_client packets. Domain allowed access. Send and receive clamd_client packets. Domain allowed access. Do not audit attempts to send and receive clamd_client packets. Domain to not audit. Relabel packets to clamd_client the packet type. Domain allowed access. Send clamd_server packets. Domain allowed access. Do not audit attempts to send clamd_server packets. Domain to not audit. Receive clamd_server packets. Domain allowed access. Do not audit attempts to receive clamd_server packets. Domain allowed access. Send and receive clamd_server packets. Domain allowed access. Do not audit attempts to send and receive clamd_server packets. Domain to not audit. Relabel packets to clamd_server the packet type. Domain allowed access. Send and receive TCP traffic on the clockspeed port. Domain allowed access. Send UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to send UDP traffic on the clockspeed port. Domain to not audit. Receive UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to receive UDP traffic on the clockspeed port. Domain to not audit. Send and receive UDP traffic on the clockspeed port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the clockspeed port. Domain to not audit. Bind TCP sockets to the clockspeed port. Domain allowed access. Bind UDP sockets to the clockspeed port. Domain allowed access. Make a TCP connection to the clockspeed port. Domain allowed access. Send clockspeed_client packets. Domain allowed access. Do not audit attempts to send clockspeed_client packets. Domain to not audit. Receive clockspeed_client packets. Domain allowed access. Do not audit attempts to receive clockspeed_client packets. Domain allowed access. Send and receive clockspeed_client packets. Domain allowed access. Do not audit attempts to send and receive clockspeed_client packets. Domain to not audit. Relabel packets to clockspeed_client the packet type. Domain allowed access. Send clockspeed_server packets. Domain allowed access. Do not audit attempts to send clockspeed_server packets. Domain to not audit. Receive clockspeed_server packets. Domain allowed access. Do not audit attempts to receive clockspeed_server packets. Domain allowed access. Send and receive clockspeed_server packets. Domain allowed access. Do not audit attempts to send and receive clockspeed_server packets. Domain to not audit. Relabel packets to clockspeed_server the packet type. Domain allowed access. Send and receive TCP traffic on the cluster port. Domain allowed access. Send UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to send UDP traffic on the cluster port. Domain to not audit. Receive UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cluster port. Domain to not audit. Send and receive UDP traffic on the cluster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cluster port. Domain to not audit. Bind TCP sockets to the cluster port. Domain allowed access. Bind UDP sockets to the cluster port. Domain allowed access. Make a TCP connection to the cluster port. Domain allowed access. Send cluster_client packets. Domain allowed access. Do not audit attempts to send cluster_client packets. Domain to not audit. Receive cluster_client packets. Domain allowed access. Do not audit attempts to receive cluster_client packets. Domain allowed access. Send and receive cluster_client packets. Domain allowed access. Do not audit attempts to send and receive cluster_client packets. Domain to not audit. Relabel packets to cluster_client the packet type. Domain allowed access. Send cluster_server packets. Domain allowed access. Do not audit attempts to send cluster_server packets. Domain to not audit. Receive cluster_server packets. Domain allowed access. Do not audit attempts to receive cluster_server packets. Domain allowed access. Send and receive cluster_server packets. Domain allowed access. Do not audit attempts to send and receive cluster_server packets. Domain to not audit. Relabel packets to cluster_server the packet type. Domain allowed access. Send and receive TCP traffic on the cobbler port. Domain allowed access. Send UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to send UDP traffic on the cobbler port. Domain to not audit. Receive UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cobbler port. Domain to not audit. Send and receive UDP traffic on the cobbler port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cobbler port. Domain to not audit. Bind TCP sockets to the cobbler port. Domain allowed access. Bind UDP sockets to the cobbler port. Domain allowed access. Make a TCP connection to the cobbler port. Domain allowed access. Send cobbler_client packets. Domain allowed access. Do not audit attempts to send cobbler_client packets. Domain to not audit. Receive cobbler_client packets. Domain allowed access. Do not audit attempts to receive cobbler_client packets. Domain allowed access. Send and receive cobbler_client packets. Domain allowed access. Do not audit attempts to send and receive cobbler_client packets. Domain to not audit. Relabel packets to cobbler_client the packet type. Domain allowed access. Send cobbler_server packets. Domain allowed access. Do not audit attempts to send cobbler_server packets. Domain to not audit. Receive cobbler_server packets. Domain allowed access. Do not audit attempts to receive cobbler_server packets. Domain allowed access. Send and receive cobbler_server packets. Domain allowed access. Do not audit attempts to send and receive cobbler_server packets. Domain to not audit. Relabel packets to cobbler_server the packet type. Domain allowed access. Send and receive TCP traffic on the comsat port. Domain allowed access. Send UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to send UDP traffic on the comsat port. Domain to not audit. Receive UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the comsat port. Domain to not audit. Send and receive UDP traffic on the comsat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the comsat port. Domain to not audit. Bind TCP sockets to the comsat port. Domain allowed access. Bind UDP sockets to the comsat port. Domain allowed access. Make a TCP connection to the comsat port. Domain allowed access. Send comsat_client packets. Domain allowed access. Do not audit attempts to send comsat_client packets. Domain to not audit. Receive comsat_client packets. Domain allowed access. Do not audit attempts to receive comsat_client packets. Domain allowed access. Send and receive comsat_client packets. Domain allowed access. Do not audit attempts to send and receive comsat_client packets. Domain to not audit. Relabel packets to comsat_client the packet type. Domain allowed access. Send comsat_server packets. Domain allowed access. Do not audit attempts to send comsat_server packets. Domain to not audit. Receive comsat_server packets. Domain allowed access. Do not audit attempts to receive comsat_server packets. Domain allowed access. Send and receive comsat_server packets. Domain allowed access. Do not audit attempts to send and receive comsat_server packets. Domain to not audit. Relabel packets to comsat_server the packet type. Domain allowed access. Send and receive TCP traffic on the cvs port. Domain allowed access. Send UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to send UDP traffic on the cvs port. Domain to not audit. Receive UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cvs port. Domain to not audit. Send and receive UDP traffic on the cvs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cvs port. Domain to not audit. Bind TCP sockets to the cvs port. Domain allowed access. Bind UDP sockets to the cvs port. Domain allowed access. Make a TCP connection to the cvs port. Domain allowed access. Send cvs_client packets. Domain allowed access. Do not audit attempts to send cvs_client packets. Domain to not audit. Receive cvs_client packets. Domain allowed access. Do not audit attempts to receive cvs_client packets. Domain allowed access. Send and receive cvs_client packets. Domain allowed access. Do not audit attempts to send and receive cvs_client packets. Domain to not audit. Relabel packets to cvs_client the packet type. Domain allowed access. Send cvs_server packets. Domain allowed access. Do not audit attempts to send cvs_server packets. Domain to not audit. Receive cvs_server packets. Domain allowed access. Do not audit attempts to receive cvs_server packets. Domain allowed access. Send and receive cvs_server packets. Domain allowed access. Do not audit attempts to send and receive cvs_server packets. Domain to not audit. Relabel packets to cvs_server the packet type. Domain allowed access. Send and receive TCP traffic on the cyphesis port. Domain allowed access. Send UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to send UDP traffic on the cyphesis port. Domain to not audit. Receive UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to receive UDP traffic on the cyphesis port. Domain to not audit. Send and receive UDP traffic on the cyphesis port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the cyphesis port. Domain to not audit. Bind TCP sockets to the cyphesis port. Domain allowed access. Bind UDP sockets to the cyphesis port. Domain allowed access. Make a TCP connection to the cyphesis port. Domain allowed access. Send cyphesis_client packets. Domain allowed access. Do not audit attempts to send cyphesis_client packets. Domain to not audit. Receive cyphesis_client packets. Domain allowed access. Do not audit attempts to receive cyphesis_client packets. Domain allowed access. Send and receive cyphesis_client packets. Domain allowed access. Do not audit attempts to send and receive cyphesis_client packets. Domain to not audit. Relabel packets to cyphesis_client the packet type. Domain allowed access. Send cyphesis_server packets. Domain allowed access. Do not audit attempts to send cyphesis_server packets. Domain to not audit. Receive cyphesis_server packets. Domain allowed access. Do not audit attempts to receive cyphesis_server packets. Domain allowed access. Send and receive cyphesis_server packets. Domain allowed access. Do not audit attempts to send and receive cyphesis_server packets. Domain to not audit. Relabel packets to cyphesis_server the packet type. Domain allowed access. Send and receive TCP traffic on the daap port. Domain allowed access. Send UDP traffic on the daap port. Domain allowed access. Do not audit attempts to send UDP traffic on the daap port. Domain to not audit. Receive UDP traffic on the daap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the daap port. Domain to not audit. Send and receive UDP traffic on the daap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the daap port. Domain to not audit. Bind TCP sockets to the daap port. Domain allowed access. Bind UDP sockets to the daap port. Domain allowed access. Make a TCP connection to the daap port. Domain allowed access. Send daap_client packets. Domain allowed access. Do not audit attempts to send daap_client packets. Domain to not audit. Receive daap_client packets. Domain allowed access. Do not audit attempts to receive daap_client packets. Domain allowed access. Send and receive daap_client packets. Domain allowed access. Do not audit attempts to send and receive daap_client packets. Domain to not audit. Relabel packets to daap_client the packet type. Domain allowed access. Send daap_server packets. Domain allowed access. Do not audit attempts to send daap_server packets. Domain to not audit. Receive daap_server packets. Domain allowed access. Do not audit attempts to receive daap_server packets. Domain allowed access. Send and receive daap_server packets. Domain allowed access. Do not audit attempts to send and receive daap_server packets. Domain to not audit. Relabel packets to daap_server the packet type. Domain allowed access. Send and receive TCP traffic on the dbskkd port. Domain allowed access. Send UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to send UDP traffic on the dbskkd port. Domain to not audit. Receive UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dbskkd port. Domain to not audit. Send and receive UDP traffic on the dbskkd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dbskkd port. Domain to not audit. Bind TCP sockets to the dbskkd port. Domain allowed access. Bind UDP sockets to the dbskkd port. Domain allowed access. Make a TCP connection to the dbskkd port. Domain allowed access. Send dbskkd_client packets. Domain allowed access. Do not audit attempts to send dbskkd_client packets. Domain to not audit. Receive dbskkd_client packets. Domain allowed access. Do not audit attempts to receive dbskkd_client packets. Domain allowed access. Send and receive dbskkd_client packets. Domain allowed access. Do not audit attempts to send and receive dbskkd_client packets. Domain to not audit. Relabel packets to dbskkd_client the packet type. Domain allowed access. Send dbskkd_server packets. Domain allowed access. Do not audit attempts to send dbskkd_server packets. Domain to not audit. Receive dbskkd_server packets. Domain allowed access. Do not audit attempts to receive dbskkd_server packets. Domain allowed access. Send and receive dbskkd_server packets. Domain allowed access. Do not audit attempts to send and receive dbskkd_server packets. Domain to not audit. Relabel packets to dbskkd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dcc port. Domain allowed access. Send UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to send UDP traffic on the dcc port. Domain to not audit. Receive UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dcc port. Domain to not audit. Send and receive UDP traffic on the dcc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dcc port. Domain to not audit. Bind TCP sockets to the dcc port. Domain allowed access. Bind UDP sockets to the dcc port. Domain allowed access. Make a TCP connection to the dcc port. Domain allowed access. Send dcc_client packets. Domain allowed access. Do not audit attempts to send dcc_client packets. Domain to not audit. Receive dcc_client packets. Domain allowed access. Do not audit attempts to receive dcc_client packets. Domain allowed access. Send and receive dcc_client packets. Domain allowed access. Do not audit attempts to send and receive dcc_client packets. Domain to not audit. Relabel packets to dcc_client the packet type. Domain allowed access. Send dcc_server packets. Domain allowed access. Do not audit attempts to send dcc_server packets. Domain to not audit. Receive dcc_server packets. Domain allowed access. Do not audit attempts to receive dcc_server packets. Domain allowed access. Send and receive dcc_server packets. Domain allowed access. Do not audit attempts to send and receive dcc_server packets. Domain to not audit. Relabel packets to dcc_server the packet type. Domain allowed access. Send and receive TCP traffic on the dccm port. Domain allowed access. Send UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to send UDP traffic on the dccm port. Domain to not audit. Receive UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dccm port. Domain to not audit. Send and receive UDP traffic on the dccm port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dccm port. Domain to not audit. Bind TCP sockets to the dccm port. Domain allowed access. Bind UDP sockets to the dccm port. Domain allowed access. Make a TCP connection to the dccm port. Domain allowed access. Send dccm_client packets. Domain allowed access. Do not audit attempts to send dccm_client packets. Domain to not audit. Receive dccm_client packets. Domain allowed access. Do not audit attempts to receive dccm_client packets. Domain allowed access. Send and receive dccm_client packets. Domain allowed access. Do not audit attempts to send and receive dccm_client packets. Domain to not audit. Relabel packets to dccm_client the packet type. Domain allowed access. Send dccm_server packets. Domain allowed access. Do not audit attempts to send dccm_server packets. Domain to not audit. Receive dccm_server packets. Domain allowed access. Do not audit attempts to receive dccm_server packets. Domain allowed access. Send and receive dccm_server packets. Domain allowed access. Do not audit attempts to send and receive dccm_server packets. Domain to not audit. Relabel packets to dccm_server the packet type. Domain allowed access. Send and receive TCP traffic on the dhcpc port. Domain allowed access. Send UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to send UDP traffic on the dhcpc port. Domain to not audit. Receive UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dhcpc port. Domain to not audit. Send and receive UDP traffic on the dhcpc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dhcpc port. Domain to not audit. Bind TCP sockets to the dhcpc port. Domain allowed access. Bind UDP sockets to the dhcpc port. Domain allowed access. Make a TCP connection to the dhcpc port. Domain allowed access. Send dhcpc_client packets. Domain allowed access. Do not audit attempts to send dhcpc_client packets. Domain to not audit. Receive dhcpc_client packets. Domain allowed access. Do not audit attempts to receive dhcpc_client packets. Domain allowed access. Send and receive dhcpc_client packets. Domain allowed access. Do not audit attempts to send and receive dhcpc_client packets. Domain to not audit. Relabel packets to dhcpc_client the packet type. Domain allowed access. Send dhcpc_server packets. Domain allowed access. Do not audit attempts to send dhcpc_server packets. Domain to not audit. Receive dhcpc_server packets. Domain allowed access. Do not audit attempts to receive dhcpc_server packets. Domain allowed access. Send and receive dhcpc_server packets. Domain allowed access. Do not audit attempts to send and receive dhcpc_server packets. Domain to not audit. Relabel packets to dhcpc_server the packet type. Domain allowed access. Send and receive TCP traffic on the dhcpd port. Domain allowed access. Send UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the dhcpd port. Domain to not audit. Receive UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dhcpd port. Domain to not audit. Send and receive UDP traffic on the dhcpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dhcpd port. Domain to not audit. Bind TCP sockets to the dhcpd port. Domain allowed access. Bind UDP sockets to the dhcpd port. Domain allowed access. Make a TCP connection to the dhcpd port. Domain allowed access. Send dhcpd_client packets. Domain allowed access. Do not audit attempts to send dhcpd_client packets. Domain to not audit. Receive dhcpd_client packets. Domain allowed access. Do not audit attempts to receive dhcpd_client packets. Domain allowed access. Send and receive dhcpd_client packets. Domain allowed access. Do not audit attempts to send and receive dhcpd_client packets. Domain to not audit. Relabel packets to dhcpd_client the packet type. Domain allowed access. Send dhcpd_server packets. Domain allowed access. Do not audit attempts to send dhcpd_server packets. Domain to not audit. Receive dhcpd_server packets. Domain allowed access. Do not audit attempts to receive dhcpd_server packets. Domain allowed access. Send and receive dhcpd_server packets. Domain allowed access. Do not audit attempts to send and receive dhcpd_server packets. Domain to not audit. Relabel packets to dhcpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dict port. Domain allowed access. Send UDP traffic on the dict port. Domain allowed access. Do not audit attempts to send UDP traffic on the dict port. Domain to not audit. Receive UDP traffic on the dict port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dict port. Domain to not audit. Send and receive UDP traffic on the dict port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dict port. Domain to not audit. Bind TCP sockets to the dict port. Domain allowed access. Bind UDP sockets to the dict port. Domain allowed access. Make a TCP connection to the dict port. Domain allowed access. Send dict_client packets. Domain allowed access. Do not audit attempts to send dict_client packets. Domain to not audit. Receive dict_client packets. Domain allowed access. Do not audit attempts to receive dict_client packets. Domain allowed access. Send and receive dict_client packets. Domain allowed access. Do not audit attempts to send and receive dict_client packets. Domain to not audit. Relabel packets to dict_client the packet type. Domain allowed access. Send dict_server packets. Domain allowed access. Do not audit attempts to send dict_server packets. Domain to not audit. Receive dict_server packets. Domain allowed access. Do not audit attempts to receive dict_server packets. Domain allowed access. Send and receive dict_server packets. Domain allowed access. Do not audit attempts to send and receive dict_server packets. Domain to not audit. Relabel packets to dict_server the packet type. Domain allowed access. Send and receive TCP traffic on the distccd port. Domain allowed access. Send UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to send UDP traffic on the distccd port. Domain to not audit. Receive UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the distccd port. Domain to not audit. Send and receive UDP traffic on the distccd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the distccd port. Domain to not audit. Bind TCP sockets to the distccd port. Domain allowed access. Bind UDP sockets to the distccd port. Domain allowed access. Make a TCP connection to the distccd port. Domain allowed access. Send distccd_client packets. Domain allowed access. Do not audit attempts to send distccd_client packets. Domain to not audit. Receive distccd_client packets. Domain allowed access. Do not audit attempts to receive distccd_client packets. Domain allowed access. Send and receive distccd_client packets. Domain allowed access. Do not audit attempts to send and receive distccd_client packets. Domain to not audit. Relabel packets to distccd_client the packet type. Domain allowed access. Send distccd_server packets. Domain allowed access. Do not audit attempts to send distccd_server packets. Domain to not audit. Receive distccd_server packets. Domain allowed access. Do not audit attempts to receive distccd_server packets. Domain allowed access. Send and receive distccd_server packets. Domain allowed access. Do not audit attempts to send and receive distccd_server packets. Domain to not audit. Relabel packets to distccd_server the packet type. Domain allowed access. Send and receive TCP traffic on the dns port. Domain allowed access. Send UDP traffic on the dns port. Domain allowed access. Do not audit attempts to send UDP traffic on the dns port. Domain to not audit. Receive UDP traffic on the dns port. Domain allowed access. Do not audit attempts to receive UDP traffic on the dns port. Domain to not audit. Send and receive UDP traffic on the dns port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the dns port. Domain to not audit. Bind TCP sockets to the dns port. Domain allowed access. Bind UDP sockets to the dns port. Domain allowed access. Make a TCP connection to the dns port. Domain allowed access. Send dns_client packets. Domain allowed access. Do not audit attempts to send dns_client packets. Domain to not audit. Receive dns_client packets. Domain allowed access. Do not audit attempts to receive dns_client packets. Domain allowed access. Send and receive dns_client packets. Domain allowed access. Do not audit attempts to send and receive dns_client packets. Domain to not audit. Relabel packets to dns_client the packet type. Domain allowed access. Send dns_server packets. Domain allowed access. Do not audit attempts to send dns_server packets. Domain to not audit. Receive dns_server packets. Domain allowed access. Do not audit attempts to receive dns_server packets. Domain allowed access. Send and receive dns_server packets. Domain allowed access. Do not audit attempts to send and receive dns_server packets. Domain to not audit. Relabel packets to dns_server the packet type. Domain allowed access. Send and receive TCP traffic on the epmap port. Domain allowed access. Send UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to send UDP traffic on the epmap port. Domain to not audit. Receive UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the epmap port. Domain to not audit. Send and receive UDP traffic on the epmap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the epmap port. Domain to not audit. Bind TCP sockets to the epmap port. Domain allowed access. Bind UDP sockets to the epmap port. Domain allowed access. Make a TCP connection to the epmap port. Domain allowed access. Send epmap_client packets. Domain allowed access. Do not audit attempts to send epmap_client packets. Domain to not audit. Receive epmap_client packets. Domain allowed access. Do not audit attempts to receive epmap_client packets. Domain allowed access. Send and receive epmap_client packets. Domain allowed access. Do not audit attempts to send and receive epmap_client packets. Domain to not audit. Relabel packets to epmap_client the packet type. Domain allowed access. Send epmap_server packets. Domain allowed access. Do not audit attempts to send epmap_server packets. Domain to not audit. Receive epmap_server packets. Domain allowed access. Do not audit attempts to receive epmap_server packets. Domain allowed access. Send and receive epmap_server packets. Domain allowed access. Do not audit attempts to send and receive epmap_server packets. Domain to not audit. Relabel packets to epmap_server the packet type. Domain allowed access. Send and receive TCP traffic on the fingerd port. Domain allowed access. Send UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to send UDP traffic on the fingerd port. Domain to not audit. Receive UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the fingerd port. Domain to not audit. Send and receive UDP traffic on the fingerd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the fingerd port. Domain to not audit. Bind TCP sockets to the fingerd port. Domain allowed access. Bind UDP sockets to the fingerd port. Domain allowed access. Make a TCP connection to the fingerd port. Domain allowed access. Send fingerd_client packets. Domain allowed access. Do not audit attempts to send fingerd_client packets. Domain to not audit. Receive fingerd_client packets. Domain allowed access. Do not audit attempts to receive fingerd_client packets. Domain allowed access. Send and receive fingerd_client packets. Domain allowed access. Do not audit attempts to send and receive fingerd_client packets. Domain to not audit. Relabel packets to fingerd_client the packet type. Domain allowed access. Send fingerd_server packets. Domain allowed access. Do not audit attempts to send fingerd_server packets. Domain to not audit. Receive fingerd_server packets. Domain allowed access. Do not audit attempts to receive fingerd_server packets. Domain allowed access. Send and receive fingerd_server packets. Domain allowed access. Do not audit attempts to send and receive fingerd_server packets. Domain to not audit. Relabel packets to fingerd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ftp port. Domain allowed access. Send UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ftp port. Domain to not audit. Receive UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ftp port. Domain to not audit. Send and receive UDP traffic on the ftp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ftp port. Domain to not audit. Bind TCP sockets to the ftp port. Domain allowed access. Bind UDP sockets to the ftp port. Domain allowed access. Make a TCP connection to the ftp port. Domain allowed access. Send ftp_client packets. Domain allowed access. Do not audit attempts to send ftp_client packets. Domain to not audit. Receive ftp_client packets. Domain allowed access. Do not audit attempts to receive ftp_client packets. Domain allowed access. Send and receive ftp_client packets. Domain allowed access. Do not audit attempts to send and receive ftp_client packets. Domain to not audit. Relabel packets to ftp_client the packet type. Domain allowed access. Send ftp_server packets. Domain allowed access. Do not audit attempts to send ftp_server packets. Domain to not audit. Receive ftp_server packets. Domain allowed access. Do not audit attempts to receive ftp_server packets. Domain allowed access. Send and receive ftp_server packets. Domain allowed access. Do not audit attempts to send and receive ftp_server packets. Domain to not audit. Relabel packets to ftp_server the packet type. Domain allowed access. Send and receive TCP traffic on the ftp_data port. Domain allowed access. Send UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to send UDP traffic on the ftp_data port. Domain to not audit. Receive UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ftp_data port. Domain to not audit. Send and receive UDP traffic on the ftp_data port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ftp_data port. Domain to not audit. Bind TCP sockets to the ftp_data port. Domain allowed access. Bind UDP sockets to the ftp_data port. Domain allowed access. Make a TCP connection to the ftp_data port. Domain allowed access. Send ftp_data_client packets. Domain allowed access. Do not audit attempts to send ftp_data_client packets. Domain to not audit. Receive ftp_data_client packets. Domain allowed access. Do not audit attempts to receive ftp_data_client packets. Domain allowed access. Send and receive ftp_data_client packets. Domain allowed access. Do not audit attempts to send and receive ftp_data_client packets. Domain to not audit. Relabel packets to ftp_data_client the packet type. Domain allowed access. Send ftp_data_server packets. Domain allowed access. Do not audit attempts to send ftp_data_server packets. Domain to not audit. Receive ftp_data_server packets. Domain allowed access. Do not audit attempts to receive ftp_data_server packets. Domain allowed access. Send and receive ftp_data_server packets. Domain allowed access. Do not audit attempts to send and receive ftp_data_server packets. Domain to not audit. Relabel packets to ftp_data_server the packet type. Domain allowed access. Send and receive TCP traffic on the gatekeeper port. Domain allowed access. Send UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to send UDP traffic on the gatekeeper port. Domain to not audit. Receive UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gatekeeper port. Domain to not audit. Send and receive UDP traffic on the gatekeeper port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gatekeeper port. Domain to not audit. Bind TCP sockets to the gatekeeper port. Domain allowed access. Bind UDP sockets to the gatekeeper port. Domain allowed access. Make a TCP connection to the gatekeeper port. Domain allowed access. Send gatekeeper_client packets. Domain allowed access. Do not audit attempts to send gatekeeper_client packets. Domain to not audit. Receive gatekeeper_client packets. Domain allowed access. Do not audit attempts to receive gatekeeper_client packets. Domain allowed access. Send and receive gatekeeper_client packets. Domain allowed access. Do not audit attempts to send and receive gatekeeper_client packets. Domain to not audit. Relabel packets to gatekeeper_client the packet type. Domain allowed access. Send gatekeeper_server packets. Domain allowed access. Do not audit attempts to send gatekeeper_server packets. Domain to not audit. Receive gatekeeper_server packets. Domain allowed access. Do not audit attempts to receive gatekeeper_server packets. Domain allowed access. Send and receive gatekeeper_server packets. Domain allowed access. Do not audit attempts to send and receive gatekeeper_server packets. Domain to not audit. Relabel packets to gatekeeper_server the packet type. Domain allowed access. Send and receive TCP traffic on the giftd port. Domain allowed access. Send UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to send UDP traffic on the giftd port. Domain to not audit. Receive UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the giftd port. Domain to not audit. Send and receive UDP traffic on the giftd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the giftd port. Domain to not audit. Bind TCP sockets to the giftd port. Domain allowed access. Bind UDP sockets to the giftd port. Domain allowed access. Make a TCP connection to the giftd port. Domain allowed access. Send giftd_client packets. Domain allowed access. Do not audit attempts to send giftd_client packets. Domain to not audit. Receive giftd_client packets. Domain allowed access. Do not audit attempts to receive giftd_client packets. Domain allowed access. Send and receive giftd_client packets. Domain allowed access. Do not audit attempts to send and receive giftd_client packets. Domain to not audit. Relabel packets to giftd_client the packet type. Domain allowed access. Send giftd_server packets. Domain allowed access. Do not audit attempts to send giftd_server packets. Domain to not audit. Receive giftd_server packets. Domain allowed access. Do not audit attempts to receive giftd_server packets. Domain allowed access. Send and receive giftd_server packets. Domain allowed access. Do not audit attempts to send and receive giftd_server packets. Domain to not audit. Relabel packets to giftd_server the packet type. Domain allowed access. Send and receive TCP traffic on the git port. Domain allowed access. Send UDP traffic on the git port. Domain allowed access. Do not audit attempts to send UDP traffic on the git port. Domain to not audit. Receive UDP traffic on the git port. Domain allowed access. Do not audit attempts to receive UDP traffic on the git port. Domain to not audit. Send and receive UDP traffic on the git port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the git port. Domain to not audit. Bind TCP sockets to the git port. Domain allowed access. Bind UDP sockets to the git port. Domain allowed access. Make a TCP connection to the git port. Domain allowed access. Send git_client packets. Domain allowed access. Do not audit attempts to send git_client packets. Domain to not audit. Receive git_client packets. Domain allowed access. Do not audit attempts to receive git_client packets. Domain allowed access. Send and receive git_client packets. Domain allowed access. Do not audit attempts to send and receive git_client packets. Domain to not audit. Relabel packets to git_client the packet type. Domain allowed access. Send git_server packets. Domain allowed access. Do not audit attempts to send git_server packets. Domain to not audit. Receive git_server packets. Domain allowed access. Do not audit attempts to receive git_server packets. Domain allowed access. Send and receive git_server packets. Domain allowed access. Do not audit attempts to send and receive git_server packets. Domain to not audit. Relabel packets to git_server the packet type. Domain allowed access. Send and receive TCP traffic on the glance_registry port. Domain allowed access. Send UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to send UDP traffic on the glance_registry port. Domain to not audit. Receive UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to receive UDP traffic on the glance_registry port. Domain to not audit. Send and receive UDP traffic on the glance_registry port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the glance_registry port. Domain to not audit. Bind TCP sockets to the glance_registry port. Domain allowed access. Bind UDP sockets to the glance_registry port. Domain allowed access. Make a TCP connection to the glance_registry port. Domain allowed access. Send glance_registry_client packets. Domain allowed access. Do not audit attempts to send glance_registry_client packets. Domain to not audit. Receive glance_registry_client packets. Domain allowed access. Do not audit attempts to receive glance_registry_client packets. Domain allowed access. Send and receive glance_registry_client packets. Domain allowed access. Do not audit attempts to send and receive glance_registry_client packets. Domain to not audit. Relabel packets to glance_registry_client the packet type. Domain allowed access. Send glance_registry_server packets. Domain allowed access. Do not audit attempts to send glance_registry_server packets. Domain to not audit. Receive glance_registry_server packets. Domain allowed access. Do not audit attempts to receive glance_registry_server packets. Domain allowed access. Send and receive glance_registry_server packets. Domain allowed access. Do not audit attempts to send and receive glance_registry_server packets. Domain to not audit. Relabel packets to glance_registry_server the packet type. Domain allowed access. Send and receive TCP traffic on the gopher port. Domain allowed access. Send UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to send UDP traffic on the gopher port. Domain to not audit. Receive UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gopher port. Domain to not audit. Send and receive UDP traffic on the gopher port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gopher port. Domain to not audit. Bind TCP sockets to the gopher port. Domain allowed access. Bind UDP sockets to the gopher port. Domain allowed access. Make a TCP connection to the gopher port. Domain allowed access. Send gopher_client packets. Domain allowed access. Do not audit attempts to send gopher_client packets. Domain to not audit. Receive gopher_client packets. Domain allowed access. Do not audit attempts to receive gopher_client packets. Domain allowed access. Send and receive gopher_client packets. Domain allowed access. Do not audit attempts to send and receive gopher_client packets. Domain to not audit. Relabel packets to gopher_client the packet type. Domain allowed access. Send gopher_server packets. Domain allowed access. Do not audit attempts to send gopher_server packets. Domain to not audit. Receive gopher_server packets. Domain allowed access. Do not audit attempts to receive gopher_server packets. Domain allowed access. Send and receive gopher_server packets. Domain allowed access. Do not audit attempts to send and receive gopher_server packets. Domain to not audit. Relabel packets to gopher_server the packet type. Domain allowed access. Send and receive TCP traffic on the gpsd port. Domain allowed access. Send UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to send UDP traffic on the gpsd port. Domain to not audit. Receive UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the gpsd port. Domain to not audit. Send and receive UDP traffic on the gpsd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the gpsd port. Domain to not audit. Bind TCP sockets to the gpsd port. Domain allowed access. Bind UDP sockets to the gpsd port. Domain allowed access. Make a TCP connection to the gpsd port. Domain allowed access. Send gpsd_client packets. Domain allowed access. Do not audit attempts to send gpsd_client packets. Domain to not audit. Receive gpsd_client packets. Domain allowed access. Do not audit attempts to receive gpsd_client packets. Domain allowed access. Send and receive gpsd_client packets. Domain allowed access. Do not audit attempts to send and receive gpsd_client packets. Domain to not audit. Relabel packets to gpsd_client the packet type. Domain allowed access. Send gpsd_server packets. Domain allowed access. Do not audit attempts to send gpsd_server packets. Domain to not audit. Receive gpsd_server packets. Domain allowed access. Do not audit attempts to receive gpsd_server packets. Domain allowed access. Send and receive gpsd_server packets. Domain allowed access. Do not audit attempts to send and receive gpsd_server packets. Domain to not audit. Relabel packets to gpsd_server the packet type. Domain allowed access. Send and receive TCP traffic on the hadoop_datanode port. Domain allowed access. Send UDP traffic on the hadoop_datanode port. Domain allowed access. Do not audit attempts to send UDP traffic on the hadoop_datanode port. Domain to not audit. Receive UDP traffic on the hadoop_datanode port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hadoop_datanode port. Domain to not audit. Send and receive UDP traffic on the hadoop_datanode port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hadoop_datanode port. Domain to not audit. Bind TCP sockets to the hadoop_datanode port. Domain allowed access. Bind UDP sockets to the hadoop_datanode port. Domain allowed access. Make a TCP connection to the hadoop_datanode port. Domain allowed access. Send hadoop_datanode_client packets. Domain allowed access. Do not audit attempts to send hadoop_datanode_client packets. Domain to not audit. Receive hadoop_datanode_client packets. Domain allowed access. Do not audit attempts to receive hadoop_datanode_client packets. Domain allowed access. Send and receive hadoop_datanode_client packets. Domain allowed access. Do not audit attempts to send and receive hadoop_datanode_client packets. Domain to not audit. Relabel packets to hadoop_datanode_client the packet type. Domain allowed access. Send hadoop_datanode_server packets. Domain allowed access. Do not audit attempts to send hadoop_datanode_server packets. Domain to not audit. Receive hadoop_datanode_server packets. Domain allowed access. Do not audit attempts to receive hadoop_datanode_server packets. Domain allowed access. Send and receive hadoop_datanode_server packets. Domain allowed access. Do not audit attempts to send and receive hadoop_datanode_server packets. Domain to not audit. Relabel packets to hadoop_datanode_server the packet type. Domain allowed access. Send and receive TCP traffic on the hadoop_namenode port. Domain allowed access. Send UDP traffic on the hadoop_namenode port. Domain allowed access. Do not audit attempts to send UDP traffic on the hadoop_namenode port. Domain to not audit. Receive UDP traffic on the hadoop_namenode port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hadoop_namenode port. Domain to not audit. Send and receive UDP traffic on the hadoop_namenode port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hadoop_namenode port. Domain to not audit. Bind TCP sockets to the hadoop_namenode port. Domain allowed access. Bind UDP sockets to the hadoop_namenode port. Domain allowed access. Make a TCP connection to the hadoop_namenode port. Domain allowed access. Send hadoop_namenode_client packets. Domain allowed access. Do not audit attempts to send hadoop_namenode_client packets. Domain to not audit. Receive hadoop_namenode_client packets. Domain allowed access. Do not audit attempts to receive hadoop_namenode_client packets. Domain allowed access. Send and receive hadoop_namenode_client packets. Domain allowed access. Do not audit attempts to send and receive hadoop_namenode_client packets. Domain to not audit. Relabel packets to hadoop_namenode_client the packet type. Domain allowed access. Send hadoop_namenode_server packets. Domain allowed access. Do not audit attempts to send hadoop_namenode_server packets. Domain to not audit. Receive hadoop_namenode_server packets. Domain allowed access. Do not audit attempts to receive hadoop_namenode_server packets. Domain allowed access. Send and receive hadoop_namenode_server packets. Domain allowed access. Do not audit attempts to send and receive hadoop_namenode_server packets. Domain to not audit. Relabel packets to hadoop_namenode_server the packet type. Domain allowed access. Send and receive TCP traffic on the hddtemp port. Domain allowed access. Send UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to send UDP traffic on the hddtemp port. Domain to not audit. Receive UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hddtemp port. Domain to not audit. Send and receive UDP traffic on the hddtemp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hddtemp port. Domain to not audit. Bind TCP sockets to the hddtemp port. Domain allowed access. Bind UDP sockets to the hddtemp port. Domain allowed access. Make a TCP connection to the hddtemp port. Domain allowed access. Send hddtemp_client packets. Domain allowed access. Do not audit attempts to send hddtemp_client packets. Domain to not audit. Receive hddtemp_client packets. Domain allowed access. Do not audit attempts to receive hddtemp_client packets. Domain allowed access. Send and receive hddtemp_client packets. Domain allowed access. Do not audit attempts to send and receive hddtemp_client packets. Domain to not audit. Relabel packets to hddtemp_client the packet type. Domain allowed access. Send hddtemp_server packets. Domain allowed access. Do not audit attempts to send hddtemp_server packets. Domain to not audit. Receive hddtemp_server packets. Domain allowed access. Do not audit attempts to receive hddtemp_server packets. Domain allowed access. Send and receive hddtemp_server packets. Domain allowed access. Do not audit attempts to send and receive hddtemp_server packets. Domain to not audit. Relabel packets to hddtemp_server the packet type. Domain allowed access. Send and receive TCP traffic on the howl port. Domain allowed access. Send UDP traffic on the howl port. Domain allowed access. Do not audit attempts to send UDP traffic on the howl port. Domain to not audit. Receive UDP traffic on the howl port. Domain allowed access. Do not audit attempts to receive UDP traffic on the howl port. Domain to not audit. Send and receive UDP traffic on the howl port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the howl port. Domain to not audit. Bind TCP sockets to the howl port. Domain allowed access. Bind UDP sockets to the howl port. Domain allowed access. Make a TCP connection to the howl port. Domain allowed access. Send howl_client packets. Domain allowed access. Do not audit attempts to send howl_client packets. Domain to not audit. Receive howl_client packets. Domain allowed access. Do not audit attempts to receive howl_client packets. Domain allowed access. Send and receive howl_client packets. Domain allowed access. Do not audit attempts to send and receive howl_client packets. Domain to not audit. Relabel packets to howl_client the packet type. Domain allowed access. Send howl_server packets. Domain allowed access. Do not audit attempts to send howl_server packets. Domain to not audit. Receive howl_server packets. Domain allowed access. Do not audit attempts to receive howl_server packets. Domain allowed access. Send and receive howl_server packets. Domain allowed access. Do not audit attempts to send and receive howl_server packets. Domain to not audit. Relabel packets to howl_server the packet type. Domain allowed access. Send and receive TCP traffic on the hplip port. Domain allowed access. Send UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to send UDP traffic on the hplip port. Domain to not audit. Receive UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to receive UDP traffic on the hplip port. Domain to not audit. Send and receive UDP traffic on the hplip port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the hplip port. Domain to not audit. Bind TCP sockets to the hplip port. Domain allowed access. Bind UDP sockets to the hplip port. Domain allowed access. Make a TCP connection to the hplip port. Domain allowed access. Send hplip_client packets. Domain allowed access. Do not audit attempts to send hplip_client packets. Domain to not audit. Receive hplip_client packets. Domain allowed access. Do not audit attempts to receive hplip_client packets. Domain allowed access. Send and receive hplip_client packets. Domain allowed access. Do not audit attempts to send and receive hplip_client packets. Domain to not audit. Relabel packets to hplip_client the packet type. Domain allowed access. Send hplip_server packets. Domain allowed access. Do not audit attempts to send hplip_server packets. Domain to not audit. Receive hplip_server packets. Domain allowed access. Do not audit attempts to receive hplip_server packets. Domain allowed access. Send and receive hplip_server packets. Domain allowed access. Do not audit attempts to send and receive hplip_server packets. Domain to not audit. Relabel packets to hplip_server the packet type. Domain allowed access. Send and receive TCP traffic on the http port. Domain allowed access. Send UDP traffic on the http port. Domain allowed access. Do not audit attempts to send UDP traffic on the http port. Domain to not audit. Receive UDP traffic on the http port. Domain allowed access. Do not audit attempts to receive UDP traffic on the http port. Domain to not audit. Send and receive UDP traffic on the http port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the http port. Domain to not audit. Bind TCP sockets to the http port. Domain allowed access. Bind UDP sockets to the http port. Domain allowed access. Make a TCP connection to the http port. Domain allowed access. Send http_client packets. Domain allowed access. Do not audit attempts to send http_client packets. Domain to not audit. Receive http_client packets. Domain allowed access. Do not audit attempts to receive http_client packets. Domain allowed access. Send and receive http_client packets. Domain allowed access. Do not audit attempts to send and receive http_client packets. Domain to not audit. Relabel packets to http_client the packet type. Domain allowed access. Send http_server packets. Domain allowed access. Do not audit attempts to send http_server packets. Domain to not audit. Receive http_server packets. Domain allowed access. Do not audit attempts to receive http_server packets. Domain allowed access. Send and receive http_server packets. Domain allowed access. Do not audit attempts to send and receive http_server packets. Domain to not audit. Relabel packets to http_server the packet type. Domain allowed access. Send and receive TCP traffic on the http_cache port. Domain allowed access. Send UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to send UDP traffic on the http_cache port. Domain to not audit. Receive UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to receive UDP traffic on the http_cache port. Domain to not audit. Send and receive UDP traffic on the http_cache port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the http_cache port. Domain to not audit. Bind TCP sockets to the http_cache port. Domain allowed access. Bind UDP sockets to the http_cache port. Domain allowed access. Make a TCP connection to the http_cache port. Domain allowed access. Send http_cache_client packets. Domain allowed access. Do not audit attempts to send http_cache_client packets. Domain to not audit. Receive http_cache_client packets. Domain allowed access. Do not audit attempts to receive http_cache_client packets. Domain allowed access. Send and receive http_cache_client packets. Domain allowed access. Do not audit attempts to send and receive http_cache_client packets. Domain to not audit. Relabel packets to http_cache_client the packet type. Domain allowed access. Send http_cache_server packets. Domain allowed access. Do not audit attempts to send http_cache_server packets. Domain to not audit. Receive http_cache_server packets. Domain allowed access. Do not audit attempts to receive http_cache_server packets. Domain allowed access. Send and receive http_cache_server packets. Domain allowed access. Do not audit attempts to send and receive http_cache_server packets. Domain to not audit. Relabel packets to http_cache_server the packet type. Domain allowed access. Send and receive TCP traffic on the i18n_input port. Domain allowed access. Send UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to send UDP traffic on the i18n_input port. Domain to not audit. Receive UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to receive UDP traffic on the i18n_input port. Domain to not audit. Send and receive UDP traffic on the i18n_input port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the i18n_input port. Domain to not audit. Bind TCP sockets to the i18n_input port. Domain allowed access. Bind UDP sockets to the i18n_input port. Domain allowed access. Make a TCP connection to the i18n_input port. Domain allowed access. Send i18n_input_client packets. Domain allowed access. Do not audit attempts to send i18n_input_client packets. Domain to not audit. Receive i18n_input_client packets. Domain allowed access. Do not audit attempts to receive i18n_input_client packets. Domain allowed access. Send and receive i18n_input_client packets. Domain allowed access. Do not audit attempts to send and receive i18n_input_client packets. Domain to not audit. Relabel packets to i18n_input_client the packet type. Domain allowed access. Send i18n_input_server packets. Domain allowed access. Do not audit attempts to send i18n_input_server packets. Domain to not audit. Receive i18n_input_server packets. Domain allowed access. Do not audit attempts to receive i18n_input_server packets. Domain allowed access. Send and receive i18n_input_server packets. Domain allowed access. Do not audit attempts to send and receive i18n_input_server packets. Domain to not audit. Relabel packets to i18n_input_server the packet type. Domain allowed access. Send and receive TCP traffic on the imaze port. Domain allowed access. Send UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to send UDP traffic on the imaze port. Domain to not audit. Receive UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to receive UDP traffic on the imaze port. Domain to not audit. Send and receive UDP traffic on the imaze port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the imaze port. Domain to not audit. Bind TCP sockets to the imaze port. Domain allowed access. Bind UDP sockets to the imaze port. Domain allowed access. Make a TCP connection to the imaze port. Domain allowed access. Send imaze_client packets. Domain allowed access. Do not audit attempts to send imaze_client packets. Domain to not audit. Receive imaze_client packets. Domain allowed access. Do not audit attempts to receive imaze_client packets. Domain allowed access. Send and receive imaze_client packets. Domain allowed access. Do not audit attempts to send and receive imaze_client packets. Domain to not audit. Relabel packets to imaze_client the packet type. Domain allowed access. Send imaze_server packets. Domain allowed access. Do not audit attempts to send imaze_server packets. Domain to not audit. Receive imaze_server packets. Domain allowed access. Do not audit attempts to receive imaze_server packets. Domain allowed access. Send and receive imaze_server packets. Domain allowed access. Do not audit attempts to send and receive imaze_server packets. Domain to not audit. Relabel packets to imaze_server the packet type. Domain allowed access. Send and receive TCP traffic on the inetd_child port. Domain allowed access. Send UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to send UDP traffic on the inetd_child port. Domain to not audit. Receive UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to receive UDP traffic on the inetd_child port. Domain to not audit. Send and receive UDP traffic on the inetd_child port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the inetd_child port. Domain to not audit. Bind TCP sockets to the inetd_child port. Domain allowed access. Bind UDP sockets to the inetd_child port. Domain allowed access. Make a TCP connection to the inetd_child port. Domain allowed access. Send inetd_child_client packets. Domain allowed access. Do not audit attempts to send inetd_child_client packets. Domain to not audit. Receive inetd_child_client packets. Domain allowed access. Do not audit attempts to receive inetd_child_client packets. Domain allowed access. Send and receive inetd_child_client packets. Domain allowed access. Do not audit attempts to send and receive inetd_child_client packets. Domain to not audit. Relabel packets to inetd_child_client the packet type. Domain allowed access. Send inetd_child_server packets. Domain allowed access. Do not audit attempts to send inetd_child_server packets. Domain to not audit. Receive inetd_child_server packets. Domain allowed access. Do not audit attempts to receive inetd_child_server packets. Domain allowed access. Send and receive inetd_child_server packets. Domain allowed access. Do not audit attempts to send and receive inetd_child_server packets. Domain to not audit. Relabel packets to inetd_child_server the packet type. Domain allowed access. Send and receive TCP traffic on the innd port. Domain allowed access. Send UDP traffic on the innd port. Domain allowed access. Do not audit attempts to send UDP traffic on the innd port. Domain to not audit. Receive UDP traffic on the innd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the innd port. Domain to not audit. Send and receive UDP traffic on the innd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the innd port. Domain to not audit. Bind TCP sockets to the innd port. Domain allowed access. Bind UDP sockets to the innd port. Domain allowed access. Make a TCP connection to the innd port. Domain allowed access. Send innd_client packets. Domain allowed access. Do not audit attempts to send innd_client packets. Domain to not audit. Receive innd_client packets. Domain allowed access. Do not audit attempts to receive innd_client packets. Domain allowed access. Send and receive innd_client packets. Domain allowed access. Do not audit attempts to send and receive innd_client packets. Domain to not audit. Relabel packets to innd_client the packet type. Domain allowed access. Send innd_server packets. Domain allowed access. Do not audit attempts to send innd_server packets. Domain to not audit. Receive innd_server packets. Domain allowed access. Do not audit attempts to receive innd_server packets. Domain allowed access. Send and receive innd_server packets. Domain allowed access. Do not audit attempts to send and receive innd_server packets. Domain to not audit. Relabel packets to innd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipmi port. Domain allowed access. Send UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipmi port. Domain to not audit. Receive UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipmi port. Domain to not audit. Send and receive UDP traffic on the ipmi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipmi port. Domain to not audit. Bind TCP sockets to the ipmi port. Domain allowed access. Bind UDP sockets to the ipmi port. Domain allowed access. Make a TCP connection to the ipmi port. Domain allowed access. Send ipmi_client packets. Domain allowed access. Do not audit attempts to send ipmi_client packets. Domain to not audit. Receive ipmi_client packets. Domain allowed access. Do not audit attempts to receive ipmi_client packets. Domain allowed access. Send and receive ipmi_client packets. Domain allowed access. Do not audit attempts to send and receive ipmi_client packets. Domain to not audit. Relabel packets to ipmi_client the packet type. Domain allowed access. Send ipmi_server packets. Domain allowed access. Do not audit attempts to send ipmi_server packets. Domain to not audit. Receive ipmi_server packets. Domain allowed access. Do not audit attempts to receive ipmi_server packets. Domain allowed access. Send and receive ipmi_server packets. Domain allowed access. Do not audit attempts to send and receive ipmi_server packets. Domain to not audit. Relabel packets to ipmi_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipp port. Domain allowed access. Send UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipp port. Domain to not audit. Receive UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipp port. Domain to not audit. Send and receive UDP traffic on the ipp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipp port. Domain to not audit. Bind TCP sockets to the ipp port. Domain allowed access. Bind UDP sockets to the ipp port. Domain allowed access. Make a TCP connection to the ipp port. Domain allowed access. Send ipp_client packets. Domain allowed access. Do not audit attempts to send ipp_client packets. Domain to not audit. Receive ipp_client packets. Domain allowed access. Do not audit attempts to receive ipp_client packets. Domain allowed access. Send and receive ipp_client packets. Domain allowed access. Do not audit attempts to send and receive ipp_client packets. Domain to not audit. Relabel packets to ipp_client the packet type. Domain allowed access. Send ipp_server packets. Domain allowed access. Do not audit attempts to send ipp_server packets. Domain to not audit. Receive ipp_server packets. Domain allowed access. Do not audit attempts to receive ipp_server packets. Domain allowed access. Send and receive ipp_server packets. Domain allowed access. Do not audit attempts to send and receive ipp_server packets. Domain to not audit. Relabel packets to ipp_server the packet type. Domain allowed access. Send and receive TCP traffic on the ipsecnat port. Domain allowed access. Send UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to send UDP traffic on the ipsecnat port. Domain to not audit. Receive UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ipsecnat port. Domain to not audit. Send and receive UDP traffic on the ipsecnat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ipsecnat port. Domain to not audit. Bind TCP sockets to the ipsecnat port. Domain allowed access. Bind UDP sockets to the ipsecnat port. Domain allowed access. Make a TCP connection to the ipsecnat port. Domain allowed access. Send ipsecnat_client packets. Domain allowed access. Do not audit attempts to send ipsecnat_client packets. Domain to not audit. Receive ipsecnat_client packets. Domain allowed access. Do not audit attempts to receive ipsecnat_client packets. Domain allowed access. Send and receive ipsecnat_client packets. Domain allowed access. Do not audit attempts to send and receive ipsecnat_client packets. Domain to not audit. Relabel packets to ipsecnat_client the packet type. Domain allowed access. Send ipsecnat_server packets. Domain allowed access. Do not audit attempts to send ipsecnat_server packets. Domain to not audit. Receive ipsecnat_server packets. Domain allowed access. Do not audit attempts to receive ipsecnat_server packets. Domain allowed access. Send and receive ipsecnat_server packets. Domain allowed access. Do not audit attempts to send and receive ipsecnat_server packets. Domain to not audit. Relabel packets to ipsecnat_server the packet type. Domain allowed access. Send and receive TCP traffic on the ircd port. Domain allowed access. Send UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to send UDP traffic on the ircd port. Domain to not audit. Receive UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ircd port. Domain to not audit. Send and receive UDP traffic on the ircd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ircd port. Domain to not audit. Bind TCP sockets to the ircd port. Domain allowed access. Bind UDP sockets to the ircd port. Domain allowed access. Make a TCP connection to the ircd port. Domain allowed access. Send ircd_client packets. Domain allowed access. Do not audit attempts to send ircd_client packets. Domain to not audit. Receive ircd_client packets. Domain allowed access. Do not audit attempts to receive ircd_client packets. Domain allowed access. Send and receive ircd_client packets. Domain allowed access. Do not audit attempts to send and receive ircd_client packets. Domain to not audit. Relabel packets to ircd_client the packet type. Domain allowed access. Send ircd_server packets. Domain allowed access. Do not audit attempts to send ircd_server packets. Domain to not audit. Receive ircd_server packets. Domain allowed access. Do not audit attempts to receive ircd_server packets. Domain allowed access. Send and receive ircd_server packets. Domain allowed access. Do not audit attempts to send and receive ircd_server packets. Domain to not audit. Relabel packets to ircd_server the packet type. Domain allowed access. Send and receive TCP traffic on the isakmp port. Domain allowed access. Send UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to send UDP traffic on the isakmp port. Domain to not audit. Receive UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the isakmp port. Domain to not audit. Send and receive UDP traffic on the isakmp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the isakmp port. Domain to not audit. Bind TCP sockets to the isakmp port. Domain allowed access. Bind UDP sockets to the isakmp port. Domain allowed access. Make a TCP connection to the isakmp port. Domain allowed access. Send isakmp_client packets. Domain allowed access. Do not audit attempts to send isakmp_client packets. Domain to not audit. Receive isakmp_client packets. Domain allowed access. Do not audit attempts to receive isakmp_client packets. Domain allowed access. Send and receive isakmp_client packets. Domain allowed access. Do not audit attempts to send and receive isakmp_client packets. Domain to not audit. Relabel packets to isakmp_client the packet type. Domain allowed access. Send isakmp_server packets. Domain allowed access. Do not audit attempts to send isakmp_server packets. Domain to not audit. Receive isakmp_server packets. Domain allowed access. Do not audit attempts to receive isakmp_server packets. Domain allowed access. Send and receive isakmp_server packets. Domain allowed access. Do not audit attempts to send and receive isakmp_server packets. Domain to not audit. Relabel packets to isakmp_server the packet type. Domain allowed access. Send and receive TCP traffic on the iscsi port. Domain allowed access. Send UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to send UDP traffic on the iscsi port. Domain to not audit. Receive UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to receive UDP traffic on the iscsi port. Domain to not audit. Send and receive UDP traffic on the iscsi port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the iscsi port. Domain to not audit. Bind TCP sockets to the iscsi port. Domain allowed access. Bind UDP sockets to the iscsi port. Domain allowed access. Make a TCP connection to the iscsi port. Domain allowed access. Send iscsi_client packets. Domain allowed access. Do not audit attempts to send iscsi_client packets. Domain to not audit. Receive iscsi_client packets. Domain allowed access. Do not audit attempts to receive iscsi_client packets. Domain allowed access. Send and receive iscsi_client packets. Domain allowed access. Do not audit attempts to send and receive iscsi_client packets. Domain to not audit. Relabel packets to iscsi_client the packet type. Domain allowed access. Send iscsi_server packets. Domain allowed access. Do not audit attempts to send iscsi_server packets. Domain to not audit. Receive iscsi_server packets. Domain allowed access. Do not audit attempts to receive iscsi_server packets. Domain allowed access. Send and receive iscsi_server packets. Domain allowed access. Do not audit attempts to send and receive iscsi_server packets. Domain to not audit. Relabel packets to iscsi_server the packet type. Domain allowed access. Send and receive TCP traffic on the isns port. Domain allowed access. Send UDP traffic on the isns port. Domain allowed access. Do not audit attempts to send UDP traffic on the isns port. Domain to not audit. Receive UDP traffic on the isns port. Domain allowed access. Do not audit attempts to receive UDP traffic on the isns port. Domain to not audit. Send and receive UDP traffic on the isns port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the isns port. Domain to not audit. Bind TCP sockets to the isns port. Domain allowed access. Bind UDP sockets to the isns port. Domain allowed access. Make a TCP connection to the isns port. Domain allowed access. Send isns_client packets. Domain allowed access. Do not audit attempts to send isns_client packets. Domain to not audit. Receive isns_client packets. Domain allowed access. Do not audit attempts to receive isns_client packets. Domain allowed access. Send and receive isns_client packets. Domain allowed access. Do not audit attempts to send and receive isns_client packets. Domain to not audit. Relabel packets to isns_client the packet type. Domain allowed access. Send isns_server packets. Domain allowed access. Do not audit attempts to send isns_server packets. Domain to not audit. Receive isns_server packets. Domain allowed access. Do not audit attempts to receive isns_server packets. Domain allowed access. Send and receive isns_server packets. Domain allowed access. Do not audit attempts to send and receive isns_server packets. Domain to not audit. Relabel packets to isns_server the packet type. Domain allowed access. Send and receive TCP traffic on the jabber_client port. Domain allowed access. Send UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to send UDP traffic on the jabber_client port. Domain to not audit. Receive UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jabber_client port. Domain to not audit. Send and receive UDP traffic on the jabber_client port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jabber_client port. Domain to not audit. Bind TCP sockets to the jabber_client port. Domain allowed access. Bind UDP sockets to the jabber_client port. Domain allowed access. Make a TCP connection to the jabber_client port. Domain allowed access. Send jabber_client_client packets. Domain allowed access. Do not audit attempts to send jabber_client_client packets. Domain to not audit. Receive jabber_client_client packets. Domain allowed access. Do not audit attempts to receive jabber_client_client packets. Domain allowed access. Send and receive jabber_client_client packets. Domain allowed access. Do not audit attempts to send and receive jabber_client_client packets. Domain to not audit. Relabel packets to jabber_client_client the packet type. Domain allowed access. Send jabber_client_server packets. Domain allowed access. Do not audit attempts to send jabber_client_server packets. Domain to not audit. Receive jabber_client_server packets. Domain allowed access. Do not audit attempts to receive jabber_client_server packets. Domain allowed access. Send and receive jabber_client_server packets. Domain allowed access. Do not audit attempts to send and receive jabber_client_server packets. Domain to not audit. Relabel packets to jabber_client_server the packet type. Domain allowed access. Send and receive TCP traffic on the jabber_interserver port. Domain allowed access. Send UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the jabber_interserver port. Domain to not audit. Receive UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the jabber_interserver port. Domain to not audit. Send and receive UDP traffic on the jabber_interserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the jabber_interserver port. Domain to not audit. Bind TCP sockets to the jabber_interserver port. Domain allowed access. Bind UDP sockets to the jabber_interserver port. Domain allowed access. Make a TCP connection to the jabber_interserver port. Domain allowed access. Send jabber_interserver_client packets. Domain allowed access. Do not audit attempts to send jabber_interserver_client packets. Domain to not audit. Receive jabber_interserver_client packets. Domain allowed access. Do not audit attempts to receive jabber_interserver_client packets. Domain allowed access. Send and receive jabber_interserver_client packets. Domain allowed access. Do not audit attempts to send and receive jabber_interserver_client packets. Domain to not audit. Relabel packets to jabber_interserver_client the packet type. Domain allowed access. Send jabber_interserver_server packets. Domain allowed access. Do not audit attempts to send jabber_interserver_server packets. Domain to not audit. Receive jabber_interserver_server packets. Domain allowed access. Do not audit attempts to receive jabber_interserver_server packets. Domain allowed access. Send and receive jabber_interserver_server packets. Domain allowed access. Do not audit attempts to send and receive jabber_interserver_server packets. Domain to not audit. Relabel packets to jabber_interserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos port. Domain allowed access. Send UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos port. Domain to not audit. Receive UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos port. Domain to not audit. Send and receive UDP traffic on the kerberos port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos port. Domain to not audit. Bind TCP sockets to the kerberos port. Domain allowed access. Bind UDP sockets to the kerberos port. Domain allowed access. Make a TCP connection to the kerberos port. Domain allowed access. Send kerberos_client packets. Domain allowed access. Do not audit attempts to send kerberos_client packets. Domain to not audit. Receive kerberos_client packets. Domain allowed access. Do not audit attempts to receive kerberos_client packets. Domain allowed access. Send and receive kerberos_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_client packets. Domain to not audit. Relabel packets to kerberos_client the packet type. Domain allowed access. Send kerberos_server packets. Domain allowed access. Do not audit attempts to send kerberos_server packets. Domain to not audit. Receive kerberos_server packets. Domain allowed access. Do not audit attempts to receive kerberos_server packets. Domain allowed access. Send and receive kerberos_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_server packets. Domain to not audit. Relabel packets to kerberos_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos_admin port. Domain allowed access. Send UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos_admin port. Domain to not audit. Receive UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos_admin port. Domain to not audit. Send and receive UDP traffic on the kerberos_admin port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos_admin port. Domain to not audit. Bind TCP sockets to the kerberos_admin port. Domain allowed access. Bind UDP sockets to the kerberos_admin port. Domain allowed access. Make a TCP connection to the kerberos_admin port. Domain allowed access. Send kerberos_admin_client packets. Domain allowed access. Do not audit attempts to send kerberos_admin_client packets. Domain to not audit. Receive kerberos_admin_client packets. Domain allowed access. Do not audit attempts to receive kerberos_admin_client packets. Domain allowed access. Send and receive kerberos_admin_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_admin_client packets. Domain to not audit. Relabel packets to kerberos_admin_client the packet type. Domain allowed access. Send kerberos_admin_server packets. Domain allowed access. Do not audit attempts to send kerberos_admin_server packets. Domain to not audit. Receive kerberos_admin_server packets. Domain allowed access. Do not audit attempts to receive kerberos_admin_server packets. Domain allowed access. Send and receive kerberos_admin_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_admin_server packets. Domain to not audit. Relabel packets to kerberos_admin_server the packet type. Domain allowed access. Send and receive TCP traffic on the kerberos_master port. Domain allowed access. Send UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to send UDP traffic on the kerberos_master port. Domain to not audit. Receive UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kerberos_master port. Domain to not audit. Send and receive UDP traffic on the kerberos_master port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kerberos_master port. Domain to not audit. Bind TCP sockets to the kerberos_master port. Domain allowed access. Bind UDP sockets to the kerberos_master port. Domain allowed access. Make a TCP connection to the kerberos_master port. Domain allowed access. Send kerberos_master_client packets. Domain allowed access. Do not audit attempts to send kerberos_master_client packets. Domain to not audit. Receive kerberos_master_client packets. Domain allowed access. Do not audit attempts to receive kerberos_master_client packets. Domain allowed access. Send and receive kerberos_master_client packets. Domain allowed access. Do not audit attempts to send and receive kerberos_master_client packets. Domain to not audit. Relabel packets to kerberos_master_client the packet type. Domain allowed access. Send kerberos_master_server packets. Domain allowed access. Do not audit attempts to send kerberos_master_server packets. Domain to not audit. Receive kerberos_master_server packets. Domain allowed access. Do not audit attempts to receive kerberos_master_server packets. Domain allowed access. Send and receive kerberos_master_server packets. Domain allowed access. Do not audit attempts to send and receive kerberos_master_server packets. Domain to not audit. Relabel packets to kerberos_master_server the packet type. Domain allowed access. Send and receive TCP traffic on the kismet port. Domain allowed access. Send UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to send UDP traffic on the kismet port. Domain to not audit. Receive UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kismet port. Domain to not audit. Send and receive UDP traffic on the kismet port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kismet port. Domain to not audit. Bind TCP sockets to the kismet port. Domain allowed access. Bind UDP sockets to the kismet port. Domain allowed access. Make a TCP connection to the kismet port. Domain allowed access. Send kismet_client packets. Domain allowed access. Do not audit attempts to send kismet_client packets. Domain to not audit. Receive kismet_client packets. Domain allowed access. Do not audit attempts to receive kismet_client packets. Domain allowed access. Send and receive kismet_client packets. Domain allowed access. Do not audit attempts to send and receive kismet_client packets. Domain to not audit. Relabel packets to kismet_client the packet type. Domain allowed access. Send kismet_server packets. Domain allowed access. Do not audit attempts to send kismet_server packets. Domain to not audit. Receive kismet_server packets. Domain allowed access. Do not audit attempts to receive kismet_server packets. Domain allowed access. Send and receive kismet_server packets. Domain allowed access. Do not audit attempts to send and receive kismet_server packets. Domain to not audit. Relabel packets to kismet_server the packet type. Domain allowed access. Send and receive TCP traffic on the kprop port. Domain allowed access. Send UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to send UDP traffic on the kprop port. Domain to not audit. Receive UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the kprop port. Domain to not audit. Send and receive UDP traffic on the kprop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the kprop port. Domain to not audit. Bind TCP sockets to the kprop port. Domain allowed access. Bind UDP sockets to the kprop port. Domain allowed access. Make a TCP connection to the kprop port. Domain allowed access. Send kprop_client packets. Domain allowed access. Do not audit attempts to send kprop_client packets. Domain to not audit. Receive kprop_client packets. Domain allowed access. Do not audit attempts to receive kprop_client packets. Domain allowed access. Send and receive kprop_client packets. Domain allowed access. Do not audit attempts to send and receive kprop_client packets. Domain to not audit. Relabel packets to kprop_client the packet type. Domain allowed access. Send kprop_server packets. Domain allowed access. Do not audit attempts to send kprop_server packets. Domain to not audit. Receive kprop_server packets. Domain allowed access. Do not audit attempts to receive kprop_server packets. Domain allowed access. Send and receive kprop_server packets. Domain allowed access. Do not audit attempts to send and receive kprop_server packets. Domain to not audit. Relabel packets to kprop_server the packet type. Domain allowed access. Send and receive TCP traffic on the ktalkd port. Domain allowed access. Send UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to send UDP traffic on the ktalkd port. Domain to not audit. Receive UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ktalkd port. Domain to not audit. Send and receive UDP traffic on the ktalkd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ktalkd port. Domain to not audit. Bind TCP sockets to the ktalkd port. Domain allowed access. Bind UDP sockets to the ktalkd port. Domain allowed access. Make a TCP connection to the ktalkd port. Domain allowed access. Send ktalkd_client packets. Domain allowed access. Do not audit attempts to send ktalkd_client packets. Domain to not audit. Receive ktalkd_client packets. Domain allowed access. Do not audit attempts to receive ktalkd_client packets. Domain allowed access. Send and receive ktalkd_client packets. Domain allowed access. Do not audit attempts to send and receive ktalkd_client packets. Domain to not audit. Relabel packets to ktalkd_client the packet type. Domain allowed access. Send ktalkd_server packets. Domain allowed access. Do not audit attempts to send ktalkd_server packets. Domain to not audit. Receive ktalkd_server packets. Domain allowed access. Do not audit attempts to receive ktalkd_server packets. Domain allowed access. Send and receive ktalkd_server packets. Domain allowed access. Do not audit attempts to send and receive ktalkd_server packets. Domain to not audit. Relabel packets to ktalkd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ldap port. Domain allowed access. Send UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to send UDP traffic on the ldap port. Domain to not audit. Receive UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ldap port. Domain to not audit. Send and receive UDP traffic on the ldap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ldap port. Domain to not audit. Bind TCP sockets to the ldap port. Domain allowed access. Bind UDP sockets to the ldap port. Domain allowed access. Make a TCP connection to the ldap port. Domain allowed access. Send ldap_client packets. Domain allowed access. Do not audit attempts to send ldap_client packets. Domain to not audit. Receive ldap_client packets. Domain allowed access. Do not audit attempts to receive ldap_client packets. Domain allowed access. Send and receive ldap_client packets. Domain allowed access. Do not audit attempts to send and receive ldap_client packets. Domain to not audit. Relabel packets to ldap_client the packet type. Domain allowed access. Send ldap_server packets. Domain allowed access. Do not audit attempts to send ldap_server packets. Domain to not audit. Receive ldap_server packets. Domain allowed access. Do not audit attempts to receive ldap_server packets. Domain allowed access. Send and receive ldap_server packets. Domain allowed access. Do not audit attempts to send and receive ldap_server packets. Domain to not audit. Relabel packets to ldap_server the packet type. Domain allowed access. Send and receive TCP traffic on the lirc port. Domain allowed access. Send UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to send UDP traffic on the lirc port. Domain to not audit. Receive UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the lirc port. Domain to not audit. Send and receive UDP traffic on the lirc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the lirc port. Domain to not audit. Bind TCP sockets to the lirc port. Domain allowed access. Bind UDP sockets to the lirc port. Domain allowed access. Make a TCP connection to the lirc port. Domain allowed access. Send lirc_client packets. Domain allowed access. Do not audit attempts to send lirc_client packets. Domain to not audit. Receive lirc_client packets. Domain allowed access. Do not audit attempts to receive lirc_client packets. Domain allowed access. Send and receive lirc_client packets. Domain allowed access. Do not audit attempts to send and receive lirc_client packets. Domain to not audit. Relabel packets to lirc_client the packet type. Domain allowed access. Send lirc_server packets. Domain allowed access. Do not audit attempts to send lirc_server packets. Domain to not audit. Receive lirc_server packets. Domain allowed access. Do not audit attempts to receive lirc_server packets. Domain allowed access. Send and receive lirc_server packets. Domain allowed access. Do not audit attempts to send and receive lirc_server packets. Domain to not audit. Relabel packets to lirc_server the packet type. Domain allowed access. Send and receive TCP traffic on the lmtp port. Domain allowed access. Send UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to send UDP traffic on the lmtp port. Domain to not audit. Receive UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the lmtp port. Domain to not audit. Send and receive UDP traffic on the lmtp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the lmtp port. Domain to not audit. Bind TCP sockets to the lmtp port. Domain allowed access. Bind UDP sockets to the lmtp port. Domain allowed access. Make a TCP connection to the lmtp port. Domain allowed access. Send lmtp_client packets. Domain allowed access. Do not audit attempts to send lmtp_client packets. Domain to not audit. Receive lmtp_client packets. Domain allowed access. Do not audit attempts to receive lmtp_client packets. Domain allowed access. Send and receive lmtp_client packets. Domain allowed access. Do not audit attempts to send and receive lmtp_client packets. Domain to not audit. Relabel packets to lmtp_client the packet type. Domain allowed access. Send lmtp_server packets. Domain allowed access. Do not audit attempts to send lmtp_server packets. Domain to not audit. Receive lmtp_server packets. Domain allowed access. Do not audit attempts to receive lmtp_server packets. Domain allowed access. Send and receive lmtp_server packets. Domain allowed access. Do not audit attempts to send and receive lmtp_server packets. Domain to not audit. Relabel packets to lmtp_server the packet type. Domain allowed access. Send and receive TCP traffic on the lrrd port. Domain allowed access. Send UDP traffic on the lrrd port. Domain allowed access. Do not audit attempts to send UDP traffic on the lrrd port. Domain to not audit. Receive UDP traffic on the lrrd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the lrrd port. Domain to not audit. Send and receive UDP traffic on the lrrd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the lrrd port. Domain to not audit. Bind TCP sockets to the lrrd port. Domain allowed access. Bind UDP sockets to the lrrd port. Domain allowed access. Make a TCP connection to the lrrd port. Domain allowed access. Send lrrd_client packets. Domain allowed access. Do not audit attempts to send lrrd_client packets. Domain to not audit. Receive lrrd_client packets. Domain allowed access. Do not audit attempts to receive lrrd_client packets. Domain allowed access. Send and receive lrrd_client packets. Domain allowed access. Do not audit attempts to send and receive lrrd_client packets. Domain to not audit. Relabel packets to lrrd_client the packet type. Domain allowed access. Send lrrd_server packets. Domain allowed access. Do not audit attempts to send lrrd_server packets. Domain to not audit. Receive lrrd_server packets. Domain allowed access. Do not audit attempts to receive lrrd_server packets. Domain allowed access. Send and receive lrrd_server packets. Domain allowed access. Do not audit attempts to send and receive lrrd_server packets. Domain to not audit. Relabel packets to lrrd_server the packet type. Domain allowed access. Send and receive TCP traffic on the mail port. Domain allowed access. Send UDP traffic on the mail port. Domain allowed access. Do not audit attempts to send UDP traffic on the mail port. Domain to not audit. Receive UDP traffic on the mail port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mail port. Domain to not audit. Send and receive UDP traffic on the mail port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mail port. Domain to not audit. Bind TCP sockets to the mail port. Domain allowed access. Bind UDP sockets to the mail port. Domain allowed access. Make a TCP connection to the mail port. Domain allowed access. Send mail_client packets. Domain allowed access. Do not audit attempts to send mail_client packets. Domain to not audit. Receive mail_client packets. Domain allowed access. Do not audit attempts to receive mail_client packets. Domain allowed access. Send and receive mail_client packets. Domain allowed access. Do not audit attempts to send and receive mail_client packets. Domain to not audit. Relabel packets to mail_client the packet type. Domain allowed access. Send mail_server packets. Domain allowed access. Do not audit attempts to send mail_server packets. Domain to not audit. Receive mail_server packets. Domain allowed access. Do not audit attempts to receive mail_server packets. Domain allowed access. Send and receive mail_server packets. Domain allowed access. Do not audit attempts to send and receive mail_server packets. Domain to not audit. Relabel packets to mail_server the packet type. Domain allowed access. Send and receive TCP traffic on the matahari port. Domain allowed access. Send UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to send UDP traffic on the matahari port. Domain to not audit. Receive UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to receive UDP traffic on the matahari port. Domain to not audit. Send and receive UDP traffic on the matahari port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the matahari port. Domain to not audit. Bind TCP sockets to the matahari port. Domain allowed access. Bind UDP sockets to the matahari port. Domain allowed access. Make a TCP connection to the matahari port. Domain allowed access. Send matahari_client packets. Domain allowed access. Do not audit attempts to send matahari_client packets. Domain to not audit. Receive matahari_client packets. Domain allowed access. Do not audit attempts to receive matahari_client packets. Domain allowed access. Send and receive matahari_client packets. Domain allowed access. Do not audit attempts to send and receive matahari_client packets. Domain to not audit. Relabel packets to matahari_client the packet type. Domain allowed access. Send matahari_server packets. Domain allowed access. Do not audit attempts to send matahari_server packets. Domain to not audit. Receive matahari_server packets. Domain allowed access. Do not audit attempts to receive matahari_server packets. Domain allowed access. Send and receive matahari_server packets. Domain allowed access. Do not audit attempts to send and receive matahari_server packets. Domain to not audit. Relabel packets to matahari_server the packet type. Domain allowed access. Send and receive TCP traffic on the memcache port. Domain allowed access. Send UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to send UDP traffic on the memcache port. Domain to not audit. Receive UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to receive UDP traffic on the memcache port. Domain to not audit. Send and receive UDP traffic on the memcache port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the memcache port. Domain to not audit. Bind TCP sockets to the memcache port. Domain allowed access. Bind UDP sockets to the memcache port. Domain allowed access. Make a TCP connection to the memcache port. Domain allowed access. Send memcache_client packets. Domain allowed access. Do not audit attempts to send memcache_client packets. Domain to not audit. Receive memcache_client packets. Domain allowed access. Do not audit attempts to receive memcache_client packets. Domain allowed access. Send and receive memcache_client packets. Domain allowed access. Do not audit attempts to send and receive memcache_client packets. Domain to not audit. Relabel packets to memcache_client the packet type. Domain allowed access. Send memcache_server packets. Domain allowed access. Do not audit attempts to send memcache_server packets. Domain to not audit. Receive memcache_server packets. Domain allowed access. Do not audit attempts to receive memcache_server packets. Domain allowed access. Send and receive memcache_server packets. Domain allowed access. Do not audit attempts to send and receive memcache_server packets. Domain to not audit. Relabel packets to memcache_server the packet type. Domain allowed access. Send and receive TCP traffic on the milter port. Domain allowed access. Send UDP traffic on the milter port. Domain allowed access. Do not audit attempts to send UDP traffic on the milter port. Domain to not audit. Receive UDP traffic on the milter port. Domain allowed access. Do not audit attempts to receive UDP traffic on the milter port. Domain to not audit. Send and receive UDP traffic on the milter port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the milter port. Domain to not audit. Bind TCP sockets to the milter port. Domain allowed access. Bind UDP sockets to the milter port. Domain allowed access. Make a TCP connection to the milter port. Domain allowed access. Send milter_client packets. Domain allowed access. Do not audit attempts to send milter_client packets. Domain to not audit. Receive milter_client packets. Domain allowed access. Do not audit attempts to receive milter_client packets. Domain allowed access. Send and receive milter_client packets. Domain allowed access. Do not audit attempts to send and receive milter_client packets. Domain to not audit. Relabel packets to milter_client the packet type. Domain allowed access. Send milter_server packets. Domain allowed access. Do not audit attempts to send milter_server packets. Domain to not audit. Receive milter_server packets. Domain allowed access. Do not audit attempts to receive milter_server packets. Domain allowed access. Send and receive milter_server packets. Domain allowed access. Do not audit attempts to send and receive milter_server packets. Domain to not audit. Relabel packets to milter_server the packet type. Domain allowed access. Send and receive TCP traffic on the mmcc port. Domain allowed access. Send UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to send UDP traffic on the mmcc port. Domain to not audit. Receive UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mmcc port. Domain to not audit. Send and receive UDP traffic on the mmcc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mmcc port. Domain to not audit. Bind TCP sockets to the mmcc port. Domain allowed access. Bind UDP sockets to the mmcc port. Domain allowed access. Make a TCP connection to the mmcc port. Domain allowed access. Send mmcc_client packets. Domain allowed access. Do not audit attempts to send mmcc_client packets. Domain to not audit. Receive mmcc_client packets. Domain allowed access. Do not audit attempts to receive mmcc_client packets. Domain allowed access. Send and receive mmcc_client packets. Domain allowed access. Do not audit attempts to send and receive mmcc_client packets. Domain to not audit. Relabel packets to mmcc_client the packet type. Domain allowed access. Send mmcc_server packets. Domain allowed access. Do not audit attempts to send mmcc_server packets. Domain to not audit. Receive mmcc_server packets. Domain allowed access. Do not audit attempts to receive mmcc_server packets. Domain allowed access. Send and receive mmcc_server packets. Domain allowed access. Do not audit attempts to send and receive mmcc_server packets. Domain to not audit. Relabel packets to mmcc_server the packet type. Domain allowed access. Send and receive TCP traffic on the monopd port. Domain allowed access. Send UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to send UDP traffic on the monopd port. Domain to not audit. Receive UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the monopd port. Domain to not audit. Send and receive UDP traffic on the monopd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the monopd port. Domain to not audit. Bind TCP sockets to the monopd port. Domain allowed access. Bind UDP sockets to the monopd port. Domain allowed access. Make a TCP connection to the monopd port. Domain allowed access. Send monopd_client packets. Domain allowed access. Do not audit attempts to send monopd_client packets. Domain to not audit. Receive monopd_client packets. Domain allowed access. Do not audit attempts to receive monopd_client packets. Domain allowed access. Send and receive monopd_client packets. Domain allowed access. Do not audit attempts to send and receive monopd_client packets. Domain to not audit. Relabel packets to monopd_client the packet type. Domain allowed access. Send monopd_server packets. Domain allowed access. Do not audit attempts to send monopd_server packets. Domain to not audit. Receive monopd_server packets. Domain allowed access. Do not audit attempts to receive monopd_server packets. Domain allowed access. Send and receive monopd_server packets. Domain allowed access. Do not audit attempts to send and receive monopd_server packets. Domain to not audit. Relabel packets to monopd_server the packet type. Domain allowed access. Send and receive TCP traffic on the mpd port. Domain allowed access. Send UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the mpd port. Domain to not audit. Receive UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mpd port. Domain to not audit. Send and receive UDP traffic on the mpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mpd port. Domain to not audit. Bind TCP sockets to the mpd port. Domain allowed access. Bind UDP sockets to the mpd port. Domain allowed access. Make a TCP connection to the mpd port. Domain allowed access. Send mpd_client packets. Domain allowed access. Do not audit attempts to send mpd_client packets. Domain to not audit. Receive mpd_client packets. Domain allowed access. Do not audit attempts to receive mpd_client packets. Domain allowed access. Send and receive mpd_client packets. Domain allowed access. Do not audit attempts to send and receive mpd_client packets. Domain to not audit. Relabel packets to mpd_client the packet type. Domain allowed access. Send mpd_server packets. Domain allowed access. Do not audit attempts to send mpd_server packets. Domain to not audit. Receive mpd_server packets. Domain allowed access. Do not audit attempts to receive mpd_server packets. Domain allowed access. Send and receive mpd_server packets. Domain allowed access. Do not audit attempts to send and receive mpd_server packets. Domain to not audit. Relabel packets to mpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the msnp port. Domain allowed access. Send UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to send UDP traffic on the msnp port. Domain to not audit. Receive UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the msnp port. Domain to not audit. Send and receive UDP traffic on the msnp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the msnp port. Domain to not audit. Bind TCP sockets to the msnp port. Domain allowed access. Bind UDP sockets to the msnp port. Domain allowed access. Make a TCP connection to the msnp port. Domain allowed access. Send msnp_client packets. Domain allowed access. Do not audit attempts to send msnp_client packets. Domain to not audit. Receive msnp_client packets. Domain allowed access. Do not audit attempts to receive msnp_client packets. Domain allowed access. Send and receive msnp_client packets. Domain allowed access. Do not audit attempts to send and receive msnp_client packets. Domain to not audit. Relabel packets to msnp_client the packet type. Domain allowed access. Send msnp_server packets. Domain allowed access. Do not audit attempts to send msnp_server packets. Domain to not audit. Receive msnp_server packets. Domain allowed access. Do not audit attempts to receive msnp_server packets. Domain allowed access. Send and receive msnp_server packets. Domain allowed access. Do not audit attempts to send and receive msnp_server packets. Domain to not audit. Relabel packets to msnp_server the packet type. Domain allowed access. Send and receive TCP traffic on the mssql port. Domain allowed access. Send UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to send UDP traffic on the mssql port. Domain to not audit. Receive UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mssql port. Domain to not audit. Send and receive UDP traffic on the mssql port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mssql port. Domain to not audit. Bind TCP sockets to the mssql port. Domain allowed access. Bind UDP sockets to the mssql port. Domain allowed access. Make a TCP connection to the mssql port. Domain allowed access. Send mssql_client packets. Domain allowed access. Do not audit attempts to send mssql_client packets. Domain to not audit. Receive mssql_client packets. Domain allowed access. Do not audit attempts to receive mssql_client packets. Domain allowed access. Send and receive mssql_client packets. Domain allowed access. Do not audit attempts to send and receive mssql_client packets. Domain to not audit. Relabel packets to mssql_client the packet type. Domain allowed access. Send mssql_server packets. Domain allowed access. Do not audit attempts to send mssql_server packets. Domain to not audit. Receive mssql_server packets. Domain allowed access. Do not audit attempts to receive mssql_server packets. Domain allowed access. Send and receive mssql_server packets. Domain allowed access. Do not audit attempts to send and receive mssql_server packets. Domain to not audit. Relabel packets to mssql_server the packet type. Domain allowed access. Send and receive TCP traffic on the munin port. Domain allowed access. Send UDP traffic on the munin port. Domain allowed access. Do not audit attempts to send UDP traffic on the munin port. Domain to not audit. Receive UDP traffic on the munin port. Domain allowed access. Do not audit attempts to receive UDP traffic on the munin port. Domain to not audit. Send and receive UDP traffic on the munin port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the munin port. Domain to not audit. Bind TCP sockets to the munin port. Domain allowed access. Bind UDP sockets to the munin port. Domain allowed access. Make a TCP connection to the munin port. Domain allowed access. Send munin_client packets. Domain allowed access. Do not audit attempts to send munin_client packets. Domain to not audit. Receive munin_client packets. Domain allowed access. Do not audit attempts to receive munin_client packets. Domain allowed access. Send and receive munin_client packets. Domain allowed access. Do not audit attempts to send and receive munin_client packets. Domain to not audit. Relabel packets to munin_client the packet type. Domain allowed access. Send munin_server packets. Domain allowed access. Do not audit attempts to send munin_server packets. Domain to not audit. Receive munin_server packets. Domain allowed access. Do not audit attempts to receive munin_server packets. Domain allowed access. Send and receive munin_server packets. Domain allowed access. Do not audit attempts to send and receive munin_server packets. Domain to not audit. Relabel packets to munin_server the packet type. Domain allowed access. Send and receive TCP traffic on the mysqld port. Domain allowed access. Send UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to send UDP traffic on the mysqld port. Domain to not audit. Receive UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mysqld port. Domain to not audit. Send and receive UDP traffic on the mysqld port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mysqld port. Domain to not audit. Bind TCP sockets to the mysqld port. Domain allowed access. Bind UDP sockets to the mysqld port. Domain allowed access. Make a TCP connection to the mysqld port. Domain allowed access. Send mysqld_client packets. Domain allowed access. Do not audit attempts to send mysqld_client packets. Domain to not audit. Receive mysqld_client packets. Domain allowed access. Do not audit attempts to receive mysqld_client packets. Domain allowed access. Send and receive mysqld_client packets. Domain allowed access. Do not audit attempts to send and receive mysqld_client packets. Domain to not audit. Relabel packets to mysqld_client the packet type. Domain allowed access. Send mysqld_server packets. Domain allowed access. Do not audit attempts to send mysqld_server packets. Domain to not audit. Receive mysqld_server packets. Domain allowed access. Do not audit attempts to receive mysqld_server packets. Domain allowed access. Send and receive mysqld_server packets. Domain allowed access. Do not audit attempts to send and receive mysqld_server packets. Domain to not audit. Relabel packets to mysqld_server the packet type. Domain allowed access. Send and receive TCP traffic on the mysqlmanagerd port. Domain allowed access. Send UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to send UDP traffic on the mysqlmanagerd port. Domain to not audit. Receive UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. Domain to not audit. Send and receive UDP traffic on the mysqlmanagerd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the mysqlmanagerd port. Domain to not audit. Bind TCP sockets to the mysqlmanagerd port. Domain allowed access. Bind UDP sockets to the mysqlmanagerd port. Domain allowed access. Make a TCP connection to the mysqlmanagerd port. Domain allowed access. Send mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to send mysqlmanagerd_client packets. Domain to not audit. Receive mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to receive mysqlmanagerd_client packets. Domain allowed access. Send and receive mysqlmanagerd_client packets. Domain allowed access. Do not audit attempts to send and receive mysqlmanagerd_client packets. Domain to not audit. Relabel packets to mysqlmanagerd_client the packet type. Domain allowed access. Send mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to send mysqlmanagerd_server packets. Domain to not audit. Receive mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to receive mysqlmanagerd_server packets. Domain allowed access. Send and receive mysqlmanagerd_server packets. Domain allowed access. Do not audit attempts to send and receive mysqlmanagerd_server packets. Domain to not audit. Relabel packets to mysqlmanagerd_server the packet type. Domain allowed access. Send and receive TCP traffic on the nessus port. Domain allowed access. Send UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to send UDP traffic on the nessus port. Domain to not audit. Receive UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nessus port. Domain to not audit. Send and receive UDP traffic on the nessus port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nessus port. Domain to not audit. Bind TCP sockets to the nessus port. Domain allowed access. Bind UDP sockets to the nessus port. Domain allowed access. Make a TCP connection to the nessus port. Domain allowed access. Send nessus_client packets. Domain allowed access. Do not audit attempts to send nessus_client packets. Domain to not audit. Receive nessus_client packets. Domain allowed access. Do not audit attempts to receive nessus_client packets. Domain allowed access. Send and receive nessus_client packets. Domain allowed access. Do not audit attempts to send and receive nessus_client packets. Domain to not audit. Relabel packets to nessus_client the packet type. Domain allowed access. Send nessus_server packets. Domain allowed access. Do not audit attempts to send nessus_server packets. Domain to not audit. Receive nessus_server packets. Domain allowed access. Do not audit attempts to receive nessus_server packets. Domain allowed access. Send and receive nessus_server packets. Domain allowed access. Do not audit attempts to send and receive nessus_server packets. Domain to not audit. Relabel packets to nessus_server the packet type. Domain allowed access. Send and receive TCP traffic on the netport port. Domain allowed access. Send UDP traffic on the netport port. Domain allowed access. Do not audit attempts to send UDP traffic on the netport port. Domain to not audit. Receive UDP traffic on the netport port. Domain allowed access. Do not audit attempts to receive UDP traffic on the netport port. Domain to not audit. Send and receive UDP traffic on the netport port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the netport port. Domain to not audit. Bind TCP sockets to the netport port. Domain allowed access. Bind UDP sockets to the netport port. Domain allowed access. Make a TCP connection to the netport port. Domain allowed access. Send netport_client packets. Domain allowed access. Do not audit attempts to send netport_client packets. Domain to not audit. Receive netport_client packets. Domain allowed access. Do not audit attempts to receive netport_client packets. Domain allowed access. Send and receive netport_client packets. Domain allowed access. Do not audit attempts to send and receive netport_client packets. Domain to not audit. Relabel packets to netport_client the packet type. Domain allowed access. Send netport_server packets. Domain allowed access. Do not audit attempts to send netport_server packets. Domain to not audit. Receive netport_server packets. Domain allowed access. Do not audit attempts to receive netport_server packets. Domain allowed access. Send and receive netport_server packets. Domain allowed access. Do not audit attempts to send and receive netport_server packets. Domain to not audit. Relabel packets to netport_server the packet type. Domain allowed access. Send and receive TCP traffic on the netsupport port. Domain allowed access. Send UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to send UDP traffic on the netsupport port. Domain to not audit. Receive UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to receive UDP traffic on the netsupport port. Domain to not audit. Send and receive UDP traffic on the netsupport port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the netsupport port. Domain to not audit. Bind TCP sockets to the netsupport port. Domain allowed access. Bind UDP sockets to the netsupport port. Domain allowed access. Make a TCP connection to the netsupport port. Domain allowed access. Send netsupport_client packets. Domain allowed access. Do not audit attempts to send netsupport_client packets. Domain to not audit. Receive netsupport_client packets. Domain allowed access. Do not audit attempts to receive netsupport_client packets. Domain allowed access. Send and receive netsupport_client packets. Domain allowed access. Do not audit attempts to send and receive netsupport_client packets. Domain to not audit. Relabel packets to netsupport_client the packet type. Domain allowed access. Send netsupport_server packets. Domain allowed access. Do not audit attempts to send netsupport_server packets. Domain to not audit. Receive netsupport_server packets. Domain allowed access. Do not audit attempts to receive netsupport_server packets. Domain allowed access. Send and receive netsupport_server packets. Domain allowed access. Do not audit attempts to send and receive netsupport_server packets. Domain to not audit. Relabel packets to netsupport_server the packet type. Domain allowed access. Send and receive TCP traffic on the nmbd port. Domain allowed access. Send UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to send UDP traffic on the nmbd port. Domain to not audit. Receive UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the nmbd port. Domain to not audit. Send and receive UDP traffic on the nmbd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the nmbd port. Domain to not audit. Bind TCP sockets to the nmbd port. Domain allowed access. Bind UDP sockets to the nmbd port. Domain allowed access. Make a TCP connection to the nmbd port. Domain allowed access. Send nmbd_client packets. Domain allowed access. Do not audit attempts to send nmbd_client packets. Domain to not audit. Receive nmbd_client packets. Domain allowed access. Do not audit attempts to receive nmbd_client packets. Domain allowed access. Send and receive nmbd_client packets. Domain allowed access. Do not audit attempts to send and receive nmbd_client packets. Domain to not audit. Relabel packets to nmbd_client the packet type. Domain allowed access. Send nmbd_server packets. Domain allowed access. Do not audit attempts to send nmbd_server packets. Domain to not audit. Receive nmbd_server packets. Domain allowed access. Do not audit attempts to receive nmbd_server packets. Domain allowed access. Send and receive nmbd_server packets. Domain allowed access. Do not audit attempts to send and receive nmbd_server packets. Domain to not audit. Relabel packets to nmbd_server the packet type. Domain allowed access. Send and receive TCP traffic on the ntop port. Domain allowed access. Send UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to send UDP traffic on the ntop port. Domain to not audit. Receive UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ntop port. Domain to not audit. Send and receive UDP traffic on the ntop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ntop port. Domain to not audit. Bind TCP sockets to the ntop port. Domain allowed access. Bind UDP sockets to the ntop port. Domain allowed access. Make a TCP connection to the ntop port. Domain allowed access. Send ntop_client packets. Domain allowed access. Do not audit attempts to send ntop_client packets. Domain to not audit. Receive ntop_client packets. Domain allowed access. Do not audit attempts to receive ntop_client packets. Domain allowed access. Send and receive ntop_client packets. Domain allowed access. Do not audit attempts to send and receive ntop_client packets. Domain to not audit. Relabel packets to ntop_client the packet type. Domain allowed access. Send ntop_server packets. Domain allowed access. Do not audit attempts to send ntop_server packets. Domain to not audit. Receive ntop_server packets. Domain allowed access. Do not audit attempts to receive ntop_server packets. Domain allowed access. Send and receive ntop_server packets. Domain allowed access. Do not audit attempts to send and receive ntop_server packets. Domain to not audit. Relabel packets to ntop_server the packet type. Domain allowed access. Send and receive TCP traffic on the ntp port. Domain allowed access. Send UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ntp port. Domain to not audit. Receive UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ntp port. Domain to not audit. Send and receive UDP traffic on the ntp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ntp port. Domain to not audit. Bind TCP sockets to the ntp port. Domain allowed access. Bind UDP sockets to the ntp port. Domain allowed access. Make a TCP connection to the ntp port. Domain allowed access. Send ntp_client packets. Domain allowed access. Do not audit attempts to send ntp_client packets. Domain to not audit. Receive ntp_client packets. Domain allowed access. Do not audit attempts to receive ntp_client packets. Domain allowed access. Send and receive ntp_client packets. Domain allowed access. Do not audit attempts to send and receive ntp_client packets. Domain to not audit. Relabel packets to ntp_client the packet type. Domain allowed access. Send ntp_server packets. Domain allowed access. Do not audit attempts to send ntp_server packets. Domain to not audit. Receive ntp_server packets. Domain allowed access. Do not audit attempts to receive ntp_server packets. Domain allowed access. Send and receive ntp_server packets. Domain allowed access. Do not audit attempts to send and receive ntp_server packets. Domain to not audit. Relabel packets to ntp_server the packet type. Domain allowed access. Send and receive TCP traffic on the oracledb port. Domain allowed access. Send UDP traffic on the oracledb port. Domain allowed access. Do not audit attempts to send UDP traffic on the oracledb port. Domain to not audit. Receive UDP traffic on the oracledb port. Domain allowed access. Do not audit attempts to receive UDP traffic on the oracledb port. Domain to not audit. Send and receive UDP traffic on the oracledb port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the oracledb port. Domain to not audit. Bind TCP sockets to the oracledb port. Domain allowed access. Bind UDP sockets to the oracledb port. Domain allowed access. Make a TCP connection to the oracledb port. Domain allowed access. Send oracledb_client packets. Domain allowed access. Do not audit attempts to send oracledb_client packets. Domain to not audit. Receive oracledb_client packets. Domain allowed access. Do not audit attempts to receive oracledb_client packets. Domain allowed access. Send and receive oracledb_client packets. Domain allowed access. Do not audit attempts to send and receive oracledb_client packets. Domain to not audit. Relabel packets to oracledb_client the packet type. Domain allowed access. Send oracledb_server packets. Domain allowed access. Do not audit attempts to send oracledb_server packets. Domain to not audit. Receive oracledb_server packets. Domain allowed access. Do not audit attempts to receive oracledb_server packets. Domain allowed access. Send and receive oracledb_server packets. Domain allowed access. Do not audit attempts to send and receive oracledb_server packets. Domain to not audit. Relabel packets to oracledb_server the packet type. Domain allowed access. Send and receive TCP traffic on the ocsp port. Domain allowed access. Send UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to send UDP traffic on the ocsp port. Domain to not audit. Receive UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ocsp port. Domain to not audit. Send and receive UDP traffic on the ocsp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ocsp port. Domain to not audit. Bind TCP sockets to the ocsp port. Domain allowed access. Bind UDP sockets to the ocsp port. Domain allowed access. Make a TCP connection to the ocsp port. Domain allowed access. Send ocsp_client packets. Domain allowed access. Do not audit attempts to send ocsp_client packets. Domain to not audit. Receive ocsp_client packets. Domain allowed access. Do not audit attempts to receive ocsp_client packets. Domain allowed access. Send and receive ocsp_client packets. Domain allowed access. Do not audit attempts to send and receive ocsp_client packets. Domain to not audit. Relabel packets to ocsp_client the packet type. Domain allowed access. Send ocsp_server packets. Domain allowed access. Do not audit attempts to send ocsp_server packets. Domain to not audit. Receive ocsp_server packets. Domain allowed access. Do not audit attempts to receive ocsp_server packets. Domain allowed access. Send and receive ocsp_server packets. Domain allowed access. Do not audit attempts to send and receive ocsp_server packets. Domain to not audit. Relabel packets to ocsp_server the packet type. Domain allowed access. Send and receive TCP traffic on the openvpn port. Domain allowed access. Send UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to send UDP traffic on the openvpn port. Domain to not audit. Receive UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to receive UDP traffic on the openvpn port. Domain to not audit. Send and receive UDP traffic on the openvpn port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the openvpn port. Domain to not audit. Bind TCP sockets to the openvpn port. Domain allowed access. Bind UDP sockets to the openvpn port. Domain allowed access. Make a TCP connection to the openvpn port. Domain allowed access. Send openvpn_client packets. Domain allowed access. Do not audit attempts to send openvpn_client packets. Domain to not audit. Receive openvpn_client packets. Domain allowed access. Do not audit attempts to receive openvpn_client packets. Domain allowed access. Send and receive openvpn_client packets. Domain allowed access. Do not audit attempts to send and receive openvpn_client packets. Domain to not audit. Relabel packets to openvpn_client the packet type. Domain allowed access. Send openvpn_server packets. Domain allowed access. Do not audit attempts to send openvpn_server packets. Domain to not audit. Receive openvpn_server packets. Domain allowed access. Do not audit attempts to receive openvpn_server packets. Domain allowed access. Send and receive openvpn_server packets. Domain allowed access. Do not audit attempts to send and receive openvpn_server packets. Domain to not audit. Relabel packets to openvpn_server the packet type. Domain allowed access. Send and receive TCP traffic on the pegasus_http port. Domain allowed access. Send UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to send UDP traffic on the pegasus_http port. Domain to not audit. Receive UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pegasus_http port. Domain to not audit. Send and receive UDP traffic on the pegasus_http port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pegasus_http port. Domain to not audit. Bind TCP sockets to the pegasus_http port. Domain allowed access. Bind UDP sockets to the pegasus_http port. Domain allowed access. Make a TCP connection to the pegasus_http port. Domain allowed access. Send pegasus_http_client packets. Domain allowed access. Do not audit attempts to send pegasus_http_client packets. Domain to not audit. Receive pegasus_http_client packets. Domain allowed access. Do not audit attempts to receive pegasus_http_client packets. Domain allowed access. Send and receive pegasus_http_client packets. Domain allowed access. Do not audit attempts to send and receive pegasus_http_client packets. Domain to not audit. Relabel packets to pegasus_http_client the packet type. Domain allowed access. Send pegasus_http_server packets. Domain allowed access. Do not audit attempts to send pegasus_http_server packets. Domain to not audit. Receive pegasus_http_server packets. Domain allowed access. Do not audit attempts to receive pegasus_http_server packets. Domain allowed access. Send and receive pegasus_http_server packets. Domain allowed access. Do not audit attempts to send and receive pegasus_http_server packets. Domain to not audit. Relabel packets to pegasus_http_server the packet type. Domain allowed access. Send and receive TCP traffic on the pegasus_https port. Domain allowed access. Send UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to send UDP traffic on the pegasus_https port. Domain to not audit. Receive UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pegasus_https port. Domain to not audit. Send and receive UDP traffic on the pegasus_https port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pegasus_https port. Domain to not audit. Bind TCP sockets to the pegasus_https port. Domain allowed access. Bind UDP sockets to the pegasus_https port. Domain allowed access. Make a TCP connection to the pegasus_https port. Domain allowed access. Send pegasus_https_client packets. Domain allowed access. Do not audit attempts to send pegasus_https_client packets. Domain to not audit. Receive pegasus_https_client packets. Domain allowed access. Do not audit attempts to receive pegasus_https_client packets. Domain allowed access. Send and receive pegasus_https_client packets. Domain allowed access. Do not audit attempts to send and receive pegasus_https_client packets. Domain to not audit. Relabel packets to pegasus_https_client the packet type. Domain allowed access. Send pegasus_https_server packets. Domain allowed access. Do not audit attempts to send pegasus_https_server packets. Domain to not audit. Receive pegasus_https_server packets. Domain allowed access. Do not audit attempts to receive pegasus_https_server packets. Domain allowed access. Send and receive pegasus_https_server packets. Domain allowed access. Do not audit attempts to send and receive pegasus_https_server packets. Domain to not audit. Relabel packets to pegasus_https_server the packet type. Domain allowed access. Send and receive TCP traffic on the pgpkeyserver port. Domain allowed access. Send UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the pgpkeyserver port. Domain to not audit. Receive UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pgpkeyserver port. Domain to not audit. Send and receive UDP traffic on the pgpkeyserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pgpkeyserver port. Domain to not audit. Bind TCP sockets to the pgpkeyserver port. Domain allowed access. Bind UDP sockets to the pgpkeyserver port. Domain allowed access. Make a TCP connection to the pgpkeyserver port. Domain allowed access. Send pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to send pgpkeyserver_client packets. Domain to not audit. Receive pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to receive pgpkeyserver_client packets. Domain allowed access. Send and receive pgpkeyserver_client packets. Domain allowed access. Do not audit attempts to send and receive pgpkeyserver_client packets. Domain to not audit. Relabel packets to pgpkeyserver_client the packet type. Domain allowed access. Send pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to send pgpkeyserver_server packets. Domain to not audit. Receive pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to receive pgpkeyserver_server packets. Domain allowed access. Send and receive pgpkeyserver_server packets. Domain allowed access. Do not audit attempts to send and receive pgpkeyserver_server packets. Domain to not audit. Relabel packets to pgpkeyserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the pingd port. Domain allowed access. Send UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to send UDP traffic on the pingd port. Domain to not audit. Receive UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pingd port. Domain to not audit. Send and receive UDP traffic on the pingd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pingd port. Domain to not audit. Bind TCP sockets to the pingd port. Domain allowed access. Bind UDP sockets to the pingd port. Domain allowed access. Make a TCP connection to the pingd port. Domain allowed access. Send pingd_client packets. Domain allowed access. Do not audit attempts to send pingd_client packets. Domain to not audit. Receive pingd_client packets. Domain allowed access. Do not audit attempts to receive pingd_client packets. Domain allowed access. Send and receive pingd_client packets. Domain allowed access. Do not audit attempts to send and receive pingd_client packets. Domain to not audit. Relabel packets to pingd_client the packet type. Domain allowed access. Send pingd_server packets. Domain allowed access. Do not audit attempts to send pingd_server packets. Domain to not audit. Receive pingd_server packets. Domain allowed access. Do not audit attempts to receive pingd_server packets. Domain allowed access. Send and receive pingd_server packets. Domain allowed access. Do not audit attempts to send and receive pingd_server packets. Domain to not audit. Relabel packets to pingd_server the packet type. Domain allowed access. Send and receive TCP traffic on the pop port. Domain allowed access. Send UDP traffic on the pop port. Domain allowed access. Do not audit attempts to send UDP traffic on the pop port. Domain to not audit. Receive UDP traffic on the pop port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pop port. Domain to not audit. Send and receive UDP traffic on the pop port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pop port. Domain to not audit. Bind TCP sockets to the pop port. Domain allowed access. Bind UDP sockets to the pop port. Domain allowed access. Make a TCP connection to the pop port. Domain allowed access. Send pop_client packets. Domain allowed access. Do not audit attempts to send pop_client packets. Domain to not audit. Receive pop_client packets. Domain allowed access. Do not audit attempts to receive pop_client packets. Domain allowed access. Send and receive pop_client packets. Domain allowed access. Do not audit attempts to send and receive pop_client packets. Domain to not audit. Relabel packets to pop_client the packet type. Domain allowed access. Send pop_server packets. Domain allowed access. Do not audit attempts to send pop_server packets. Domain to not audit. Receive pop_server packets. Domain allowed access. Do not audit attempts to receive pop_server packets. Domain allowed access. Send and receive pop_server packets. Domain allowed access. Do not audit attempts to send and receive pop_server packets. Domain to not audit. Relabel packets to pop_server the packet type. Domain allowed access. Send and receive TCP traffic on the portmap port. Domain allowed access. Send UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to send UDP traffic on the portmap port. Domain to not audit. Receive UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the portmap port. Domain to not audit. Send and receive UDP traffic on the portmap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the portmap port. Domain to not audit. Bind TCP sockets to the portmap port. Domain allowed access. Bind UDP sockets to the portmap port. Domain allowed access. Make a TCP connection to the portmap port. Domain allowed access. Send portmap_client packets. Domain allowed access. Do not audit attempts to send portmap_client packets. Domain to not audit. Receive portmap_client packets. Domain allowed access. Do not audit attempts to receive portmap_client packets. Domain allowed access. Send and receive portmap_client packets. Domain allowed access. Do not audit attempts to send and receive portmap_client packets. Domain to not audit. Relabel packets to portmap_client the packet type. Domain allowed access. Send portmap_server packets. Domain allowed access. Do not audit attempts to send portmap_server packets. Domain to not audit. Receive portmap_server packets. Domain allowed access. Do not audit attempts to receive portmap_server packets. Domain allowed access. Send and receive portmap_server packets. Domain allowed access. Do not audit attempts to send and receive portmap_server packets. Domain to not audit. Relabel packets to portmap_server the packet type. Domain allowed access. Send and receive TCP traffic on the postfix_policyd port. Domain allowed access. Send UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to send UDP traffic on the postfix_policyd port. Domain to not audit. Receive UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postfix_policyd port. Domain to not audit. Send and receive UDP traffic on the postfix_policyd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postfix_policyd port. Domain to not audit. Bind TCP sockets to the postfix_policyd port. Domain allowed access. Bind UDP sockets to the postfix_policyd port. Domain allowed access. Make a TCP connection to the postfix_policyd port. Domain allowed access. Send postfix_policyd_client packets. Domain allowed access. Do not audit attempts to send postfix_policyd_client packets. Domain to not audit. Receive postfix_policyd_client packets. Domain allowed access. Do not audit attempts to receive postfix_policyd_client packets. Domain allowed access. Send and receive postfix_policyd_client packets. Domain allowed access. Do not audit attempts to send and receive postfix_policyd_client packets. Domain to not audit. Relabel packets to postfix_policyd_client the packet type. Domain allowed access. Send postfix_policyd_server packets. Domain allowed access. Do not audit attempts to send postfix_policyd_server packets. Domain to not audit. Receive postfix_policyd_server packets. Domain allowed access. Do not audit attempts to receive postfix_policyd_server packets. Domain allowed access. Send and receive postfix_policyd_server packets. Domain allowed access. Do not audit attempts to send and receive postfix_policyd_server packets. Domain to not audit. Relabel packets to postfix_policyd_server the packet type. Domain allowed access. Send and receive TCP traffic on the postgresql port. Domain allowed access. Send UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to send UDP traffic on the postgresql port. Domain to not audit. Receive UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postgresql port. Domain to not audit. Send and receive UDP traffic on the postgresql port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postgresql port. Domain to not audit. Bind TCP sockets to the postgresql port. Domain allowed access. Bind UDP sockets to the postgresql port. Domain allowed access. Make a TCP connection to the postgresql port. Domain allowed access. Send postgresql_client packets. Domain allowed access. Do not audit attempts to send postgresql_client packets. Domain to not audit. Receive postgresql_client packets. Domain allowed access. Do not audit attempts to receive postgresql_client packets. Domain allowed access. Send and receive postgresql_client packets. Domain allowed access. Do not audit attempts to send and receive postgresql_client packets. Domain to not audit. Relabel packets to postgresql_client the packet type. Domain allowed access. Send postgresql_server packets. Domain allowed access. Do not audit attempts to send postgresql_server packets. Domain to not audit. Receive postgresql_server packets. Domain allowed access. Do not audit attempts to receive postgresql_server packets. Domain allowed access. Send and receive postgresql_server packets. Domain allowed access. Do not audit attempts to send and receive postgresql_server packets. Domain to not audit. Relabel packets to postgresql_server the packet type. Domain allowed access. Send and receive TCP traffic on the postgrey port. Domain allowed access. Send UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to send UDP traffic on the postgrey port. Domain to not audit. Receive UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to receive UDP traffic on the postgrey port. Domain to not audit. Send and receive UDP traffic on the postgrey port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the postgrey port. Domain to not audit. Bind TCP sockets to the postgrey port. Domain allowed access. Bind UDP sockets to the postgrey port. Domain allowed access. Make a TCP connection to the postgrey port. Domain allowed access. Send postgrey_client packets. Domain allowed access. Do not audit attempts to send postgrey_client packets. Domain to not audit. Receive postgrey_client packets. Domain allowed access. Do not audit attempts to receive postgrey_client packets. Domain allowed access. Send and receive postgrey_client packets. Domain allowed access. Do not audit attempts to send and receive postgrey_client packets. Domain to not audit. Relabel packets to postgrey_client the packet type. Domain allowed access. Send postgrey_server packets. Domain allowed access. Do not audit attempts to send postgrey_server packets. Domain to not audit. Receive postgrey_server packets. Domain allowed access. Do not audit attempts to receive postgrey_server packets. Domain allowed access. Send and receive postgrey_server packets. Domain allowed access. Do not audit attempts to send and receive postgrey_server packets. Domain to not audit. Relabel packets to postgrey_server the packet type. Domain allowed access. Send and receive TCP traffic on the prelude port. Domain allowed access. Send UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to send UDP traffic on the prelude port. Domain to not audit. Receive UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to receive UDP traffic on the prelude port. Domain to not audit. Send and receive UDP traffic on the prelude port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the prelude port. Domain to not audit. Bind TCP sockets to the prelude port. Domain allowed access. Bind UDP sockets to the prelude port. Domain allowed access. Make a TCP connection to the prelude port. Domain allowed access. Send prelude_client packets. Domain allowed access. Do not audit attempts to send prelude_client packets. Domain to not audit. Receive prelude_client packets. Domain allowed access. Do not audit attempts to receive prelude_client packets. Domain allowed access. Send and receive prelude_client packets. Domain allowed access. Do not audit attempts to send and receive prelude_client packets. Domain to not audit. Relabel packets to prelude_client the packet type. Domain allowed access. Send prelude_server packets. Domain allowed access. Do not audit attempts to send prelude_server packets. Domain to not audit. Receive prelude_server packets. Domain allowed access. Do not audit attempts to receive prelude_server packets. Domain allowed access. Send and receive prelude_server packets. Domain allowed access. Do not audit attempts to send and receive prelude_server packets. Domain to not audit. Relabel packets to prelude_server the packet type. Domain allowed access. Send and receive TCP traffic on the presence port. Domain allowed access. Send UDP traffic on the presence port. Domain allowed access. Do not audit attempts to send UDP traffic on the presence port. Domain to not audit. Receive UDP traffic on the presence port. Domain allowed access. Do not audit attempts to receive UDP traffic on the presence port. Domain to not audit. Send and receive UDP traffic on the presence port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the presence port. Domain to not audit. Bind TCP sockets to the presence port. Domain allowed access. Bind UDP sockets to the presence port. Domain allowed access. Make a TCP connection to the presence port. Domain allowed access. Send presence_client packets. Domain allowed access. Do not audit attempts to send presence_client packets. Domain to not audit. Receive presence_client packets. Domain allowed access. Do not audit attempts to receive presence_client packets. Domain allowed access. Send and receive presence_client packets. Domain allowed access. Do not audit attempts to send and receive presence_client packets. Domain to not audit. Relabel packets to presence_client the packet type. Domain allowed access. Send presence_server packets. Domain allowed access. Do not audit attempts to send presence_server packets. Domain to not audit. Receive presence_server packets. Domain allowed access. Do not audit attempts to receive presence_server packets. Domain allowed access. Send and receive presence_server packets. Domain allowed access. Do not audit attempts to send and receive presence_server packets. Domain to not audit. Relabel packets to presence_server the packet type. Domain allowed access. Send and receive TCP traffic on the printer port. Domain allowed access. Send UDP traffic on the printer port. Domain allowed access. Do not audit attempts to send UDP traffic on the printer port. Domain to not audit. Receive UDP traffic on the printer port. Domain allowed access. Do not audit attempts to receive UDP traffic on the printer port. Domain to not audit. Send and receive UDP traffic on the printer port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the printer port. Domain to not audit. Bind TCP sockets to the printer port. Domain allowed access. Bind UDP sockets to the printer port. Domain allowed access. Make a TCP connection to the printer port. Domain allowed access. Send printer_client packets. Domain allowed access. Do not audit attempts to send printer_client packets. Domain to not audit. Receive printer_client packets. Domain allowed access. Do not audit attempts to receive printer_client packets. Domain allowed access. Send and receive printer_client packets. Domain allowed access. Do not audit attempts to send and receive printer_client packets. Domain to not audit. Relabel packets to printer_client the packet type. Domain allowed access. Send printer_server packets. Domain allowed access. Do not audit attempts to send printer_server packets. Domain to not audit. Receive printer_server packets. Domain allowed access. Do not audit attempts to receive printer_server packets. Domain allowed access. Send and receive printer_server packets. Domain allowed access. Do not audit attempts to send and receive printer_server packets. Domain to not audit. Relabel packets to printer_server the packet type. Domain allowed access. Send and receive TCP traffic on the ptal port. Domain allowed access. Send UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to send UDP traffic on the ptal port. Domain to not audit. Receive UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ptal port. Domain to not audit. Send and receive UDP traffic on the ptal port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ptal port. Domain to not audit. Bind TCP sockets to the ptal port. Domain allowed access. Bind UDP sockets to the ptal port. Domain allowed access. Make a TCP connection to the ptal port. Domain allowed access. Send ptal_client packets. Domain allowed access. Do not audit attempts to send ptal_client packets. Domain to not audit. Receive ptal_client packets. Domain allowed access. Do not audit attempts to receive ptal_client packets. Domain allowed access. Send and receive ptal_client packets. Domain allowed access. Do not audit attempts to send and receive ptal_client packets. Domain to not audit. Relabel packets to ptal_client the packet type. Domain allowed access. Send ptal_server packets. Domain allowed access. Do not audit attempts to send ptal_server packets. Domain to not audit. Receive ptal_server packets. Domain allowed access. Do not audit attempts to receive ptal_server packets. Domain allowed access. Send and receive ptal_server packets. Domain allowed access. Do not audit attempts to send and receive ptal_server packets. Domain to not audit. Relabel packets to ptal_server the packet type. Domain allowed access. Send and receive TCP traffic on the pulseaudio port. Domain allowed access. Send UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to send UDP traffic on the pulseaudio port. Domain to not audit. Receive UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pulseaudio port. Domain to not audit. Send and receive UDP traffic on the pulseaudio port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pulseaudio port. Domain to not audit. Bind TCP sockets to the pulseaudio port. Domain allowed access. Bind UDP sockets to the pulseaudio port. Domain allowed access. Make a TCP connection to the pulseaudio port. Domain allowed access. Send pulseaudio_client packets. Domain allowed access. Do not audit attempts to send pulseaudio_client packets. Domain to not audit. Receive pulseaudio_client packets. Domain allowed access. Do not audit attempts to receive pulseaudio_client packets. Domain allowed access. Send and receive pulseaudio_client packets. Domain allowed access. Do not audit attempts to send and receive pulseaudio_client packets. Domain to not audit. Relabel packets to pulseaudio_client the packet type. Domain allowed access. Send pulseaudio_server packets. Domain allowed access. Do not audit attempts to send pulseaudio_server packets. Domain to not audit. Receive pulseaudio_server packets. Domain allowed access. Do not audit attempts to receive pulseaudio_server packets. Domain allowed access. Send and receive pulseaudio_server packets. Domain allowed access. Do not audit attempts to send and receive pulseaudio_server packets. Domain to not audit. Relabel packets to pulseaudio_server the packet type. Domain allowed access. Send and receive TCP traffic on the puppet port. Domain allowed access. Send UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to send UDP traffic on the puppet port. Domain to not audit. Receive UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to receive UDP traffic on the puppet port. Domain to not audit. Send and receive UDP traffic on the puppet port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the puppet port. Domain to not audit. Bind TCP sockets to the puppet port. Domain allowed access. Bind UDP sockets to the puppet port. Domain allowed access. Make a TCP connection to the puppet port. Domain allowed access. Send puppet_client packets. Domain allowed access. Do not audit attempts to send puppet_client packets. Domain to not audit. Receive puppet_client packets. Domain allowed access. Do not audit attempts to receive puppet_client packets. Domain allowed access. Send and receive puppet_client packets. Domain allowed access. Do not audit attempts to send and receive puppet_client packets. Domain to not audit. Relabel packets to puppet_client the packet type. Domain allowed access. Send puppet_server packets. Domain allowed access. Do not audit attempts to send puppet_server packets. Domain to not audit. Receive puppet_server packets. Domain allowed access. Do not audit attempts to receive puppet_server packets. Domain allowed access. Send and receive puppet_server packets. Domain allowed access. Do not audit attempts to send and receive puppet_server packets. Domain to not audit. Relabel packets to puppet_server the packet type. Domain allowed access. Send and receive TCP traffic on the pxe port. Domain allowed access. Send UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to send UDP traffic on the pxe port. Domain to not audit. Receive UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pxe port. Domain to not audit. Send and receive UDP traffic on the pxe port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pxe port. Domain to not audit. Bind TCP sockets to the pxe port. Domain allowed access. Bind UDP sockets to the pxe port. Domain allowed access. Make a TCP connection to the pxe port. Domain allowed access. Send pxe_client packets. Domain allowed access. Do not audit attempts to send pxe_client packets. Domain to not audit. Receive pxe_client packets. Domain allowed access. Do not audit attempts to receive pxe_client packets. Domain allowed access. Send and receive pxe_client packets. Domain allowed access. Do not audit attempts to send and receive pxe_client packets. Domain to not audit. Relabel packets to pxe_client the packet type. Domain allowed access. Send pxe_server packets. Domain allowed access. Do not audit attempts to send pxe_server packets. Domain to not audit. Receive pxe_server packets. Domain allowed access. Do not audit attempts to receive pxe_server packets. Domain allowed access. Send and receive pxe_server packets. Domain allowed access. Do not audit attempts to send and receive pxe_server packets. Domain to not audit. Relabel packets to pxe_server the packet type. Domain allowed access. Send and receive TCP traffic on the pyzor port. Domain allowed access. Send UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to send UDP traffic on the pyzor port. Domain to not audit. Receive UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the pyzor port. Domain to not audit. Send and receive UDP traffic on the pyzor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the pyzor port. Domain to not audit. Bind TCP sockets to the pyzor port. Domain allowed access. Bind UDP sockets to the pyzor port. Domain allowed access. Make a TCP connection to the pyzor port. Domain allowed access. Send pyzor_client packets. Domain allowed access. Do not audit attempts to send pyzor_client packets. Domain to not audit. Receive pyzor_client packets. Domain allowed access. Do not audit attempts to receive pyzor_client packets. Domain allowed access. Send and receive pyzor_client packets. Domain allowed access. Do not audit attempts to send and receive pyzor_client packets. Domain to not audit. Relabel packets to pyzor_client the packet type. Domain allowed access. Send pyzor_server packets. Domain allowed access. Do not audit attempts to send pyzor_server packets. Domain to not audit. Receive pyzor_server packets. Domain allowed access. Do not audit attempts to receive pyzor_server packets. Domain allowed access. Send and receive pyzor_server packets. Domain allowed access. Do not audit attempts to send and receive pyzor_server packets. Domain to not audit. Relabel packets to pyzor_server the packet type. Domain allowed access. Send and receive TCP traffic on the radacct port. Domain allowed access. Send UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to send UDP traffic on the radacct port. Domain to not audit. Receive UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radacct port. Domain to not audit. Send and receive UDP traffic on the radacct port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radacct port. Domain to not audit. Bind TCP sockets to the radacct port. Domain allowed access. Bind UDP sockets to the radacct port. Domain allowed access. Make a TCP connection to the radacct port. Domain allowed access. Send radacct_client packets. Domain allowed access. Do not audit attempts to send radacct_client packets. Domain to not audit. Receive radacct_client packets. Domain allowed access. Do not audit attempts to receive radacct_client packets. Domain allowed access. Send and receive radacct_client packets. Domain allowed access. Do not audit attempts to send and receive radacct_client packets. Domain to not audit. Relabel packets to radacct_client the packet type. Domain allowed access. Send radacct_server packets. Domain allowed access. Do not audit attempts to send radacct_server packets. Domain to not audit. Receive radacct_server packets. Domain allowed access. Do not audit attempts to receive radacct_server packets. Domain allowed access. Send and receive radacct_server packets. Domain allowed access. Do not audit attempts to send and receive radacct_server packets. Domain to not audit. Relabel packets to radacct_server the packet type. Domain allowed access. Send and receive TCP traffic on the radius port. Domain allowed access. Send UDP traffic on the radius port. Domain allowed access. Do not audit attempts to send UDP traffic on the radius port. Domain to not audit. Receive UDP traffic on the radius port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radius port. Domain to not audit. Send and receive UDP traffic on the radius port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radius port. Domain to not audit. Bind TCP sockets to the radius port. Domain allowed access. Bind UDP sockets to the radius port. Domain allowed access. Make a TCP connection to the radius port. Domain allowed access. Send radius_client packets. Domain allowed access. Do not audit attempts to send radius_client packets. Domain to not audit. Receive radius_client packets. Domain allowed access. Do not audit attempts to receive radius_client packets. Domain allowed access. Send and receive radius_client packets. Domain allowed access. Do not audit attempts to send and receive radius_client packets. Domain to not audit. Relabel packets to radius_client the packet type. Domain allowed access. Send radius_server packets. Domain allowed access. Do not audit attempts to send radius_server packets. Domain to not audit. Receive radius_server packets. Domain allowed access. Do not audit attempts to receive radius_server packets. Domain allowed access. Send and receive radius_server packets. Domain allowed access. Do not audit attempts to send and receive radius_server packets. Domain to not audit. Relabel packets to radius_server the packet type. Domain allowed access. Send and receive TCP traffic on the radsec port. Domain allowed access. Send UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to send UDP traffic on the radsec port. Domain to not audit. Receive UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to receive UDP traffic on the radsec port. Domain to not audit. Send and receive UDP traffic on the radsec port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the radsec port. Domain to not audit. Bind TCP sockets to the radsec port. Domain allowed access. Bind UDP sockets to the radsec port. Domain allowed access. Make a TCP connection to the radsec port. Domain allowed access. Send radsec_client packets. Domain allowed access. Do not audit attempts to send radsec_client packets. Domain to not audit. Receive radsec_client packets. Domain allowed access. Do not audit attempts to receive radsec_client packets. Domain allowed access. Send and receive radsec_client packets. Domain allowed access. Do not audit attempts to send and receive radsec_client packets. Domain to not audit. Relabel packets to radsec_client the packet type. Domain allowed access. Send radsec_server packets. Domain allowed access. Do not audit attempts to send radsec_server packets. Domain to not audit. Receive radsec_server packets. Domain allowed access. Do not audit attempts to receive radsec_server packets. Domain allowed access. Send and receive radsec_server packets. Domain allowed access. Do not audit attempts to send and receive radsec_server packets. Domain to not audit. Relabel packets to radsec_server the packet type. Domain allowed access. Send and receive TCP traffic on the razor port. Domain allowed access. Send UDP traffic on the razor port. Domain allowed access. Do not audit attempts to send UDP traffic on the razor port. Domain to not audit. Receive UDP traffic on the razor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the razor port. Domain to not audit. Send and receive UDP traffic on the razor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the razor port. Domain to not audit. Bind TCP sockets to the razor port. Domain allowed access. Bind UDP sockets to the razor port. Domain allowed access. Make a TCP connection to the razor port. Domain allowed access. Send razor_client packets. Domain allowed access. Do not audit attempts to send razor_client packets. Domain to not audit. Receive razor_client packets. Domain allowed access. Do not audit attempts to receive razor_client packets. Domain allowed access. Send and receive razor_client packets. Domain allowed access. Do not audit attempts to send and receive razor_client packets. Domain to not audit. Relabel packets to razor_client the packet type. Domain allowed access. Send razor_server packets. Domain allowed access. Do not audit attempts to send razor_server packets. Domain to not audit. Receive razor_server packets. Domain allowed access. Do not audit attempts to receive razor_server packets. Domain allowed access. Send and receive razor_server packets. Domain allowed access. Do not audit attempts to send and receive razor_server packets. Domain to not audit. Relabel packets to razor_server the packet type. Domain allowed access. Send and receive TCP traffic on the repository port. Domain allowed access. Send UDP traffic on the repository port. Domain allowed access. Do not audit attempts to send UDP traffic on the repository port. Domain to not audit. Receive UDP traffic on the repository port. Domain allowed access. Do not audit attempts to receive UDP traffic on the repository port. Domain to not audit. Send and receive UDP traffic on the repository port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the repository port. Domain to not audit. Bind TCP sockets to the repository port. Domain allowed access. Bind UDP sockets to the repository port. Domain allowed access. Make a TCP connection to the repository port. Domain allowed access. Send repository_client packets. Domain allowed access. Do not audit attempts to send repository_client packets. Domain to not audit. Receive repository_client packets. Domain allowed access. Do not audit attempts to receive repository_client packets. Domain allowed access. Send and receive repository_client packets. Domain allowed access. Do not audit attempts to send and receive repository_client packets. Domain to not audit. Relabel packets to repository_client the packet type. Domain allowed access. Send repository_server packets. Domain allowed access. Do not audit attempts to send repository_server packets. Domain to not audit. Receive repository_server packets. Domain allowed access. Do not audit attempts to receive repository_server packets. Domain allowed access. Send and receive repository_server packets. Domain allowed access. Do not audit attempts to send and receive repository_server packets. Domain to not audit. Relabel packets to repository_server the packet type. Domain allowed access. Send and receive TCP traffic on the ricci port. Domain allowed access. Send UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to send UDP traffic on the ricci port. Domain to not audit. Receive UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ricci port. Domain to not audit. Send and receive UDP traffic on the ricci port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ricci port. Domain to not audit. Bind TCP sockets to the ricci port. Domain allowed access. Bind UDP sockets to the ricci port. Domain allowed access. Make a TCP connection to the ricci port. Domain allowed access. Send ricci_client packets. Domain allowed access. Do not audit attempts to send ricci_client packets. Domain to not audit. Receive ricci_client packets. Domain allowed access. Do not audit attempts to receive ricci_client packets. Domain allowed access. Send and receive ricci_client packets. Domain allowed access. Do not audit attempts to send and receive ricci_client packets. Domain to not audit. Relabel packets to ricci_client the packet type. Domain allowed access. Send ricci_server packets. Domain allowed access. Do not audit attempts to send ricci_server packets. Domain to not audit. Receive ricci_server packets. Domain allowed access. Do not audit attempts to receive ricci_server packets. Domain allowed access. Send and receive ricci_server packets. Domain allowed access. Do not audit attempts to send and receive ricci_server packets. Domain to not audit. Relabel packets to ricci_server the packet type. Domain allowed access. Send and receive TCP traffic on the ricci_modcluster port. Domain allowed access. Send UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to send UDP traffic on the ricci_modcluster port. Domain to not audit. Receive UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ricci_modcluster port. Domain to not audit. Send and receive UDP traffic on the ricci_modcluster port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ricci_modcluster port. Domain to not audit. Bind TCP sockets to the ricci_modcluster port. Domain allowed access. Bind UDP sockets to the ricci_modcluster port. Domain allowed access. Make a TCP connection to the ricci_modcluster port. Domain allowed access. Send ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to send ricci_modcluster_client packets. Domain to not audit. Receive ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to receive ricci_modcluster_client packets. Domain allowed access. Send and receive ricci_modcluster_client packets. Domain allowed access. Do not audit attempts to send and receive ricci_modcluster_client packets. Domain to not audit. Relabel packets to ricci_modcluster_client the packet type. Domain allowed access. Send ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to send ricci_modcluster_server packets. Domain to not audit. Receive ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to receive ricci_modcluster_server packets. Domain allowed access. Send and receive ricci_modcluster_server packets. Domain allowed access. Do not audit attempts to send and receive ricci_modcluster_server packets. Domain to not audit. Relabel packets to ricci_modcluster_server the packet type. Domain allowed access. Send and receive TCP traffic on the rlogind port. Domain allowed access. Send UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to send UDP traffic on the rlogind port. Domain to not audit. Receive UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rlogind port. Domain to not audit. Send and receive UDP traffic on the rlogind port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rlogind port. Domain to not audit. Bind TCP sockets to the rlogind port. Domain allowed access. Bind UDP sockets to the rlogind port. Domain allowed access. Make a TCP connection to the rlogind port. Domain allowed access. Send rlogind_client packets. Domain allowed access. Do not audit attempts to send rlogind_client packets. Domain to not audit. Receive rlogind_client packets. Domain allowed access. Do not audit attempts to receive rlogind_client packets. Domain allowed access. Send and receive rlogind_client packets. Domain allowed access. Do not audit attempts to send and receive rlogind_client packets. Domain to not audit. Relabel packets to rlogind_client the packet type. Domain allowed access. Send rlogind_server packets. Domain allowed access. Do not audit attempts to send rlogind_server packets. Domain to not audit. Receive rlogind_server packets. Domain allowed access. Do not audit attempts to receive rlogind_server packets. Domain allowed access. Send and receive rlogind_server packets. Domain allowed access. Do not audit attempts to send and receive rlogind_server packets. Domain to not audit. Relabel packets to rlogind_server the packet type. Domain allowed access. Send and receive TCP traffic on the rndc port. Domain allowed access. Send UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to send UDP traffic on the rndc port. Domain to not audit. Receive UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rndc port. Domain to not audit. Send and receive UDP traffic on the rndc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rndc port. Domain to not audit. Bind TCP sockets to the rndc port. Domain allowed access. Bind UDP sockets to the rndc port. Domain allowed access. Make a TCP connection to the rndc port. Domain allowed access. Send rndc_client packets. Domain allowed access. Do not audit attempts to send rndc_client packets. Domain to not audit. Receive rndc_client packets. Domain allowed access. Do not audit attempts to receive rndc_client packets. Domain allowed access. Send and receive rndc_client packets. Domain allowed access. Do not audit attempts to send and receive rndc_client packets. Domain to not audit. Relabel packets to rndc_client the packet type. Domain allowed access. Send rndc_server packets. Domain allowed access. Do not audit attempts to send rndc_server packets. Domain to not audit. Receive rndc_server packets. Domain allowed access. Do not audit attempts to receive rndc_server packets. Domain allowed access. Send and receive rndc_server packets. Domain allowed access. Do not audit attempts to send and receive rndc_server packets. Domain to not audit. Relabel packets to rndc_server the packet type. Domain allowed access. Send and receive TCP traffic on the router port. Domain allowed access. Send UDP traffic on the router port. Domain allowed access. Do not audit attempts to send UDP traffic on the router port. Domain to not audit. Receive UDP traffic on the router port. Domain allowed access. Do not audit attempts to receive UDP traffic on the router port. Domain to not audit. Send and receive UDP traffic on the router port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the router port. Domain to not audit. Bind TCP sockets to the router port. Domain allowed access. Bind UDP sockets to the router port. Domain allowed access. Make a TCP connection to the router port. Domain allowed access. Send router_client packets. Domain allowed access. Do not audit attempts to send router_client packets. Domain to not audit. Receive router_client packets. Domain allowed access. Do not audit attempts to receive router_client packets. Domain allowed access. Send and receive router_client packets. Domain allowed access. Do not audit attempts to send and receive router_client packets. Domain to not audit. Relabel packets to router_client the packet type. Domain allowed access. Send router_server packets. Domain allowed access. Do not audit attempts to send router_server packets. Domain to not audit. Receive router_server packets. Domain allowed access. Do not audit attempts to receive router_server packets. Domain allowed access. Send and receive router_server packets. Domain allowed access. Do not audit attempts to send and receive router_server packets. Domain to not audit. Relabel packets to router_server the packet type. Domain allowed access. Send and receive TCP traffic on the rsh port. Domain allowed access. Send UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to send UDP traffic on the rsh port. Domain to not audit. Receive UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rsh port. Domain to not audit. Send and receive UDP traffic on the rsh port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rsh port. Domain to not audit. Bind TCP sockets to the rsh port. Domain allowed access. Bind UDP sockets to the rsh port. Domain allowed access. Make a TCP connection to the rsh port. Domain allowed access. Send rsh_client packets. Domain allowed access. Do not audit attempts to send rsh_client packets. Domain to not audit. Receive rsh_client packets. Domain allowed access. Do not audit attempts to receive rsh_client packets. Domain allowed access. Send and receive rsh_client packets. Domain allowed access. Do not audit attempts to send and receive rsh_client packets. Domain to not audit. Relabel packets to rsh_client the packet type. Domain allowed access. Send rsh_server packets. Domain allowed access. Do not audit attempts to send rsh_server packets. Domain to not audit. Receive rsh_server packets. Domain allowed access. Do not audit attempts to receive rsh_server packets. Domain allowed access. Send and receive rsh_server packets. Domain allowed access. Do not audit attempts to send and receive rsh_server packets. Domain to not audit. Relabel packets to rsh_server the packet type. Domain allowed access. Send and receive TCP traffic on the rsync port. Domain allowed access. Send UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to send UDP traffic on the rsync port. Domain to not audit. Receive UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rsync port. Domain to not audit. Send and receive UDP traffic on the rsync port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rsync port. Domain to not audit. Bind TCP sockets to the rsync port. Domain allowed access. Bind UDP sockets to the rsync port. Domain allowed access. Make a TCP connection to the rsync port. Domain allowed access. Send rsync_client packets. Domain allowed access. Do not audit attempts to send rsync_client packets. Domain to not audit. Receive rsync_client packets. Domain allowed access. Do not audit attempts to receive rsync_client packets. Domain allowed access. Send and receive rsync_client packets. Domain allowed access. Do not audit attempts to send and receive rsync_client packets. Domain to not audit. Relabel packets to rsync_client the packet type. Domain allowed access. Send rsync_server packets. Domain allowed access. Do not audit attempts to send rsync_server packets. Domain to not audit. Receive rsync_server packets. Domain allowed access. Do not audit attempts to receive rsync_server packets. Domain allowed access. Send and receive rsync_server packets. Domain allowed access. Do not audit attempts to send and receive rsync_server packets. Domain to not audit. Relabel packets to rsync_server the packet type. Domain allowed access. Send and receive TCP traffic on the rwho port. Domain allowed access. Send UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to send UDP traffic on the rwho port. Domain to not audit. Receive UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to receive UDP traffic on the rwho port. Domain to not audit. Send and receive UDP traffic on the rwho port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the rwho port. Domain to not audit. Bind TCP sockets to the rwho port. Domain allowed access. Bind UDP sockets to the rwho port. Domain allowed access. Make a TCP connection to the rwho port. Domain allowed access. Send rwho_client packets. Domain allowed access. Do not audit attempts to send rwho_client packets. Domain to not audit. Receive rwho_client packets. Domain allowed access. Do not audit attempts to receive rwho_client packets. Domain allowed access. Send and receive rwho_client packets. Domain allowed access. Do not audit attempts to send and receive rwho_client packets. Domain to not audit. Relabel packets to rwho_client the packet type. Domain allowed access. Send rwho_server packets. Domain allowed access. Do not audit attempts to send rwho_server packets. Domain to not audit. Receive rwho_server packets. Domain allowed access. Do not audit attempts to receive rwho_server packets. Domain allowed access. Send and receive rwho_server packets. Domain allowed access. Do not audit attempts to send and receive rwho_server packets. Domain to not audit. Relabel packets to rwho_server the packet type. Domain allowed access. Send and receive TCP traffic on the sap port. Domain allowed access. Send UDP traffic on the sap port. Domain allowed access. Do not audit attempts to send UDP traffic on the sap port. Domain to not audit. Receive UDP traffic on the sap port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sap port. Domain to not audit. Send and receive UDP traffic on the sap port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sap port. Domain to not audit. Bind TCP sockets to the sap port. Domain allowed access. Bind UDP sockets to the sap port. Domain allowed access. Make a TCP connection to the sap port. Domain allowed access. Send sap_client packets. Domain allowed access. Do not audit attempts to send sap_client packets. Domain to not audit. Receive sap_client packets. Domain allowed access. Do not audit attempts to receive sap_client packets. Domain allowed access. Send and receive sap_client packets. Domain allowed access. Do not audit attempts to send and receive sap_client packets. Domain to not audit. Relabel packets to sap_client the packet type. Domain allowed access. Send sap_server packets. Domain allowed access. Do not audit attempts to send sap_server packets. Domain to not audit. Receive sap_server packets. Domain allowed access. Do not audit attempts to receive sap_server packets. Domain allowed access. Send and receive sap_server packets. Domain allowed access. Do not audit attempts to send and receive sap_server packets. Domain to not audit. Relabel packets to sap_server the packet type. Domain allowed access. Send and receive TCP traffic on the sieve port. Domain allowed access. Send UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to send UDP traffic on the sieve port. Domain to not audit. Receive UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sieve port. Domain to not audit. Send and receive UDP traffic on the sieve port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sieve port. Domain to not audit. Bind TCP sockets to the sieve port. Domain allowed access. Bind UDP sockets to the sieve port. Domain allowed access. Make a TCP connection to the sieve port. Domain allowed access. Send sieve_client packets. Domain allowed access. Do not audit attempts to send sieve_client packets. Domain to not audit. Receive sieve_client packets. Domain allowed access. Do not audit attempts to receive sieve_client packets. Domain allowed access. Send and receive sieve_client packets. Domain allowed access. Do not audit attempts to send and receive sieve_client packets. Domain to not audit. Relabel packets to sieve_client the packet type. Domain allowed access. Send sieve_server packets. Domain allowed access. Do not audit attempts to send sieve_server packets. Domain to not audit. Receive sieve_server packets. Domain allowed access. Do not audit attempts to receive sieve_server packets. Domain allowed access. Send and receive sieve_server packets. Domain allowed access. Do not audit attempts to send and receive sieve_server packets. Domain to not audit. Relabel packets to sieve_server the packet type. Domain allowed access. Send and receive TCP traffic on the sip port. Domain allowed access. Send UDP traffic on the sip port. Domain allowed access. Do not audit attempts to send UDP traffic on the sip port. Domain to not audit. Receive UDP traffic on the sip port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sip port. Domain to not audit. Send and receive UDP traffic on the sip port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sip port. Domain to not audit. Bind TCP sockets to the sip port. Domain allowed access. Bind UDP sockets to the sip port. Domain allowed access. Make a TCP connection to the sip port. Domain allowed access. Send sip_client packets. Domain allowed access. Do not audit attempts to send sip_client packets. Domain to not audit. Receive sip_client packets. Domain allowed access. Do not audit attempts to receive sip_client packets. Domain allowed access. Send and receive sip_client packets. Domain allowed access. Do not audit attempts to send and receive sip_client packets. Domain to not audit. Relabel packets to sip_client the packet type. Domain allowed access. Send sip_server packets. Domain allowed access. Do not audit attempts to send sip_server packets. Domain to not audit. Receive sip_server packets. Domain allowed access. Do not audit attempts to receive sip_server packets. Domain allowed access. Send and receive sip_server packets. Domain allowed access. Do not audit attempts to send and receive sip_server packets. Domain to not audit. Relabel packets to sip_server the packet type. Domain allowed access. Send and receive TCP traffic on the sixxsconfig port. Domain allowed access. Send UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to send UDP traffic on the sixxsconfig port. Domain to not audit. Receive UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to receive UDP traffic on the sixxsconfig port. Domain to not audit. Send and receive UDP traffic on the sixxsconfig port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the sixxsconfig port. Domain to not audit. Bind TCP sockets to the sixxsconfig port. Domain allowed access. Bind UDP sockets to the sixxsconfig port. Domain allowed access. Make a TCP connection to the sixxsconfig port. Domain allowed access. Send sixxsconfig_client packets. Domain allowed access. Do not audit attempts to send sixxsconfig_client packets. Domain to not audit. Receive sixxsconfig_client packets. Domain allowed access. Do not audit attempts to receive sixxsconfig_client packets. Domain allowed access. Send and receive sixxsconfig_client packets. Domain allowed access. Do not audit attempts to send and receive sixxsconfig_client packets. Domain to not audit. Relabel packets to sixxsconfig_client the packet type. Domain allowed access. Send sixxsconfig_server packets. Domain allowed access. Do not audit attempts to send sixxsconfig_server packets. Domain to not audit. Receive sixxsconfig_server packets. Domain allowed access. Do not audit attempts to receive sixxsconfig_server packets. Domain allowed access. Send and receive sixxsconfig_server packets. Domain allowed access. Do not audit attempts to send and receive sixxsconfig_server packets. Domain to not audit. Relabel packets to sixxsconfig_server the packet type. Domain allowed access. Send and receive TCP traffic on the smbd port. Domain allowed access. Send UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to send UDP traffic on the smbd port. Domain to not audit. Receive UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the smbd port. Domain to not audit. Send and receive UDP traffic on the smbd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the smbd port. Domain to not audit. Bind TCP sockets to the smbd port. Domain allowed access. Bind UDP sockets to the smbd port. Domain allowed access. Make a TCP connection to the smbd port. Domain allowed access. Send smbd_client packets. Domain allowed access. Do not audit attempts to send smbd_client packets. Domain to not audit. Receive smbd_client packets. Domain allowed access. Do not audit attempts to receive smbd_client packets. Domain allowed access. Send and receive smbd_client packets. Domain allowed access. Do not audit attempts to send and receive smbd_client packets. Domain to not audit. Relabel packets to smbd_client the packet type. Domain allowed access. Send smbd_server packets. Domain allowed access. Do not audit attempts to send smbd_server packets. Domain to not audit. Receive smbd_server packets. Domain allowed access. Do not audit attempts to receive smbd_server packets. Domain allowed access. Send and receive smbd_server packets. Domain allowed access. Do not audit attempts to send and receive smbd_server packets. Domain to not audit. Relabel packets to smbd_server the packet type. Domain allowed access. Send and receive TCP traffic on the smtp port. Domain allowed access. Send UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to send UDP traffic on the smtp port. Domain to not audit. Receive UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the smtp port. Domain to not audit. Send and receive UDP traffic on the smtp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the smtp port. Domain to not audit. Bind TCP sockets to the smtp port. Domain allowed access. Bind UDP sockets to the smtp port. Domain allowed access. Make a TCP connection to the smtp port. Domain allowed access. Send smtp_client packets. Domain allowed access. Do not audit attempts to send smtp_client packets. Domain to not audit. Receive smtp_client packets. Domain allowed access. Do not audit attempts to receive smtp_client packets. Domain allowed access. Send and receive smtp_client packets. Domain allowed access. Do not audit attempts to send and receive smtp_client packets. Domain to not audit. Relabel packets to smtp_client the packet type. Domain allowed access. Send smtp_server packets. Domain allowed access. Do not audit attempts to send smtp_server packets. Domain to not audit. Receive smtp_server packets. Domain allowed access. Do not audit attempts to receive smtp_server packets. Domain allowed access. Send and receive smtp_server packets. Domain allowed access. Do not audit attempts to send and receive smtp_server packets. Domain to not audit. Relabel packets to smtp_server the packet type. Domain allowed access. Send and receive TCP traffic on the snmp port. Domain allowed access. Send UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to send UDP traffic on the snmp port. Domain to not audit. Receive UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the snmp port. Domain to not audit. Send and receive UDP traffic on the snmp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the snmp port. Domain to not audit. Bind TCP sockets to the snmp port. Domain allowed access. Bind UDP sockets to the snmp port. Domain allowed access. Make a TCP connection to the snmp port. Domain allowed access. Send snmp_client packets. Domain allowed access. Do not audit attempts to send snmp_client packets. Domain to not audit. Receive snmp_client packets. Domain allowed access. Do not audit attempts to receive snmp_client packets. Domain allowed access. Send and receive snmp_client packets. Domain allowed access. Do not audit attempts to send and receive snmp_client packets. Domain to not audit. Relabel packets to snmp_client the packet type. Domain allowed access. Send snmp_server packets. Domain allowed access. Do not audit attempts to send snmp_server packets. Domain to not audit. Receive snmp_server packets. Domain allowed access. Do not audit attempts to receive snmp_server packets. Domain allowed access. Send and receive snmp_server packets. Domain allowed access. Do not audit attempts to send and receive snmp_server packets. Domain to not audit. Relabel packets to snmp_server the packet type. Domain allowed access. Send and receive TCP traffic on the socks port. Domain allowed access. Send UDP traffic on the socks port. Domain allowed access. Do not audit attempts to send UDP traffic on the socks port. Domain to not audit. Receive UDP traffic on the socks port. Domain allowed access. Do not audit attempts to receive UDP traffic on the socks port. Domain to not audit. Send and receive UDP traffic on the socks port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the socks port. Domain to not audit. Bind TCP sockets to the socks port. Domain allowed access. Bind UDP sockets to the socks port. Domain allowed access. Make a TCP connection to the socks port. Domain allowed access. Send socks_client packets. Domain allowed access. Do not audit attempts to send socks_client packets. Domain to not audit. Receive socks_client packets. Domain allowed access. Do not audit attempts to receive socks_client packets. Domain allowed access. Send and receive socks_client packets. Domain allowed access. Do not audit attempts to send and receive socks_client packets. Domain to not audit. Relabel packets to socks_client the packet type. Domain allowed access. Send socks_server packets. Domain allowed access. Do not audit attempts to send socks_server packets. Domain to not audit. Receive socks_server packets. Domain allowed access. Do not audit attempts to receive socks_server packets. Domain allowed access. Send and receive socks_server packets. Domain allowed access. Do not audit attempts to send and receive socks_server packets. Domain to not audit. Relabel packets to socks_server the packet type. Domain allowed access. Send and receive TCP traffic on the soundd port. Domain allowed access. Send UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to send UDP traffic on the soundd port. Domain to not audit. Receive UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the soundd port. Domain to not audit. Send and receive UDP traffic on the soundd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the soundd port. Domain to not audit. Bind TCP sockets to the soundd port. Domain allowed access. Bind UDP sockets to the soundd port. Domain allowed access. Make a TCP connection to the soundd port. Domain allowed access. Send soundd_client packets. Domain allowed access. Do not audit attempts to send soundd_client packets. Domain to not audit. Receive soundd_client packets. Domain allowed access. Do not audit attempts to receive soundd_client packets. Domain allowed access. Send and receive soundd_client packets. Domain allowed access. Do not audit attempts to send and receive soundd_client packets. Domain to not audit. Relabel packets to soundd_client the packet type. Domain allowed access. Send soundd_server packets. Domain allowed access. Do not audit attempts to send soundd_server packets. Domain to not audit. Receive soundd_server packets. Domain allowed access. Do not audit attempts to receive soundd_server packets. Domain allowed access. Send and receive soundd_server packets. Domain allowed access. Do not audit attempts to send and receive soundd_server packets. Domain to not audit. Relabel packets to soundd_server the packet type. Domain allowed access. Send and receive TCP traffic on the spamd port. Domain allowed access. Send UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to send UDP traffic on the spamd port. Domain to not audit. Receive UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the spamd port. Domain to not audit. Send and receive UDP traffic on the spamd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the spamd port. Domain to not audit. Bind TCP sockets to the spamd port. Domain allowed access. Bind UDP sockets to the spamd port. Domain allowed access. Make a TCP connection to the spamd port. Domain allowed access. Send spamd_client packets. Domain allowed access. Do not audit attempts to send spamd_client packets. Domain to not audit. Receive spamd_client packets. Domain allowed access. Do not audit attempts to receive spamd_client packets. Domain allowed access. Send and receive spamd_client packets. Domain allowed access. Do not audit attempts to send and receive spamd_client packets. Domain to not audit. Relabel packets to spamd_client the packet type. Domain allowed access. Send spamd_server packets. Domain allowed access. Do not audit attempts to send spamd_server packets. Domain to not audit. Receive spamd_server packets. Domain allowed access. Do not audit attempts to receive spamd_server packets. Domain allowed access. Send and receive spamd_server packets. Domain allowed access. Do not audit attempts to send and receive spamd_server packets. Domain to not audit. Relabel packets to spamd_server the packet type. Domain allowed access. Send and receive TCP traffic on the speech port. Domain allowed access. Send UDP traffic on the speech port. Domain allowed access. Do not audit attempts to send UDP traffic on the speech port. Domain to not audit. Receive UDP traffic on the speech port. Domain allowed access. Do not audit attempts to receive UDP traffic on the speech port. Domain to not audit. Send and receive UDP traffic on the speech port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the speech port. Domain to not audit. Bind TCP sockets to the speech port. Domain allowed access. Bind UDP sockets to the speech port. Domain allowed access. Make a TCP connection to the speech port. Domain allowed access. Send speech_client packets. Domain allowed access. Do not audit attempts to send speech_client packets. Domain to not audit. Receive speech_client packets. Domain allowed access. Do not audit attempts to receive speech_client packets. Domain allowed access. Send and receive speech_client packets. Domain allowed access. Do not audit attempts to send and receive speech_client packets. Domain to not audit. Relabel packets to speech_client the packet type. Domain allowed access. Send speech_server packets. Domain allowed access. Do not audit attempts to send speech_server packets. Domain to not audit. Receive speech_server packets. Domain allowed access. Do not audit attempts to receive speech_server packets. Domain allowed access. Send and receive speech_server packets. Domain allowed access. Do not audit attempts to send and receive speech_server packets. Domain to not audit. Relabel packets to speech_server the packet type. Domain allowed access. Send and receive TCP traffic on the squid port. Domain allowed access. Send UDP traffic on the squid port. Domain allowed access. Do not audit attempts to send UDP traffic on the squid port. Domain to not audit. Receive UDP traffic on the squid port. Domain allowed access. Do not audit attempts to receive UDP traffic on the squid port. Domain to not audit. Send and receive UDP traffic on the squid port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the squid port. Domain to not audit. Bind TCP sockets to the squid port. Domain allowed access. Bind UDP sockets to the squid port. Domain allowed access. Make a TCP connection to the squid port. Domain allowed access. Send squid_client packets. Domain allowed access. Do not audit attempts to send squid_client packets. Domain to not audit. Receive squid_client packets. Domain allowed access. Do not audit attempts to receive squid_client packets. Domain allowed access. Send and receive squid_client packets. Domain allowed access. Do not audit attempts to send and receive squid_client packets. Domain to not audit. Relabel packets to squid_client the packet type. Domain allowed access. Send squid_server packets. Domain allowed access. Do not audit attempts to send squid_server packets. Domain to not audit. Receive squid_server packets. Domain allowed access. Do not audit attempts to receive squid_server packets. Domain allowed access. Send and receive squid_server packets. Domain allowed access. Do not audit attempts to send and receive squid_server packets. Domain to not audit. Relabel packets to squid_server the packet type. Domain allowed access. Send and receive TCP traffic on the ssh port. Domain allowed access. Send UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to send UDP traffic on the ssh port. Domain to not audit. Receive UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ssh port. Domain to not audit. Send and receive UDP traffic on the ssh port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ssh port. Domain to not audit. Bind TCP sockets to the ssh port. Domain allowed access. Bind UDP sockets to the ssh port. Domain allowed access. Make a TCP connection to the ssh port. Domain allowed access. Send ssh_client packets. Domain allowed access. Do not audit attempts to send ssh_client packets. Domain to not audit. Receive ssh_client packets. Domain allowed access. Do not audit attempts to receive ssh_client packets. Domain allowed access. Send and receive ssh_client packets. Domain allowed access. Do not audit attempts to send and receive ssh_client packets. Domain to not audit. Relabel packets to ssh_client the packet type. Domain allowed access. Send ssh_server packets. Domain allowed access. Do not audit attempts to send ssh_server packets. Domain to not audit. Receive ssh_server packets. Domain allowed access. Do not audit attempts to receive ssh_server packets. Domain allowed access. Send and receive ssh_server packets. Domain allowed access. Do not audit attempts to send and receive ssh_server packets. Domain to not audit. Relabel packets to ssh_server the packet type. Domain allowed access. Send and receive TCP traffic on the stunnel port. Domain allowed access. Send UDP traffic on the stunnel port. Domain allowed access. Do not audit attempts to send UDP traffic on the stunnel port. Domain to not audit. Receive UDP traffic on the stunnel port. Domain allowed access. Do not audit attempts to receive UDP traffic on the stunnel port. Domain to not audit. Send and receive UDP traffic on the stunnel port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the stunnel port. Domain to not audit. Bind TCP sockets to the stunnel port. Domain allowed access. Bind UDP sockets to the stunnel port. Domain allowed access. Make a TCP connection to the stunnel port. Domain allowed access. Send stunnel_client packets. Domain allowed access. Do not audit attempts to send stunnel_client packets. Domain to not audit. Receive stunnel_client packets. Domain allowed access. Do not audit attempts to receive stunnel_client packets. Domain allowed access. Send and receive stunnel_client packets. Domain allowed access. Do not audit attempts to send and receive stunnel_client packets. Domain to not audit. Relabel packets to stunnel_client the packet type. Domain allowed access. Send stunnel_server packets. Domain allowed access. Do not audit attempts to send stunnel_server packets. Domain to not audit. Receive stunnel_server packets. Domain allowed access. Do not audit attempts to receive stunnel_server packets. Domain allowed access. Send and receive stunnel_server packets. Domain allowed access. Do not audit attempts to send and receive stunnel_server packets. Domain to not audit. Relabel packets to stunnel_server the packet type. Domain allowed access. Send and receive TCP traffic on the swat port. Domain allowed access. Send UDP traffic on the swat port. Domain allowed access. Do not audit attempts to send UDP traffic on the swat port. Domain to not audit. Receive UDP traffic on the swat port. Domain allowed access. Do not audit attempts to receive UDP traffic on the swat port. Domain to not audit. Send and receive UDP traffic on the swat port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the swat port. Domain to not audit. Bind TCP sockets to the swat port. Domain allowed access. Bind UDP sockets to the swat port. Domain allowed access. Make a TCP connection to the swat port. Domain allowed access. Send swat_client packets. Domain allowed access. Do not audit attempts to send swat_client packets. Domain to not audit. Receive swat_client packets. Domain allowed access. Do not audit attempts to receive swat_client packets. Domain allowed access. Send and receive swat_client packets. Domain allowed access. Do not audit attempts to send and receive swat_client packets. Domain to not audit. Relabel packets to swat_client the packet type. Domain allowed access. Send swat_server packets. Domain allowed access. Do not audit attempts to send swat_server packets. Domain to not audit. Receive swat_server packets. Domain allowed access. Do not audit attempts to receive swat_server packets. Domain allowed access. Send and receive swat_server packets. Domain allowed access. Do not audit attempts to send and receive swat_server packets. Domain to not audit. Relabel packets to swat_server the packet type. Domain allowed access. Send and receive TCP traffic on the syslogd port. Domain allowed access. Send UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to send UDP traffic on the syslogd port. Domain to not audit. Receive UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the syslogd port. Domain to not audit. Send and receive UDP traffic on the syslogd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the syslogd port. Domain to not audit. Bind TCP sockets to the syslogd port. Domain allowed access. Bind UDP sockets to the syslogd port. Domain allowed access. Make a TCP connection to the syslogd port. Domain allowed access. Send syslogd_client packets. Domain allowed access. Do not audit attempts to send syslogd_client packets. Domain to not audit. Receive syslogd_client packets. Domain allowed access. Do not audit attempts to receive syslogd_client packets. Domain allowed access. Send and receive syslogd_client packets. Domain allowed access. Do not audit attempts to send and receive syslogd_client packets. Domain to not audit. Relabel packets to syslogd_client the packet type. Domain allowed access. Send syslogd_server packets. Domain allowed access. Do not audit attempts to send syslogd_server packets. Domain to not audit. Receive syslogd_server packets. Domain allowed access. Do not audit attempts to receive syslogd_server packets. Domain allowed access. Send and receive syslogd_server packets. Domain allowed access. Do not audit attempts to send and receive syslogd_server packets. Domain to not audit. Relabel packets to syslogd_server the packet type. Domain allowed access. Send and receive TCP traffic on the tcs port. Domain allowed access. Send UDP traffic on the tcs port. Domain allowed access. Do not audit attempts to send UDP traffic on the tcs port. Domain to not audit. Receive UDP traffic on the tcs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tcs port. Domain to not audit. Send and receive UDP traffic on the tcs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tcs port. Domain to not audit. Bind TCP sockets to the tcs port. Domain allowed access. Bind UDP sockets to the tcs port. Domain allowed access. Make a TCP connection to the tcs port. Domain allowed access. Send tcs_client packets. Domain allowed access. Do not audit attempts to send tcs_client packets. Domain to not audit. Receive tcs_client packets. Domain allowed access. Do not audit attempts to receive tcs_client packets. Domain allowed access. Send and receive tcs_client packets. Domain allowed access. Do not audit attempts to send and receive tcs_client packets. Domain to not audit. Relabel packets to tcs_client the packet type. Domain allowed access. Send tcs_server packets. Domain allowed access. Do not audit attempts to send tcs_server packets. Domain to not audit. Receive tcs_server packets. Domain allowed access. Do not audit attempts to receive tcs_server packets. Domain allowed access. Send and receive tcs_server packets. Domain allowed access. Do not audit attempts to send and receive tcs_server packets. Domain to not audit. Relabel packets to tcs_server the packet type. Domain allowed access. Send and receive TCP traffic on the telnetd port. Domain allowed access. Send UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to send UDP traffic on the telnetd port. Domain to not audit. Receive UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the telnetd port. Domain to not audit. Send and receive UDP traffic on the telnetd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the telnetd port. Domain to not audit. Bind TCP sockets to the telnetd port. Domain allowed access. Bind UDP sockets to the telnetd port. Domain allowed access. Make a TCP connection to the telnetd port. Domain allowed access. Send telnetd_client packets. Domain allowed access. Do not audit attempts to send telnetd_client packets. Domain to not audit. Receive telnetd_client packets. Domain allowed access. Do not audit attempts to receive telnetd_client packets. Domain allowed access. Send and receive telnetd_client packets. Domain allowed access. Do not audit attempts to send and receive telnetd_client packets. Domain to not audit. Relabel packets to telnetd_client the packet type. Domain allowed access. Send telnetd_server packets. Domain allowed access. Do not audit attempts to send telnetd_server packets. Domain to not audit. Receive telnetd_server packets. Domain allowed access. Do not audit attempts to receive telnetd_server packets. Domain allowed access. Send and receive telnetd_server packets. Domain allowed access. Do not audit attempts to send and receive telnetd_server packets. Domain to not audit. Relabel packets to telnetd_server the packet type. Domain allowed access. Send and receive TCP traffic on the tftp port. Domain allowed access. Send UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to send UDP traffic on the tftp port. Domain to not audit. Receive UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tftp port. Domain to not audit. Send and receive UDP traffic on the tftp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tftp port. Domain to not audit. Bind TCP sockets to the tftp port. Domain allowed access. Bind UDP sockets to the tftp port. Domain allowed access. Make a TCP connection to the tftp port. Domain allowed access. Send tftp_client packets. Domain allowed access. Do not audit attempts to send tftp_client packets. Domain to not audit. Receive tftp_client packets. Domain allowed access. Do not audit attempts to receive tftp_client packets. Domain allowed access. Send and receive tftp_client packets. Domain allowed access. Do not audit attempts to send and receive tftp_client packets. Domain to not audit. Relabel packets to tftp_client the packet type. Domain allowed access. Send tftp_server packets. Domain allowed access. Do not audit attempts to send tftp_server packets. Domain to not audit. Receive tftp_server packets. Domain allowed access. Do not audit attempts to receive tftp_server packets. Domain allowed access. Send and receive tftp_server packets. Domain allowed access. Do not audit attempts to send and receive tftp_server packets. Domain to not audit. Relabel packets to tftp_server the packet type. Domain allowed access. Send and receive TCP traffic on the tor port. Domain allowed access. Send UDP traffic on the tor port. Domain allowed access. Do not audit attempts to send UDP traffic on the tor port. Domain to not audit. Receive UDP traffic on the tor port. Domain allowed access. Do not audit attempts to receive UDP traffic on the tor port. Domain to not audit. Send and receive UDP traffic on the tor port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the tor port. Domain to not audit. Bind TCP sockets to the tor port. Domain allowed access. Bind UDP sockets to the tor port. Domain allowed access. Make a TCP connection to the tor port. Domain allowed access. Send tor_client packets. Domain allowed access. Do not audit attempts to send tor_client packets. Domain to not audit. Receive tor_client packets. Domain allowed access. Do not audit attempts to receive tor_client packets. Domain allowed access. Send and receive tor_client packets. Domain allowed access. Do not audit attempts to send and receive tor_client packets. Domain to not audit. Relabel packets to tor_client the packet type. Domain allowed access. Send tor_server packets. Domain allowed access. Do not audit attempts to send tor_server packets. Domain to not audit. Receive tor_server packets. Domain allowed access. Do not audit attempts to receive tor_server packets. Domain allowed access. Send and receive tor_server packets. Domain allowed access. Do not audit attempts to send and receive tor_server packets. Domain to not audit. Relabel packets to tor_server the packet type. Domain allowed access. Send and receive TCP traffic on the traceroute port. Domain allowed access. Send UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to send UDP traffic on the traceroute port. Domain to not audit. Receive UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to receive UDP traffic on the traceroute port. Domain to not audit. Send and receive UDP traffic on the traceroute port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the traceroute port. Domain to not audit. Bind TCP sockets to the traceroute port. Domain allowed access. Bind UDP sockets to the traceroute port. Domain allowed access. Make a TCP connection to the traceroute port. Domain allowed access. Send traceroute_client packets. Domain allowed access. Do not audit attempts to send traceroute_client packets. Domain to not audit. Receive traceroute_client packets. Domain allowed access. Do not audit attempts to receive traceroute_client packets. Domain allowed access. Send and receive traceroute_client packets. Domain allowed access. Do not audit attempts to send and receive traceroute_client packets. Domain to not audit. Relabel packets to traceroute_client the packet type. Domain allowed access. Send traceroute_server packets. Domain allowed access. Do not audit attempts to send traceroute_server packets. Domain to not audit. Receive traceroute_server packets. Domain allowed access. Do not audit attempts to receive traceroute_server packets. Domain allowed access. Send and receive traceroute_server packets. Domain allowed access. Do not audit attempts to send and receive traceroute_server packets. Domain to not audit. Relabel packets to traceroute_server the packet type. Domain allowed access. Send and receive TCP traffic on the transproxy port. Domain allowed access. Send UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to send UDP traffic on the transproxy port. Domain to not audit. Receive UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to receive UDP traffic on the transproxy port. Domain to not audit. Send and receive UDP traffic on the transproxy port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the transproxy port. Domain to not audit. Bind TCP sockets to the transproxy port. Domain allowed access. Bind UDP sockets to the transproxy port. Domain allowed access. Make a TCP connection to the transproxy port. Domain allowed access. Send transproxy_client packets. Domain allowed access. Do not audit attempts to send transproxy_client packets. Domain to not audit. Receive transproxy_client packets. Domain allowed access. Do not audit attempts to receive transproxy_client packets. Domain allowed access. Send and receive transproxy_client packets. Domain allowed access. Do not audit attempts to send and receive transproxy_client packets. Domain to not audit. Relabel packets to transproxy_client the packet type. Domain allowed access. Send transproxy_server packets. Domain allowed access. Do not audit attempts to send transproxy_server packets. Domain to not audit. Receive transproxy_server packets. Domain allowed access. Do not audit attempts to receive transproxy_server packets. Domain allowed access. Send and receive transproxy_server packets. Domain allowed access. Do not audit attempts to send and receive transproxy_server packets. Domain to not audit. Relabel packets to transproxy_server the packet type. Domain allowed access. Send and receive TCP traffic on the ups port. Domain allowed access. Send UDP traffic on the ups port. Domain allowed access. Do not audit attempts to send UDP traffic on the ups port. Domain to not audit. Receive UDP traffic on the ups port. Domain allowed access. Do not audit attempts to receive UDP traffic on the ups port. Domain to not audit. Send and receive UDP traffic on the ups port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the ups port. Domain to not audit. Bind TCP sockets to the ups port. Domain allowed access. Bind UDP sockets to the ups port. Domain allowed access. Make a TCP connection to the ups port. Domain allowed access. Send ups_client packets. Domain allowed access. Do not audit attempts to send ups_client packets. Domain to not audit. Receive ups_client packets. Domain allowed access. Do not audit attempts to receive ups_client packets. Domain allowed access. Send and receive ups_client packets. Domain allowed access. Do not audit attempts to send and receive ups_client packets. Domain to not audit. Relabel packets to ups_client the packet type. Domain allowed access. Send ups_server packets. Domain allowed access. Do not audit attempts to send ups_server packets. Domain to not audit. Receive ups_server packets. Domain allowed access. Do not audit attempts to receive ups_server packets. Domain allowed access. Send and receive ups_server packets. Domain allowed access. Do not audit attempts to send and receive ups_server packets. Domain to not audit. Relabel packets to ups_server the packet type. Domain allowed access. Send and receive TCP traffic on the utcpserver port. Domain allowed access. Send UDP traffic on the utcpserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the utcpserver port. Domain to not audit. Receive UDP traffic on the utcpserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the utcpserver port. Domain to not audit. Send and receive UDP traffic on the utcpserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the utcpserver port. Domain to not audit. Bind TCP sockets to the utcpserver port. Domain allowed access. Bind UDP sockets to the utcpserver port. Domain allowed access. Make a TCP connection to the utcpserver port. Domain allowed access. Send utcpserver_client packets. Domain allowed access. Do not audit attempts to send utcpserver_client packets. Domain to not audit. Receive utcpserver_client packets. Domain allowed access. Do not audit attempts to receive utcpserver_client packets. Domain allowed access. Send and receive utcpserver_client packets. Domain allowed access. Do not audit attempts to send and receive utcpserver_client packets. Domain to not audit. Relabel packets to utcpserver_client the packet type. Domain allowed access. Send utcpserver_server packets. Domain allowed access. Do not audit attempts to send utcpserver_server packets. Domain to not audit. Receive utcpserver_server packets. Domain allowed access. Do not audit attempts to receive utcpserver_server packets. Domain allowed access. Send and receive utcpserver_server packets. Domain allowed access. Do not audit attempts to send and receive utcpserver_server packets. Domain to not audit. Relabel packets to utcpserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the uucpd port. Domain allowed access. Send UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to send UDP traffic on the uucpd port. Domain to not audit. Receive UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the uucpd port. Domain to not audit. Send and receive UDP traffic on the uucpd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the uucpd port. Domain to not audit. Bind TCP sockets to the uucpd port. Domain allowed access. Bind UDP sockets to the uucpd port. Domain allowed access. Make a TCP connection to the uucpd port. Domain allowed access. Send uucpd_client packets. Domain allowed access. Do not audit attempts to send uucpd_client packets. Domain to not audit. Receive uucpd_client packets. Domain allowed access. Do not audit attempts to receive uucpd_client packets. Domain allowed access. Send and receive uucpd_client packets. Domain allowed access. Do not audit attempts to send and receive uucpd_client packets. Domain to not audit. Relabel packets to uucpd_client the packet type. Domain allowed access. Send uucpd_server packets. Domain allowed access. Do not audit attempts to send uucpd_server packets. Domain to not audit. Receive uucpd_server packets. Domain allowed access. Do not audit attempts to receive uucpd_server packets. Domain allowed access. Send and receive uucpd_server packets. Domain allowed access. Do not audit attempts to send and receive uucpd_server packets. Domain to not audit. Relabel packets to uucpd_server the packet type. Domain allowed access. Send and receive TCP traffic on the varnishd port. Domain allowed access. Send UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to send UDP traffic on the varnishd port. Domain to not audit. Receive UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to receive UDP traffic on the varnishd port. Domain to not audit. Send and receive UDP traffic on the varnishd port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the varnishd port. Domain to not audit. Bind TCP sockets to the varnishd port. Domain allowed access. Bind UDP sockets to the varnishd port. Domain allowed access. Make a TCP connection to the varnishd port. Domain allowed access. Send varnishd_client packets. Domain allowed access. Do not audit attempts to send varnishd_client packets. Domain to not audit. Receive varnishd_client packets. Domain allowed access. Do not audit attempts to receive varnishd_client packets. Domain allowed access. Send and receive varnishd_client packets. Domain allowed access. Do not audit attempts to send and receive varnishd_client packets. Domain to not audit. Relabel packets to varnishd_client the packet type. Domain allowed access. Send varnishd_server packets. Domain allowed access. Do not audit attempts to send varnishd_server packets. Domain to not audit. Receive varnishd_server packets. Domain allowed access. Do not audit attempts to receive varnishd_server packets. Domain allowed access. Send and receive varnishd_server packets. Domain allowed access. Do not audit attempts to send and receive varnishd_server packets. Domain to not audit. Relabel packets to varnishd_server the packet type. Domain allowed access. Send and receive TCP traffic on the virt port. Domain allowed access. Send UDP traffic on the virt port. Domain allowed access. Do not audit attempts to send UDP traffic on the virt port. Domain to not audit. Receive UDP traffic on the virt port. Domain allowed access. Do not audit attempts to receive UDP traffic on the virt port. Domain to not audit. Send and receive UDP traffic on the virt port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the virt port. Domain to not audit. Bind TCP sockets to the virt port. Domain allowed access. Bind UDP sockets to the virt port. Domain allowed access. Make a TCP connection to the virt port. Domain allowed access. Send virt_client packets. Domain allowed access. Do not audit attempts to send virt_client packets. Domain to not audit. Receive virt_client packets. Domain allowed access. Do not audit attempts to receive virt_client packets. Domain allowed access. Send and receive virt_client packets. Domain allowed access. Do not audit attempts to send and receive virt_client packets. Domain to not audit. Relabel packets to virt_client the packet type. Domain allowed access. Send virt_server packets. Domain allowed access. Do not audit attempts to send virt_server packets. Domain to not audit. Receive virt_server packets. Domain allowed access. Do not audit attempts to receive virt_server packets. Domain allowed access. Send and receive virt_server packets. Domain allowed access. Do not audit attempts to send and receive virt_server packets. Domain to not audit. Relabel packets to virt_server the packet type. Domain allowed access. Send and receive TCP traffic on the virt_migration port. Domain allowed access. Send UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to send UDP traffic on the virt_migration port. Domain to not audit. Receive UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to receive UDP traffic on the virt_migration port. Domain to not audit. Send and receive UDP traffic on the virt_migration port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the virt_migration port. Domain to not audit. Bind TCP sockets to the virt_migration port. Domain allowed access. Bind UDP sockets to the virt_migration port. Domain allowed access. Make a TCP connection to the virt_migration port. Domain allowed access. Send virt_migration_client packets. Domain allowed access. Do not audit attempts to send virt_migration_client packets. Domain to not audit. Receive virt_migration_client packets. Domain allowed access. Do not audit attempts to receive virt_migration_client packets. Domain allowed access. Send and receive virt_migration_client packets. Domain allowed access. Do not audit attempts to send and receive virt_migration_client packets. Domain to not audit. Relabel packets to virt_migration_client the packet type. Domain allowed access. Send virt_migration_server packets. Domain allowed access. Do not audit attempts to send virt_migration_server packets. Domain to not audit. Receive virt_migration_server packets. Domain allowed access. Do not audit attempts to receive virt_migration_server packets. Domain allowed access. Send and receive virt_migration_server packets. Domain allowed access. Do not audit attempts to send and receive virt_migration_server packets. Domain to not audit. Relabel packets to virt_migration_server the packet type. Domain allowed access. Send and receive TCP traffic on the vnc port. Domain allowed access. Send UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to send UDP traffic on the vnc port. Domain to not audit. Receive UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to receive UDP traffic on the vnc port. Domain to not audit. Send and receive UDP traffic on the vnc port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the vnc port. Domain to not audit. Bind TCP sockets to the vnc port. Domain allowed access. Bind UDP sockets to the vnc port. Domain allowed access. Make a TCP connection to the vnc port. Domain allowed access. Send vnc_client packets. Domain allowed access. Do not audit attempts to send vnc_client packets. Domain to not audit. Receive vnc_client packets. Domain allowed access. Do not audit attempts to receive vnc_client packets. Domain allowed access. Send and receive vnc_client packets. Domain allowed access. Do not audit attempts to send and receive vnc_client packets. Domain to not audit. Relabel packets to vnc_client the packet type. Domain allowed access. Send vnc_server packets. Domain allowed access. Do not audit attempts to send vnc_server packets. Domain to not audit. Receive vnc_server packets. Domain allowed access. Do not audit attempts to receive vnc_server packets. Domain allowed access. Send and receive vnc_server packets. Domain allowed access. Do not audit attempts to send and receive vnc_server packets. Domain to not audit. Relabel packets to vnc_server the packet type. Domain allowed access. Send and receive TCP traffic on the wccp port. Domain allowed access. Send UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to send UDP traffic on the wccp port. Domain to not audit. Receive UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the wccp port. Domain to not audit. Send and receive UDP traffic on the wccp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the wccp port. Domain to not audit. Bind TCP sockets to the wccp port. Domain allowed access. Bind UDP sockets to the wccp port. Domain allowed access. Make a TCP connection to the wccp port. Domain allowed access. Send wccp_client packets. Domain allowed access. Do not audit attempts to send wccp_client packets. Domain to not audit. Receive wccp_client packets. Domain allowed access. Do not audit attempts to receive wccp_client packets. Domain allowed access. Send and receive wccp_client packets. Domain allowed access. Do not audit attempts to send and receive wccp_client packets. Domain to not audit. Relabel packets to wccp_client the packet type. Domain allowed access. Send wccp_server packets. Domain allowed access. Do not audit attempts to send wccp_server packets. Domain to not audit. Receive wccp_server packets. Domain allowed access. Do not audit attempts to receive wccp_server packets. Domain allowed access. Send and receive wccp_server packets. Domain allowed access. Do not audit attempts to send and receive wccp_server packets. Domain to not audit. Relabel packets to wccp_server the packet type. Domain allowed access. Send and receive TCP traffic on the whois port. Domain allowed access. Send UDP traffic on the whois port. Domain allowed access. Do not audit attempts to send UDP traffic on the whois port. Domain to not audit. Receive UDP traffic on the whois port. Domain allowed access. Do not audit attempts to receive UDP traffic on the whois port. Domain to not audit. Send and receive UDP traffic on the whois port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the whois port. Domain to not audit. Bind TCP sockets to the whois port. Domain allowed access. Bind UDP sockets to the whois port. Domain allowed access. Make a TCP connection to the whois port. Domain allowed access. Send whois_client packets. Domain allowed access. Do not audit attempts to send whois_client packets. Domain to not audit. Receive whois_client packets. Domain allowed access. Do not audit attempts to receive whois_client packets. Domain allowed access. Send and receive whois_client packets. Domain allowed access. Do not audit attempts to send and receive whois_client packets. Domain to not audit. Relabel packets to whois_client the packet type. Domain allowed access. Send whois_server packets. Domain allowed access. Do not audit attempts to send whois_server packets. Domain to not audit. Receive whois_server packets. Domain allowed access. Do not audit attempts to receive whois_server packets. Domain allowed access. Send and receive whois_server packets. Domain allowed access. Do not audit attempts to send and receive whois_server packets. Domain to not audit. Relabel packets to whois_server the packet type. Domain allowed access. Send and receive TCP traffic on the xdmcp port. Domain allowed access. Send UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to send UDP traffic on the xdmcp port. Domain to not audit. Receive UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xdmcp port. Domain to not audit. Send and receive UDP traffic on the xdmcp port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xdmcp port. Domain to not audit. Bind TCP sockets to the xdmcp port. Domain allowed access. Bind UDP sockets to the xdmcp port. Domain allowed access. Make a TCP connection to the xdmcp port. Domain allowed access. Send xdmcp_client packets. Domain allowed access. Do not audit attempts to send xdmcp_client packets. Domain to not audit. Receive xdmcp_client packets. Domain allowed access. Do not audit attempts to receive xdmcp_client packets. Domain allowed access. Send and receive xdmcp_client packets. Domain allowed access. Do not audit attempts to send and receive xdmcp_client packets. Domain to not audit. Relabel packets to xdmcp_client the packet type. Domain allowed access. Send xdmcp_server packets. Domain allowed access. Do not audit attempts to send xdmcp_server packets. Domain to not audit. Receive xdmcp_server packets. Domain allowed access. Do not audit attempts to receive xdmcp_server packets. Domain allowed access. Send and receive xdmcp_server packets. Domain allowed access. Do not audit attempts to send and receive xdmcp_server packets. Domain to not audit. Relabel packets to xdmcp_server the packet type. Domain allowed access. Send and receive TCP traffic on the xen port. Domain allowed access. Send UDP traffic on the xen port. Domain allowed access. Do not audit attempts to send UDP traffic on the xen port. Domain to not audit. Receive UDP traffic on the xen port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xen port. Domain to not audit. Send and receive UDP traffic on the xen port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xen port. Domain to not audit. Bind TCP sockets to the xen port. Domain allowed access. Bind UDP sockets to the xen port. Domain allowed access. Make a TCP connection to the xen port. Domain allowed access. Send xen_client packets. Domain allowed access. Do not audit attempts to send xen_client packets. Domain to not audit. Receive xen_client packets. Domain allowed access. Do not audit attempts to receive xen_client packets. Domain allowed access. Send and receive xen_client packets. Domain allowed access. Do not audit attempts to send and receive xen_client packets. Domain to not audit. Relabel packets to xen_client the packet type. Domain allowed access. Send xen_server packets. Domain allowed access. Do not audit attempts to send xen_server packets. Domain to not audit. Receive xen_server packets. Domain allowed access. Do not audit attempts to receive xen_server packets. Domain allowed access. Send and receive xen_server packets. Domain allowed access. Do not audit attempts to send and receive xen_server packets. Domain to not audit. Relabel packets to xen_server the packet type. Domain allowed access. Send and receive TCP traffic on the xfs port. Domain allowed access. Send UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to send UDP traffic on the xfs port. Domain to not audit. Receive UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xfs port. Domain to not audit. Send and receive UDP traffic on the xfs port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xfs port. Domain to not audit. Bind TCP sockets to the xfs port. Domain allowed access. Bind UDP sockets to the xfs port. Domain allowed access. Make a TCP connection to the xfs port. Domain allowed access. Send xfs_client packets. Domain allowed access. Do not audit attempts to send xfs_client packets. Domain to not audit. Receive xfs_client packets. Domain allowed access. Do not audit attempts to receive xfs_client packets. Domain allowed access. Send and receive xfs_client packets. Domain allowed access. Do not audit attempts to send and receive xfs_client packets. Domain to not audit. Relabel packets to xfs_client the packet type. Domain allowed access. Send xfs_server packets. Domain allowed access. Do not audit attempts to send xfs_server packets. Domain to not audit. Receive xfs_server packets. Domain allowed access. Do not audit attempts to receive xfs_server packets. Domain allowed access. Send and receive xfs_server packets. Domain allowed access. Do not audit attempts to send and receive xfs_server packets. Domain to not audit. Relabel packets to xfs_server the packet type. Domain allowed access. Send and receive TCP traffic on the xserver port. Domain allowed access. Send UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to send UDP traffic on the xserver port. Domain to not audit. Receive UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to receive UDP traffic on the xserver port. Domain to not audit. Send and receive UDP traffic on the xserver port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the xserver port. Domain to not audit. Bind TCP sockets to the xserver port. Domain allowed access. Bind UDP sockets to the xserver port. Domain allowed access. Make a TCP connection to the xserver port. Domain allowed access. Send xserver_client packets. Domain allowed access. Do not audit attempts to send xserver_client packets. Domain to not audit. Receive xserver_client packets. Domain allowed access. Do not audit attempts to receive xserver_client packets. Domain allowed access. Send and receive xserver_client packets. Domain allowed access. Do not audit attempts to send and receive xserver_client packets. Domain to not audit. Relabel packets to xserver_client the packet type. Domain allowed access. Send xserver_server packets. Domain allowed access. Do not audit attempts to send xserver_server packets. Domain to not audit. Receive xserver_server packets. Domain allowed access. Do not audit attempts to receive xserver_server packets. Domain allowed access. Send and receive xserver_server packets. Domain allowed access. Do not audit attempts to send and receive xserver_server packets. Domain to not audit. Relabel packets to xserver_server the packet type. Domain allowed access. Send and receive TCP traffic on the zarafa port. Domain allowed access. Send UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to send UDP traffic on the zarafa port. Domain to not audit. Receive UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zarafa port. Domain to not audit. Send and receive UDP traffic on the zarafa port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zarafa port. Domain to not audit. Bind TCP sockets to the zarafa port. Domain allowed access. Bind UDP sockets to the zarafa port. Domain allowed access. Make a TCP connection to the zarafa port. Domain allowed access. Send zarafa_client packets. Domain allowed access. Do not audit attempts to send zarafa_client packets. Domain to not audit. Receive zarafa_client packets. Domain allowed access. Do not audit attempts to receive zarafa_client packets. Domain allowed access. Send and receive zarafa_client packets. Domain allowed access. Do not audit attempts to send and receive zarafa_client packets. Domain to not audit. Relabel packets to zarafa_client the packet type. Domain allowed access. Send zarafa_server packets. Domain allowed access. Do not audit attempts to send zarafa_server packets. Domain to not audit. Receive zarafa_server packets. Domain allowed access. Do not audit attempts to receive zarafa_server packets. Domain allowed access. Send and receive zarafa_server packets. Domain allowed access. Do not audit attempts to send and receive zarafa_server packets. Domain to not audit. Relabel packets to zarafa_server the packet type. Domain allowed access. Send and receive TCP traffic on the zabbix port. Domain allowed access. Send UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to send UDP traffic on the zabbix port. Domain to not audit. Receive UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zabbix port. Domain to not audit. Send and receive UDP traffic on the zabbix port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zabbix port. Domain to not audit. Bind TCP sockets to the zabbix port. Domain allowed access. Bind UDP sockets to the zabbix port. Domain allowed access. Make a TCP connection to the zabbix port. Domain allowed access. Send zabbix_client packets. Domain allowed access. Do not audit attempts to send zabbix_client packets. Domain to not audit. Receive zabbix_client packets. Domain allowed access. Do not audit attempts to receive zabbix_client packets. Domain allowed access. Send and receive zabbix_client packets. Domain allowed access. Do not audit attempts to send and receive zabbix_client packets. Domain to not audit. Relabel packets to zabbix_client the packet type. Domain allowed access. Send zabbix_server packets. Domain allowed access. Do not audit attempts to send zabbix_server packets. Domain to not audit. Receive zabbix_server packets. Domain allowed access. Do not audit attempts to receive zabbix_server packets. Domain allowed access. Send and receive zabbix_server packets. Domain allowed access. Do not audit attempts to send and receive zabbix_server packets. Domain to not audit. Relabel packets to zabbix_server the packet type. Domain allowed access. Send and receive TCP traffic on the zabbix_agent port. Domain allowed access. Send UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to send UDP traffic on the zabbix_agent port. Domain to not audit. Receive UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zabbix_agent port. Domain to not audit. Send and receive UDP traffic on the zabbix_agent port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zabbix_agent port. Domain to not audit. Bind TCP sockets to the zabbix_agent port. Domain allowed access. Bind UDP sockets to the zabbix_agent port. Domain allowed access. Make a TCP connection to the zabbix_agent port. Domain allowed access. Send zabbix_agent_client packets. Domain allowed access. Do not audit attempts to send zabbix_agent_client packets. Domain to not audit. Receive zabbix_agent_client packets. Domain allowed access. Do not audit attempts to receive zabbix_agent_client packets. Domain allowed access. Send and receive zabbix_agent_client packets. Domain allowed access. Do not audit attempts to send and receive zabbix_agent_client packets. Domain to not audit. Relabel packets to zabbix_agent_client the packet type. Domain allowed access. Send zabbix_agent_server packets. Domain allowed access. Do not audit attempts to send zabbix_agent_server packets. Domain to not audit. Receive zabbix_agent_server packets. Domain allowed access. Do not audit attempts to receive zabbix_agent_server packets. Domain allowed access. Send and receive zabbix_agent_server packets. Domain allowed access. Do not audit attempts to send and receive zabbix_agent_server packets. Domain to not audit. Relabel packets to zabbix_agent_server the packet type. Domain allowed access. Send and receive TCP traffic on the zookeeper_client port. Domain allowed access. Send UDP traffic on the zookeeper_client port. Domain allowed access. Do not audit attempts to send UDP traffic on the zookeeper_client port. Domain to not audit. Receive UDP traffic on the zookeeper_client port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zookeeper_client port. Domain to not audit. Send and receive UDP traffic on the zookeeper_client port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zookeeper_client port. Domain to not audit. Bind TCP sockets to the zookeeper_client port. Domain allowed access. Bind UDP sockets to the zookeeper_client port. Domain allowed access. Make a TCP connection to the zookeeper_client port. Domain allowed access. Send zookeeper_client_client packets. Domain allowed access. Do not audit attempts to send zookeeper_client_client packets. Domain to not audit. Receive zookeeper_client_client packets. Domain allowed access. Do not audit attempts to receive zookeeper_client_client packets. Domain allowed access. Send and receive zookeeper_client_client packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_client_client packets. Domain to not audit. Relabel packets to zookeeper_client_client the packet type. Domain allowed access. Send zookeeper_client_server packets. Domain allowed access. Do not audit attempts to send zookeeper_client_server packets. Domain to not audit. Receive zookeeper_client_server packets. Domain allowed access. Do not audit attempts to receive zookeeper_client_server packets. Domain allowed access. Send and receive zookeeper_client_server packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_client_server packets. Domain to not audit. Relabel packets to zookeeper_client_server the packet type. Domain allowed access. Send and receive TCP traffic on the zookeeper_election port. Domain allowed access. Send UDP traffic on the zookeeper_election port. Domain allowed access. Do not audit attempts to send UDP traffic on the zookeeper_election port. Domain to not audit. Receive UDP traffic on the zookeeper_election port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zookeeper_election port. Domain to not audit. Send and receive UDP traffic on the zookeeper_election port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zookeeper_election port. Domain to not audit. Bind TCP sockets to the zookeeper_election port. Domain allowed access. Bind UDP sockets to the zookeeper_election port. Domain allowed access. Make a TCP connection to the zookeeper_election port. Domain allowed access. Send zookeeper_election_client packets. Domain allowed access. Do not audit attempts to send zookeeper_election_client packets. Domain to not audit. Receive zookeeper_election_client packets. Domain allowed access. Do not audit attempts to receive zookeeper_election_client packets. Domain allowed access. Send and receive zookeeper_election_client packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_election_client packets. Domain to not audit. Relabel packets to zookeeper_election_client the packet type. Domain allowed access. Send zookeeper_election_server packets. Domain allowed access. Do not audit attempts to send zookeeper_election_server packets. Domain to not audit. Receive zookeeper_election_server packets. Domain allowed access. Do not audit attempts to receive zookeeper_election_server packets. Domain allowed access. Send and receive zookeeper_election_server packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_election_server packets. Domain to not audit. Relabel packets to zookeeper_election_server the packet type. Domain allowed access. Send and receive TCP traffic on the zookeeper_leader port. Domain allowed access. Send UDP traffic on the zookeeper_leader port. Domain allowed access. Do not audit attempts to send UDP traffic on the zookeeper_leader port. Domain to not audit. Receive UDP traffic on the zookeeper_leader port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zookeeper_leader port. Domain to not audit. Send and receive UDP traffic on the zookeeper_leader port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zookeeper_leader port. Domain to not audit. Bind TCP sockets to the zookeeper_leader port. Domain allowed access. Bind UDP sockets to the zookeeper_leader port. Domain allowed access. Make a TCP connection to the zookeeper_leader port. Domain allowed access. Send zookeeper_leader_client packets. Domain allowed access. Do not audit attempts to send zookeeper_leader_client packets. Domain to not audit. Receive zookeeper_leader_client packets. Domain allowed access. Do not audit attempts to receive zookeeper_leader_client packets. Domain allowed access. Send and receive zookeeper_leader_client packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_leader_client packets. Domain to not audit. Relabel packets to zookeeper_leader_client the packet type. Domain allowed access. Send zookeeper_leader_server packets. Domain allowed access. Do not audit attempts to send zookeeper_leader_server packets. Domain to not audit. Receive zookeeper_leader_server packets. Domain allowed access. Do not audit attempts to receive zookeeper_leader_server packets. Domain allowed access. Send and receive zookeeper_leader_server packets. Domain allowed access. Do not audit attempts to send and receive zookeeper_leader_server packets. Domain to not audit. Relabel packets to zookeeper_leader_server the packet type. Domain allowed access. Send and receive TCP traffic on the zebra port. Domain allowed access. Send UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to send UDP traffic on the zebra port. Domain to not audit. Receive UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zebra port. Domain to not audit. Send and receive UDP traffic on the zebra port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zebra port. Domain to not audit. Bind TCP sockets to the zebra port. Domain allowed access. Bind UDP sockets to the zebra port. Domain allowed access. Make a TCP connection to the zebra port. Domain allowed access. Send zebra_client packets. Domain allowed access. Do not audit attempts to send zebra_client packets. Domain to not audit. Receive zebra_client packets. Domain allowed access. Do not audit attempts to receive zebra_client packets. Domain allowed access. Send and receive zebra_client packets. Domain allowed access. Do not audit attempts to send and receive zebra_client packets. Domain to not audit. Relabel packets to zebra_client the packet type. Domain allowed access. Send zebra_server packets. Domain allowed access. Do not audit attempts to send zebra_server packets. Domain to not audit. Receive zebra_server packets. Domain allowed access. Do not audit attempts to receive zebra_server packets. Domain allowed access. Send and receive zebra_server packets. Domain allowed access. Do not audit attempts to send and receive zebra_server packets. Domain to not audit. Relabel packets to zebra_server the packet type. Domain allowed access. Send and receive TCP traffic on the zope port. Domain allowed access. Send UDP traffic on the zope port. Domain allowed access. Do not audit attempts to send UDP traffic on the zope port. Domain to not audit. Receive UDP traffic on the zope port. Domain allowed access. Do not audit attempts to receive UDP traffic on the zope port. Domain to not audit. Send and receive UDP traffic on the zope port. Domain allowed access. Do not audit attempts to send and receive UDP traffic on the zope port. Domain to not audit. Bind TCP sockets to the zope port. Domain allowed access. Bind UDP sockets to the zope port. Domain allowed access. Make a TCP connection to the zope port. Domain allowed access. Send zope_client packets. Domain allowed access. Do not audit attempts to send zope_client packets. Domain to not audit. Receive zope_client packets. Domain allowed access. Do not audit attempts to receive zope_client packets. Domain allowed access. Send and receive zope_client packets. Domain allowed access. Do not audit attempts to send and receive zope_client packets. Domain to not audit. Relabel packets to zope_client the packet type. Domain allowed access. Send zope_server packets. Domain allowed access. Do not audit attempts to send zope_server packets. Domain to not audit. Receive zope_server packets. Domain allowed access. Do not audit attempts to receive zope_server packets. Domain allowed access. Send and receive zope_server packets. Domain allowed access. Do not audit attempts to send and receive zope_server packets. Domain to not audit. Relabel packets to zope_server the packet type. Domain allowed access. Send and receive TCP network traffic on the lo interface. Domain allowed access. Send UDP network traffic on the lo interface. Domain allowed access. Receive UDP network traffic on the lo interface. Domain allowed access. Send and receive UDP network traffic on the lo interface. Domain allowed access. Send raw IP packets on the lo interface. Domain allowed access. Receive raw IP packets on the lo interface. Domain allowed access. Send and receive raw IP packets on the lo interface. Domain allowed access.
Device nodes and interfaces for many basic system devices.

This module creates the device node concept and provides the policy for many of the device files. Notable exceptions are the mass storage and terminal devices that are covered by other modules.

This module creates the concept of a device node. That is a char or block device file, usually in /dev. All types that are used to label device nodes should use the dev_node macro.

Additionally, this module controls access to three things:

  • the device directories containing device nodes
  • device nodes as a group
  • individual access to specific device nodes covered by this module.

Depended on by other required modules. Make the specified type usable for device nodes in a filesystem.

Make the specified type usable for device nodes in a filesystem. Types used for device nodes that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running.

Example:

type mydev_t; dev_node(mydev_t) allow mydomain_t mydev_t:chr_file read_chr_file_perms;

Related interfaces:

  • term_tty()
  • term_pty()
Type to be used for device nodes.
Associate the specified file type with device filesystem. The type of the file to be associated. Get attributes of device filesystems. Domain allowed access. Mount a filesystem on /dev Domain allow access. Allow full relabeling (to and from) of all device nodes. Domain allowed access. List all of the device nodes in a device directory. Domain allowed access. Set the attributes of /dev directories. Domain allowed access. Dontaudit attempts to list all device nodes. Domain to not audit. Add entries to directories in /dev. Domain allowed access. Add entries to directories in /dev. Domain allowed access. Create a directory in the device directory. Domain allowed access. Delete a directory in the device directory. Domain allowed access. Manage of directories in /dev. Domain allowed access. Allow full relabeling (to and from) of directories in /dev. Domain allowed access. dontaudit getattr generic files in /dev. Domain to not audit. Read generic files in /dev. Domain to not audit. Read and write generic files in /dev. Domain allowed access. Delete generic files in /dev. Domain allowed access. Create a file in the device directory. Domain allowed access. Dontaudit getattr on generic pipes. Domain to not audit. Write generic socket files in /dev. Domain to not audit. Allow getattr on generic block devices. Domain allowed access. Dontaudit getattr on generic block devices. Domain to not audit. Dontaudit setattr on generic block devices. Domain to not audit. Create generic block device files. Domain allowed access. Delete generic block device files. Domain allowed access. Allow getattr for generic character device files. Domain allowed access. Dontaudit getattr for generic character device files. Domain to not audit. Dontaudit setattr for generic character device files. Domain to not audit. Read generic character device files. Domain allowed access. Read and write generic character device files. Domain allowed access. Read and write generic block device files. Domain allowed access. Dontaudit attempts to read/write generic character device files. Domain to dontaudit access. Create generic character device files. Domain allowed access. Delete generic character device files. Domain allowed access. Relabel from generic character device files. Domain allowed access. Do not audit attempts to set the attributes of symbolic links in device directories (/dev). Domain to not audit. Read symbolic links in device directories. Domain allowed access. Create symbolic links in device directories. Domain allowed access. Delete symbolic links in device directories. Domain allowed access. Create, delete, read, and write symbolic links in device directories. Domain allowed access. Relabel symbolic links in device directories. Domain allowed access. Create, delete, read, and write device nodes in device directories. Domain allowed access. Dontaudit getattr for generic device files. Domain to not audit. Create, delete, read, and write block device files. Domain allowed access. Create, delete, read, and write character device files. Domain allowed access. Create, read, and write device nodes. The node will be transitioned to the type provided. Domain allowed access. Type to which the created node will be transitioned. Object class(es) (single or set including {}) for which this the transition will occur. The name of the object being created. Create, read, and write device nodes. The node will be transitioned to the type provided. This is a temporary interface until devtmpfs functionality fixed. Domain allowed access. Object class(es) (single or set including {}) for which this the transition will occur. The name of the object being created. Getattr on all block file device nodes. Domain allowed access. Dontaudit getattr on all block file device nodes. Domain to not audit. Getattr on all character file device nodes. Domain allowed access. Dontaudit getattr on all character file device nodes. Domain to not audit. Setattr on all block file device nodes. Domain allowed access. Setattr on all character file device nodes. Domain allowed access. Dontaudit read on all block file device nodes. Domain to not audit. Dontaudit write on all block file device nodes. Domain to not audit. Dontaudit read on all character file device nodes. Domain to not audit. Dontaudit write on all character file device nodes. Domain to not audit. Create all block device files. Domain allowed access. Create all character device files. Domain allowed access. Delete all block device files. Domain allowed access. Delete all character device files. Domain allowed access. Rename all block device files. Domain allowed access. Rename all character device files. Domain allowed access. Read, write, create, and delete all block device files. Domain allowed access. Read, write, create, and delete all character device files. Domain allowed access. Getattr the agp devices. Domain allowed access. Read and write the agp devices. Domain allowed access. Get the attributes of the apm bios device node. Domain allowed access. Do not audit attempts to get the attributes of the apm bios device node. Domain to not audit. Set the attributes of the apm bios device node. Domain allowed access. Do not audit attempts to set the attributes of the apm bios device node. Domain to not audit. Read and write the apm bios. Domain allowed access. Get the attributes of the autofs device node. Domain allowed access. Do not audit attempts to get the attributes of the autofs device node. Domain to not audit. Set the attributes of the autofs device node. Domain allowed access. Do not audit attempts to set the attributes of the autofs device node. Domain to not audit. Read and write the autofs device. Domain allowed access. Relabel the autofs device node. Domain allowed access. Read and write the PCMCIA card manager device. Domain allowed access. Do not audit attempts to read and write the PCMCIA card manager device. Domain to not audit. Create, read, write, and delete the PCMCIA card manager device with the correct type. Domain allowed access. Create, read, write, and delete the PCMCIA card manager device. Domain allowed access. Automatic type transition to the type for PCMCIA card manager device nodes when created in /dev. Domain allowed access. The name of the object being created. Get the attributes of the CPU microcode and id interfaces. Domain allowed access. Set the attributes of the CPU microcode and id interfaces. Domain allowed access. Read the CPU identity. Domain allowed access. Read and write the the CPU microcode device. This is required to load CPU microcode. Domain allowed access. Read the kernel crash device Domain allowed access. Read and write the the hardware SSL accelerator. Domain allowed access. Set the attributes of the dlm control devices. Domain allowed access. Read and write the the dlm control device Domain allowed access. getattr the dri devices. Domain allowed access. Setattr the dri devices. Domain allowed access. Read and write the dri devices. Domain allowed access. Dontaudit read and write on the dri devices. Domain to not audit. Create, read, write, and delete the dri devices. Domain allowed access. Automatic type transition to the type for DRI device nodes when created in /dev. Domain allowed access. The name of the object being created. Get the attributes of the event devices. Domain allowed access. Set the attributes of the event devices. Domain allowed access. Read input event devices (/dev/input). Domain allowed access. Read input event devices (/dev/input). Domain allowed access. Get the attributes of the framebuffer device node. Domain allowed access. Set the attributes of the framebuffer device node. Domain allowed access. Dot not audit attempts to set the attributes of the framebuffer device node. Domain to not audit. Read the framebuffer. Domain allowed access. Do not audit attempts to read the framebuffer. Domain to not audit. Write the framebuffer. Domain allowed access. Read and write the framebuffer. Domain allowed access. Read the kernel messages Domain allowed access. Do not audit attempts to read the kernel messages Domain to not audit. Write to the kernel messages device Domain allowed access. Get the attributes of the ksm devices. Domain allowed access. Set the attributes of the ksm devices. Domain allowed access. Read the ksm devices. Domain allowed access. Read and write to ksm devices. Domain allowed access. Get the attributes of the kvm devices. Domain allowed access. Set the attributes of the kvm devices. Domain allowed access. Read the kvm devices. Domain allowed access. Read and write to kvm devices. Domain allowed access. Read the lirc device. Domain allowed access. Read and write the lirc device. Domain allowed access. Automatic type transition to the type for lirc device nodes when created in /dev. Domain allowed access. The name of the object being created. Get the attributes of the lvm comtrol device. Domain allowed access. Read the lvm comtrol device. Domain allowed access. Read and write the lvm control device. Domain allowed access. Do not audit attempts to read and write lvm control device. Domain to not audit. Delete the lvm control device. Domain allowed access. dontaudit getattr raw memory devices (e.g. /dev/mem). Domain to not audit. Read raw memory devices (e.g. /dev/mem). Domain allowed access. Do not audit attempts to read raw memory devices (e.g. /dev/mem). Domain to not audit. Write raw memory devices (e.g. /dev/mem). Domain allowed access. Read and execute raw memory devices (e.g. /dev/mem). Domain allowed access. Write and execute raw memory devices (e.g. /dev/mem). Domain allowed access. Get the attributes of miscellaneous devices. Domain allowed access. Do not audit attempts to get the attributes of miscellaneous devices. Domain to not audit. Set the attributes of miscellaneous devices. Domain allowed access. Do not audit attempts to set the attributes of miscellaneous devices. Domain to not audit. Read miscellaneous devices. Domain allowed access. Write miscellaneous devices. Domain allowed access. Do not audit attempts to read and write miscellaneous devices. Domain allowed access. Get the attributes of the modem devices. Domain allowed access. Set the attributes of the modem devices. Domain allowed access. Read the modem devices. Domain allowed access. Read and write to modem devices. Domain allowed access. Get the attributes of the mouse devices. Domain allowed access. Set the attributes of the mouse devices. Domain allowed access. Read the mouse devices. Domain allowed access. Read and write to mouse devices. Domain allowed access. Get the attributes of the memory type range registers (MTRR) device. Domain allowed access. Read the memory type range registers (MTRR). (Deprecated)

Read the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead.

The MTRR device ioctls can be used for reading and writing; thus, read access to the device cannot be separated from write access.

Domain allowed access.
Write the memory type range registers (MTRR). (Deprecated)

Write the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead.

The MTRR device ioctls can be used for reading and writing; thus, write access to the device cannot be separated from read access.

Domain allowed access.
Do not audit attempts to write the memory type range registers (MTRR). Domain to not audit. Read and write the memory type range registers (MTRR). Domain allowed access. Get the attributes of the network control device Domain allowed access. Read the network control identity. Domain allowed access. Read and write the the network control device. Domain allowed access. Get the attributes of the null device nodes. Domain allowed access. Set the attributes of the null device nodes. Domain allowed access. Delete the null device (/dev/null). Domain allowed access. Read and write to the null device (/dev/null). Domain allowed access. Create the null device (/dev/null). Domain allowed access. Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. Domain to not audit. Read and write BIOS non-volatile RAM. Domain allowed access. Get the attributes of the printer device nodes. Domain allowed access. Set the attributes of the printer device nodes. Domain allowed access. Append the printer device. Domain allowed access. Read and write the printer device. Domain allowed access. Read printk devices (e.g., /dev/kmsg /dev/mcelog) Domain allowed access. Get the attributes of the QEMU microcode and id interfaces. Domain allowed access. Set the attributes of the QEMU microcode and id interfaces. Domain allowed access. Read the QEMU device Domain allowed access. Read and write the the QEMU device. Domain allowed access. Read from random number generator devices (e.g., /dev/random).

Allow the specified domain to read from random number generator devices (e.g., /dev/random). Typically this is used in situations when a cryptographically secure random number is needed.

Related interface:

  • dev_read_urand()
Domain allowed access.
Do not audit attempts to read from random number generator devices (e.g., /dev/random) Domain to not audit. Do not audit attempts to append to random number generator devices (e.g., /dev/random) Domain to not audit. Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the random device. Domain allowed access. Read the realtime clock (/dev/rtc). Domain allowed access. Set the realtime clock (/dev/rtc). Domain allowed access. Read and set the realtime clock (/dev/rtc). Domain allowed access. Get the attributes of the scanner device. Domain allowed access. Do not audit attempts to get the attributes of the scanner device. Domain to not audit. Set the attributes of the scanner device. Domain allowed access. Do not audit attempts to set the attributes of the scanner device. Domain to not audit. Read and write the scanner device. Domain allowed access. Get the attributes of the sound devices. Domain allowed access. Set the attributes of the sound devices. Domain allowed access. Read the sound devices. Domain allowed access. Write the sound devices. Domain allowed access. Read the sound mixer devices. Domain allowed access. Write the sound mixer devices. Domain allowed access. Get the attributes of the the power management device. Domain allowed access. Set the attributes of the the power management device. Domain allowed access. Read and write the the power management device. Domain allowed access. Getattr on smartcard devices Domain allowed access. dontaudit getattr on smartcard devices Domain to not audit. Read and write smartcard devices. Domain allowed access. Create, read, write, and delete smartcard devices. Domain allowed access. Associate a file to a sysfs filesystem. The type of the file to be associated to sysfs. Get the attributes of sysfs directories. Domain allowed access. Search the sysfs directories. Domain allowed access. Do not audit attempts to search sysfs. Domain to not audit. List the contents of the sysfs directories. Domain allowed access. Write in a sysfs directories. Domain allowed access. Do not audit attempts to write in a sysfs directory. Domain to not audit. Create, read, write, and delete sysfs directories. Domain allowed access. Read hardware state information.

Allow the specified domain to read the contents of the sysfs filesystem. This filesystem contains information, parameters, and other settings on the hardware installed on the system.

Domain allowed access.
Allow caller to modify hardware state information. Domain allowed access. Read and write the TPM device. Domain allowed access. Read from pseudo random number generator devices (e.g., /dev/urandom).

Allow the specified domain to read from pseudo random number generator devices (e.g., /dev/urandom). Typically this is used in situations when a cryptographically secure random number is not necessarily needed. One example is the Stack Smashing Protector (SSP, formerly known as ProPolice) support that may be compiled into programs.

Related interface:

  • dev_read_rand()

Related tunable:

  • global_ssp
Domain allowed access.
Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) Domain to not audit. Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. Domain allowed access. Getattr generic the USB devices. Domain allowed access. Setattr generic the USB devices. Domain allowed access. Read generic the USB devices. Domain allowed access. Read and write generic the USB devices. Domain allowed access. Read USB monitor devices. Domain allowed access. Write USB monitor devices. Domain allowed access. Mount a usbfs filesystem. Domain allowed access. Associate a file to a usbfs filesystem. The type of the file to be associated to usbfs. Get the attributes of a directory in the usb filesystem. Domain allowed access. Do not audit attempts to get the attributes of a directory in the usb filesystem. Domain to not audit. Search the directory containing USB hardware information. Domain allowed access. Allow caller to get a list of usb hardware. Domain allowed access. Set the attributes of usbfs filesystem. Domain allowed access. Read USB hardware information using the usbfs filesystem interface. Domain allowed access. Allow caller to modify usb hardware configuration files. Domain allowed access. Get the attributes of video4linux devices. Domain allowed access. Read and write userio device. Domain allowed access. Do not audit attempts to get the attributes of video4linux device nodes. Domain to not audit. Set the attributes of video4linux device nodes. Domain allowed access. Do not audit attempts to set the attributes of video4linux device nodes. Domain to not audit. Read the video4linux devices. Domain allowed access. Write the video4linux devices. Domain allowed access. Allow read/write the vhost net device Domain allowed access. Read and write VMWare devices. Domain allowed access. Read, write, and mmap VMWare devices. Domain allowed access. Read from watchdog devices. Domain allowed access. Write to watchdog devices. Domain allowed access. Read and write the the wireless device. Domain allowed access. Read and write Xen devices. Domain allowed access. Create, read, write, and delete Xen devices. Domain allowed access. Automatic type transition to the type for xen device nodes when created in /dev. Domain allowed access. The name of the object being created. Get the attributes of X server miscellaneous devices. Domain allowed access. Set the attributes of X server miscellaneous devices. Domain allowed access. Read and write X server miscellaneous devices. Domain allowed access. Read and write to the zero device (/dev/zero). Domain allowed access. Read, write, and execute the zero device (/dev/zero). Domain allowed access. Execmod the zero device (/dev/zero). Domain allowed access. Create the zero device (/dev/zero). Domain allowed access. Unconfined access to devices. Domain allowed access.
Core policy for domains. Contains the concept of a domain. Make the specified type usable as a basic domain.

Make the specified type usable as a basic domain.

This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes.

Type to be used as a basic domain type.
Make the specified type usable as a domain.

Make the specified type usable as a domain. This, or an interface that calls this interface, must be used on all types that are used as domains.

Related interfaces:

  • application_domain()
  • init_daemon_domain()
  • init_domaion()
  • init_ranged_daemon_domain()
  • init_ranged_domain()
  • init_ranged_system_domain()
  • init_script_domain()
  • init_system_domain()

Example:

type mydomain_t; domain_type(mydomain_t) type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;

Type to be used as a domain type.
Make the specified type usable as an entry point for the domain. Domain to be entered. Type of program used for entering the domain. Make the file descriptors of the specified domain for interactive use (widely inheritable) Domain allowed access. Allow the specified domain to perform dynamic transitions.

Allow the specified domain to perform dynamic transitions.

This violates process tranquility, and it is strongly suggested that this not be used.

Domain allowed access.
Makes caller and execption to the constraint preventing changing to the system user identity and system role. Domain allowed access. Makes caller an exception to the constraint preventing changing of user identity. The process type to make an exception to the constraint. Makes caller an exception to the constraint preventing changing of role. The process type to make an exception to the constraint. Makes caller an exception to the constraint preventing changing the user identity in object contexts. The process type to make an exception to the constraint. Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains.

Domain target for user exemption.
Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains.

Domain target for user exemption.
Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs.

Domain target for user exemption.
Inherit and use file descriptors from domains with interactive programs.

Allow the specified domain to inherit and use file descriptors from domains with interactive programs. This does not allow access to the objects being referenced by the file descriptors.

Domain allowed access.
Do not audit attempts to inherit file descriptors from domains with interactive programs. Domain to not audit. Send a SIGCHLD signal to domains whose file discriptors are widely inheritable. Domain allowed access. Set the nice level of all domains. Domain allowed access. Send general signals to all domains. Domain allowed access. Do not audit attempts to send general signals to all domains. Domain to not audit. Send a null signal to all domains. Domain allowed access. Send a stop signal to all domains. Domain allowed access. Send a child terminated signal to all domains. Domain allowed access. Send a kill signal to all domains. Domain allowed access. Search the process state directory (/proc/pid) of all domains. Domain allowed access. Do not audit attempts to search the process state directory (/proc/pid) of all domains. Domain to not audit. Read the process state (/proc/pid) of all domains. Domain allowed access. Get the attributes of all domains of all domains. Domain allowed access. Do not audit attempts to get the attributes of all domains. Domain allowed access. Read the process state (/proc/pid) of all confined domains. Domain allowed access. Get the attributes of all confined domains. Domain allowed access. Ptrace all domains. Domain allowed access. Do not audit attempts to ptrace all domains.

Do not audit attempts to ptrace all domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Domain to not audit.
Do not audit attempts to ptrace confined domains.

Do not audit attempts to ptrace confined domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Domain to not audit.
Do not audit attempts to read the process state (/proc/pid) of all domains. Domain to not audit. Do not audit attempts to read the process state directories of all domains. Domain to not audit. Get the session ID of all domains. Domain allowed access. Do not audit attempts to get the session ID of all domains. Domain to not audit. Get the process group ID of all domains. Domain allowed access. Get the scheduler information of all domains. Domain allowed access. Get the capability information of all domains. Domain allowed access. Get the attributes of all domains sockets, for all socket types.

Get the attributes of all domains sockets, for all socket types.

This is commonly used for domains that can use lsof on all domains.

Domain allowed access.
Do not audit attempts to get the attributes of all domains sockets, for all socket types.

Do not audit attempts to get the attributes of all domains sockets, for all socket types.

This interface was added for PCMCIA cardmgr and is probably excessive.

Domain to not audit.
Do not audit attempts to get the attributes of all domains TCP sockets. Domain to not audit. Do not audit attempts to get the attributes of all domains UDP sockets. Domain to not audit. Do not audit attempts to read or write all domains UDP sockets. Domain to not audit. Do not audit attempts to get attribues of all domains IPSEC key management sockets. Domain to not audit. Do not audit attempts to get attribues of all domains packet sockets. Domain to not audit. Do not audit attempts to get attribues of all domains raw sockets. Domain to not audit. Do not audit attempts to read or write all domains key sockets. Domain to not audit. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain to not audit. Get the attributes of all domains unix datagram sockets. Domain allowed access. Do not audit attempts to get the attributes of all domains unix datagram sockets. Domain to not audit. Get the attributes of all domains unnamed pipes.

Get the attributes of all domains unnamed pipes.

This is commonly used for domains that can use lsof on all domains.

Domain allowed access.
Do not audit attempts to get the attributes of all domains unnamed pipes. Domain to not audit. Allow specified type to set context of all domains IPSEC associations. Domain allowed access. Get the attributes of entry point files for all domains. Domain allowed access. Do not audit attempts to get the attributes of all entry point files. Domain to not audit. Read the entry point files for all domains. Domain allowed access. Execute the entry point files for all domains in the caller domain. Domain allowed access. dontaudit checking for execute on all entry point files Domain to not audit. Create, read, write, and delete all entrypoint files. Domain allowed access. Relabel to and from all entry point file types. Domain allowed access. Mmap all entry point files as executable. Domain allowed access. Execute an entry_type in the specified domain. Domain allowed to transition. The type of the new process. Ability to mmap a low area of the address space conditionally, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. Domain allowed access. Ability to mmap a low area of the address space unconditionally, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. Domain allowed access. Allow specified type to receive labeled networking packets from all domains, over all protocols (TCP, UDP, etc) Domain allowed access. Send generic signals to the unconfined domain. Domain allowed access. Unconfined access to domains. Domain allowed access.

Control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.

Basic filesystem types and interfaces.

This module contains basic filesystem types and interfaces. This includes:

  • The concept of different file types including basic files, mount points, tmp files, etc.
  • Access to groups of files and all files.
  • Types and interfaces for the basic filesystem layout (/, /etc, /tmp, /usr, etc.).

Contains the concept of a file. Comains the file initial SID. Make the specified type usable for files in a filesystem.

Make the specified type usable for files in a filesystem. Types used for files that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. If the type is used for device nodes (character or block files), then the dev_node() interface is more appropriate.

Related interfaces:

  • application_domain()
  • application_executable_file()
  • corecmd_executable_file()
  • init_daemon_domain()
  • init_domaion()
  • init_ranged_daemon_domain()
  • init_ranged_domain()
  • init_ranged_system_domain()
  • init_script_file()
  • init_script_domain()
  • init_system_domain()
  • files_config_files()
  • files_lock_file()
  • files_mountpoint()
  • files_pid_file()
  • files_security_file()
  • files_security_mountpoint()
  • files_tmp_file()
  • files_tmpfs_file()
  • logging_log_file()
  • userdom_user_home_content()

Example:

type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms;

Type to be used for files.
Mark the specified type as a file that is related to authentication. Type of the authentication-related file. Make the specified type a file that should not be dontaudited from browsing from user domains. Type of the file to be used as a member directory. Make the specified type usable for lock files. Type to be used for lock files. Make the specified type usable for filesystem mount points. Type to be used for mount points. Make the specified type usable for security file filesystem mount points. Type to be used for mount points. Make the specified type usable for runtime process ID files.

Make the specified type usable for runtime process ID files, typically found in /var/run. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a PID file type may result in problems with starting or stopping services.

Related interfaces:

  • files_pid_filetrans()

Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:

type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)

Type to be used for PID files.
Make the specified type a configuration file.

Make the specified type usable for configuration files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with configuration management tools.

Example usage with a domain that can read its configuration file /etc:

type myconffile_t; files_config_file(myconffile_t) allow mydomain_t myconffile_t:file read_file_perms; files_search_etc(mydomain_t)

Type to be used as a configuration file.
Make the specified type a polyinstantiated directory. Type of the file to be used as a polyinstantiated directory. Make the specified type a parent of a polyinstantiated directory. Type of the file to be used as a parent directory. Make the specified type a polyinstantiation member directory. Type of the file to be used as a member directory. Make the domain use the specified type of polyinstantiated directory. Domain using the polyinstantiated directory. Type of the file to be used as a member directory. Make the specified type a file used for temporary files.

Make the specified type usable for temporary files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with purging temporary files.

Related interfaces:

  • files_tmp_filetrans()

Example usage with a domain that can create and write its temporary file in the system temporary file directories (/tmp or /var/tmp):

type mytmpfile_t; files_tmp_file(mytmpfile_t) allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; files_tmp_filetrans(mydomain_t, mytmpfile_t, file)

Type of the file to be used as a temporary file.
Transform the type into a file, for use on a virtual memory filesystem (tmpfs). The type to be transformed. Get the attributes of all directories. Domain allowed access. Do not audit attempts to get the attributes of all directories. Domain to not audit. List all non-security directories. Domain allowed access. Do not audit attempts to list all non-security directories. Domain to not audit. Mount a filesystem on all non-security directories and files. Domain allowed access. Allow attempts to modify any directory Domain allowed access. Allow attempts to manage non-security directories Domain allowed access. Get the attributes of all files. Domain allowed access. Do not audit attempts to get the attributes of all files. Domain to not audit. Do not audit attempts to get the attributes of non security files. Domain to not audit. Read all files. Domain allowed access. Allow shared library text relocations in all files.

Allow shared library text relocations in all files.

This is added to support WINE policy.

Domain allowed access.
Read all non-security files. Domain allowed access. Read all directories on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Get the attributes of all symbolic links. Domain allowed access. Do not audit attempts to get the attributes of all symbolic links. Domain to not audit. Do not audit attempts to read all symbolic links. Domain to not audit. Do not audit attempts to get the attributes of non security symbolic links. Domain to not audit. Do not audit attempts to get the attributes of non security block devices. Domain to not audit. Do not audit attempts to get the attributes of non security character devices. Domain to not audit. Read all symbolic links. Domain allowed access. Get the attributes of all named pipes. Domain allowed access. Do not audit attempts to get the attributes of all named pipes. Domain to not audit. Do not audit attempts to get the attributes of non security named pipes. Domain to not audit. Get the attributes of all named sockets. Domain allowed access. Do not audit attempts to get the attributes of all named sockets. Domain to not audit. Do not audit attempts to get the attributes of non security named sockets. Domain to not audit. Read all block nodes with file types. Domain allowed access. Read all character nodes with file types. Domain allowed access. Relabel all files on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. rw all files on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except the listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Search the contents of all directories on extended attribute filesystems. Domain allowed access. List the contents of all directories on extended attribute filesystems. Domain allowed access. Do not audit attempts to search the contents of any directories on extended attribute filesystems. Domain to not audit. Get the attributes of all filesystems with the type of a file. Domain allowed access. Relabel a filesystem to the type of a file. Domain allowed access. Relabel a filesystem to the type of a file. Domain allowed access. Mount all filesystems with the type of a file. Domain allowed access. Unmount all filesystems with the type of a file. Domain allowed access. Read all non-authentication related directories. Domain allowed access. Read all non-authentication related files. Domain allowed access. Read all non-authentication related symbolic links. Domain allowed access. rw non-authentication related files. Domain allowed access. Manage non-authentication related files. Domain allowed access. Relabel all non-authentication related files. Domain allowed access. Manage all configuration directories on filesystem Domain allowed access. Relabel configuration directories Domain allowed access. Read config files in /etc. Domain allowed access. Manage all configuration files on filesystem Domain allowed access. Relabel configuration files Domain allowed access. Mount a filesystem on all mount points. Domain allowed access. Get the attributes of all mount points. Domain allowed access. Set the attributes of all mount points. Domain allowed access. Do not audit attempts to set the attributes on all mount points. Domain to not audit. Search all mount points. Domain allowed access. Do not audit searching of all mount points. Domain to not audit. Do not audit listing of all mount points. Domain to not audit. Do not audit attempts to write to mount points. Domain to not audit. List the contents of the root directory. Domain allowed access. Do not audit attempts to write to / dirs. Domain to not audit. Do not audit attempts to write files in the root directory. Domain to not audit. Create an object in the root directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Do not audit attempts to read files in the root directory. Domain to not audit. Do not audit attempts to read or write files in the root directory. Domain to not audit. Do not audit attempts to read or write character device nodes in the root directory. Domain to not audit. Delete files in the root directory. Domain allowed access. Remove entries from the root directory. Domain allowed access. Unmount a rootfs filesystem. Domain allowed access. Get attributes of the /boot directory. Domain allowed access. Do not audit attempts to get attributes of the /boot directory. Domain to not audit. Search the /boot directory. Domain allowed access. Do not audit attempts to search the /boot directory. Domain to not audit. List the /boot directory. Domain allowed access. Do not audit attempts to list the /boot directory. Domain allowed access. Create directories in /boot Domain allowed access. Create, read, write, and delete directories in /boot. Domain allowed access. Create a private type object in boot with an automatic type transition Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. read files in the /boot directory. Domain allowed access. Create, read, write, and delete files in the /boot directory. Domain allowed access. Relabel from files in the /boot directory. Domain allowed access. Read symbolic links in the /boot directory. Domain allowed access. Read and write symbolic links in the /boot directory. Domain allowed access. Create, read, write, and delete symbolic links in the /boot directory. Domain allowed access. Read kernel files in the /boot directory. Domain allowed access. Install a kernel into the /boot directory. Domain allowed access. Delete a kernel from /boot. Domain allowed access. Getattr of directories with the default file type. Domain allowed access. Do not audit attempts to get the attributes of directories with the default file type. Domain to not audit. Search the contents of directories with the default file type. Domain allowed access. List contents of directories with the default file type. Domain allowed access. Do not audit attempts to list contents of directories with the default file type. Domain to not audit. Create, read, write, and delete directories with the default file type. Domain allowed access. Mount a filesystem on a directory with the default file type. Domain allowed access. Do not audit attempts to get the attributes of files with the default file type. Domain to not audit. Read files with the default file type. Domain allowed access. Do not audit attempts to read files with the default file type. Domain to not audit. Create, read, write, and delete files with the default file type. Domain allowed access. Read symbolic links with the default file type. Domain allowed access. Read sockets with the default file type. Domain allowed access. Read named pipes with the default file type. Domain allowed access. Search the contents of /etc directories. Domain allowed access. Set the attributes of the /etc directories. Domain allowed access. List the contents of /etc directories. Domain allowed access. Do not audit attempts to write to /etc dirs. Domain to not audit. Add and remove entries from /etc directories. Domain allowed access. Manage generic directories in /etc Domain allowed access Read generic files in /etc.

Allow the specified domain to read generic files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:

  • /etc/fstab
  • /etc/passwd
  • /etc/services
  • /etc/shells

This interface does not include access to /etc/shadow.

Generally, it is safe for many domains to have this access. However, since this interface provides access to the /etc/passwd file, caution must be exercised, as user account names can be leaked through this access.

Related interfaces:

  • auth_read_shadow()
  • files_read_etc_runtime_files()
  • seutil_read_config()
Domain allowed access.
Do not audit attempts to write generic files in /etc. Domain allowed access. Read and write generic files in /etc. Domain allowed access. Create, read, write, and delete generic files in /etc. Domain allowed access. Delete system configuration files in /etc. Domain allowed access. Execute generic files in /etc. Domain allowed access. Relabel from and to generic files in /etc. Domain allowed access. Read symbolic links in /etc. Domain allowed access. Create, read, write, and delete symbolic links in /etc. Domain allowed access. Create objects in /etc with a private type using a type_transition. Domain allowed access. Private file type. Object classes to be created. The name of the object being created. Create a boot flag.

Create a boot flag, such as /.autorelabel and /.autofsck.

Domain allowed access. The name of the object being created.
Delete a boot flag.

Delete a boot flag, such as /.autorelabel and /.autofsck.

Domain allowed access.
Do not audit attempts to set the attributes of the etc_runtime files Domain allowed access. Read files in /etc that are dynamically created on boot, such as mtab.

Allow the specified domain to read dynamically created configuration files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are:

  • /etc/motd
  • /etc/mtab
  • /etc/nologin

This interface does not include access to /etc/shadow.

Domain allowed access.
Do not audit attempts to read files in /etc that are dynamically created on boot, such as mtab. Domain to not audit. Read and write files in /etc that are dynamically created on boot, such as mtab. Domain allowed access. Create, read, write, and delete files in /etc that are dynamically created on boot, such as mtab. Domain allowed access. Create, etc runtime objects with an automatic type transition. Domain allowed access. The class of the object being created. The name of the object being created. Getattr of directories on new filesystems that have not yet been labeled. Domain allowed access. Do not audit attempts to search directories on new filesystems that have not yet been labeled. Domain to not audit. List the contents of directories on new filesystems that have not yet been labeled. Domain allowed access. Read and write directories on new filesystems that have not yet been labeled. Domain allowed access. Delete directories on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete directories on new filesystems that have not yet been labeled. Domain allowed access. Mount a filesystem on a directory on new filesystems that has not yet been labeled. Domain allowed access. Read files on new filesystems that have not yet been labeled. Domain allowed access. Delete files on new filesystems that have not yet been labeled. Domain allowed access. Delete symbolic links on new filesystems that have not yet been labeled. Domain allowed access. Delete named pipes on new filesystems that have not yet been labeled. Domain allowed access. Delete named sockets on new filesystems that have not yet been labeled. Domain allowed access. Delete block files on new filesystems that have not yet been labeled. Domain allowed access. Do not audit attempts to write to character files that have not yet been labeled. Domain to not audit. Delete chr files on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete files on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete symbolic links on new filesystems that have not yet been labeled. Domain allowed access. Read and write block device nodes on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete block device nodes on new filesystems that have not yet been labeled. Domain allowed access. Create, read, write, and delete character device nodes on new filesystems that have not yet been labeled. Domain allowed access. Get the attributes of the home directories root (/home). Domain allowed access. Do not audit attempts to get the attributes of the home directories root (/home). Domain to not audit. Search home directories root (/home). Domain allowed access. Do not audit attempts to search home directories root (/home). Domain to not audit. Do not audit attempts to list home directories root (/home). Domain to not audit. Get listing of home directories. Domain allowed access. Relabel to user home root (/home). Domain allowed access. Create objects in /home. Domain allowed access. The private type. The class of the object being created. The name of the object being created. Get the attributes of lost+found directories. Domain allowed access. Do not audit attempts to get the attributes of lost+found directories. Domain to not audit. List the contents of lost+found directories. Domain allowed access. Create, read, write, and delete objects in lost+found directories. Domain allowed access. Search the contents of /mnt. Domain allowed access. Do not audit attempts to search /mnt. Domain to not audit. List the contents of /mnt. Domain allowed access. Do not audit attempts to list the contents of /mnt. Domain allowed access. Mount a filesystem on /mnt. Domain allowed access. Create, read, write, and delete directories in /mnt. Domain allowed access. Create, read, write, and delete files in /mnt. Domain allowed access. read files in /mnt. Domain allowed access. Read symbolic links in /mnt. Domain allowed access. Create, read, write, and delete symbolic links in /mnt. Domain allowed access. Search the contents of the kernel module directories. Domain allowed access. List the contents of the kernel module directories. Domain allowed access. Get the attributes of kernel module files. Domain allowed access. Read kernel module files. Domain allowed access. Write kernel module files. Domain allowed access. Delete kernel module files. Domain allowed access. Create, read, write, and delete kernel module files. Domain allowed access. Relabel from and to kernel module files. Domain allowed access. Create objects in the kernel module directories with a private type via an automatic type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. List world-readable directories. Domain allowed access. Read world-readable files. Domain allowed access. Read world-readable symbolic links. Domain allowed access. Read world-readable named pipes. Domain allowed access. Read world-readable sockets. Domain allowed access. Allow the specified type to associate to a filesystem with the type of the temporary directory (/tmp). Type of the file to associate. Get the attributes of the tmp directory (/tmp). Domain allowed access. Do not audit attempts to get the attributes of the tmp directory (/tmp). Domain allowed access. Search the tmp directory (/tmp). Domain allowed access. Do not audit attempts to search the tmp directory (/tmp). Domain to not audit. Read the tmp directory (/tmp). Domain allowed access. Do not audit listing of the tmp directory (/tmp). Domain not to audit. Remove entries from the tmp directory. Domain allowed access. Read files in the tmp directory (/tmp). Domain allowed access. Manage temporary directories in /tmp. Domain allowed access. Manage temporary files and directories in /tmp. Domain allowed access. Read symbolic links in the tmp directory (/tmp). Domain allowed access. Read and write generic named sockets in the tmp directory (/tmp). Domain allowed access. Set the attributes of all tmp directories. Domain allowed access. List all tmp directories. Domain allowed access. Relabel to and from all temporary directory types. Domain allowed access. Do not audit attempts to get the attributes of all tmp files. Domain not to audit. Allow attempts to get the attributes of all tmp files. Domain allowed access. Relabel to and from all temporary file types. Domain allowed access. Do not audit attempts to get the attributes of all tmp sock_file. Domain not to audit. Read all tmp files. Domain allowed access. Create an object in the tmp directories, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Delete the contents of /tmp. Domain allowed access. Set the attributes of the /usr directory. Domain allowed access. Search the content of /usr. Domain allowed access. List the contents of generic directories in /usr. Domain allowed access. Do not audit write of /usr dirs Domain to not audit. Add and remove entries from /usr directories. Domain allowed access. Do not audit attempts to add and remove entries from /usr directories. Domain to not audit. Delete generic directories in /usr in the caller domain. Domain allowed access. Delete generic files in /usr in the caller domain. Domain allowed access. Get the attributes of files in /usr. Domain allowed access. Read generic files in /usr.

Allow the specified domain to read generic files in /usr. These files are various program files that do not have more specific SELinux types. Some examples of these files are:

  • /usr/include/*
  • /usr/share/doc/*
  • /usr/share/info/*

Generally, it is safe for many domains to have this access.

Domain allowed access.
Execute generic programs in /usr in the caller domain. Domain allowed access. dontaudit write of /usr files Domain to not audit. Create, read, write, and delete files in the /usr directory. Domain allowed access. Relabel a file to the type used in /usr. Domain allowed access. Relabel a file from the type used in /usr. Domain allowed access. Read symbolic links in /usr. Domain allowed access. Create objects in the /usr directory Domain allowed access. The type of the object to be created The object class. The name of the object being created. Do not audit attempts to search /usr/src. Domain to not audit. Get the attributes of files in /usr/src. Domain allowed access. Read files in /usr/src. Domain allowed access. Execute programs in /usr/src in the caller domain. Domain allowed access. Install a system.map into the /boot directory. Domain allowed access. Read system.map in the /boot directory. Domain allowed access. Delete a system.map in the /boot directory. Domain allowed access. Search the contents of /var. Domain allowed access. Do not audit attempts to write to /var. Domain to not audit. Allow attempts to write to /var.dirs Domain allowed access. Do not audit attempts to search the contents of /var. Domain to not audit. List the contents of /var. Domain allowed access. Create, read, write, and delete directories in the /var directory. Domain allowed access. Read files in the /var directory. Domain allowed access. Append files in the /var directory. Domain allowed access. Read and write files in the /var directory. Domain allowed access. Do not audit attempts to read and write files in the /var directory. Domain to not audit. Create, read, write, and delete files in the /var directory. Domain allowed access. Read symbolic links in the /var directory. Domain allowed access. Create, read, write, and delete symbolic links in the /var directory. Domain allowed access. Create objects in the /var directory Domain allowed access. The type of the object to be created The object class. The name of the object being created. Get the attributes of the /var/lib directory. Domain allowed access. Search the /var/lib directory.

Search the /var/lib directory. This is necessary to access files or directories under /var/lib that have a private type. For example, a domain accessing a private library file in the /var/lib directory:

allow mydomain_t mylibfile_t:file read_file_perms; files_search_var_lib(mydomain_t)

Domain allowed access.
Do not audit attempts to search the contents of /var/lib. Domain to not audit. List the contents of the /var/lib directory. Domain allowed access. Read-write /var/lib directories Domain allowed access. Create objects in the /var/lib directory Domain allowed access. The type of the object to be created The object class. The name of the object being created. Read generic files in /var/lib. Domain allowed access. Read generic symbolic links in /var/lib Domain allowed access. Create, read, write, and delete the pseudorandom number generator seed. Domain allowed access. Allow domain to manage mount tables necessary for rpcd, nfsd, etc. Domain allowed access. Set the attributes of the generic lock directories. Domain allowed access. Search the locks directory (/var/lock). Domain allowed access. Do not audit attempts to search the locks directory (/var/lock). Domain to not audit. List generic lock directories. Domain allowed access. Add and remove entries in the /var/lock directories. Domain allowed access. Create lock directories Domain allowed access Relabel to and from all lock directory types. Domain allowed access. Get the attributes of generic lock files. Domain allowed access. Delete generic lock files. Domain allowed access. Create, read, write, and delete generic lock files. Domain allowed access. Delete all lock files. Domain allowed access. Read all lock files. Domain allowed access. manage all lock files. Domain allowed access. Create an object in the locks directory, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Do not audit attempts to get the attributes of the /var/run directory. Domain to not audit. Set the attributes of the /var/run directory. Domain allowed access. Search the contents of runtime process ID directories (/var/run). Domain allowed access. Do not audit attempts to search the /var/run directory. Domain to not audit. List the contents of the runtime process ID directories (/var/run). Domain allowed access. Read generic process ID files. Domain allowed access. Write named generic process ID pipes Domain allowed access. Create an object in the process ID directory, with a private type.

Create an object in the process ID directory (e.g., /var/run) with a private type. Typically this is used for creating private PID files in /var/run with the private type instead of the general PID file type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.

Related interfaces:

  • files_pid_file()

Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory:

type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file)

Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created.
Create a generic lock directory within the run directories Domain allowed access The name of the object being created. Read and write generic process ID files. Domain allowed access. Do not audit attempts to get the attributes of daemon runtime data files. Domain to not audit. Do not audit attempts to write to daemon runtime data files. Domain to not audit. Do not audit attempts to ioctl daemon runtime data files. Domain to not audit. Read all process ID files. Domain allowed access. Mount filesystems on all polyinstantiation member directories. Domain allowed access. Delete all process IDs. Domain allowed access. Delete all process ID directories. Domain allowed access. Search the contents of generic spool directories (/var/spool). Domain allowed access. Do not audit attempts to search generic spool directories. Domain to not audit. List the contents of generic spool (/var/spool) directories. Domain allowed access. Create, read, write, and delete generic spool directories (/var/spool). Domain allowed access. Read generic spool files. Domain allowed access. Create, read, write, and delete generic spool files. Domain allowed access. Create objects in the spool directory with a private type with a type transition. Domain allowed access. Type to which the created node will be transitioned. Object class(es) (single or set including {}) for which this the transition will occur. The name of the object being created. Allow access to manage all polyinstantiated directories on the system. Domain allowed access. Unconfined access to files. Domain allowed access.
Policy for filesystems. Contains the initial SID for the filesystems. Transform specified type into a filesystem type. Domain allowed access. Transform specified type into a filesystem type which does not have extended attribute support. Domain allowed access. Associate the specified file type to persistent filesystems with extended attributes. This allows a file of this type to be created on a filesystem such as ext3, JFS, and XFS. The type of the to be associated. Associate the specified file type to filesystems which lack extended attributes support. This allows a file of this type to be created on a filesystem such as FAT32, and NFS. The type of the to be associated. Execute files on a filesystem that does not support extended attributes. Domain allowed access. Mount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain allowed access. Remount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. This allows some mount options to be changed. Domain allowed access. Unmount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain allowed access. Get the attributes of persistent filesystems which have extended attributes, such as ext3, JFS, or XFS.

Allow the specified domain to get the attributes of a persistent filesystems which have extended attributes, such as ext3, JFS, or XFS. Example attributes:

  • Type of the file system (e.g., ext3)
  • Size of the file system
  • Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes of a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. Domain to not audit. Allow changing of the label of a filesystem with extended attributes using the context= mount option. Domain allowed access. Get the filesystem quotas of a filesystem with extended attributes. Domain allowed access. Set the filesystem quotas of a filesystem with extended attributes. Domain allowed access. Read files on anon_inodefs file systems. Domain allowed access. Read and write files on anon_inodefs file systems. Domain allowed access. Do not audit attempts to read or write files on anon_inodefs file systems. Domain to not audit. Mount an automount pseudo filesystem. Domain allowed access. Remount an automount pseudo filesystem This allows some mount options to be changed. Domain allowed access. Unmount an automount pseudo filesystem. Domain allowed access. Get the attributes of an automount pseudo filesystem. Domain allowed access. Search automount filesystem to use automatically mounted filesystems. Allow the specified domain to search mount points that have filesystems that are mounted by the automount service. Generally this will be required for any domain that accesses objects on these filesystems. Domain allowed access. Read directories of automatically mounted filesystems. Domain allowed access. Do not audit attempts to list directories of automatically mounted filesystems. Domain to not audit. Create, read, write, and delete symbolic links on an autofs filesystem. Domain allowed access. Get the attributes of directories on binfmt_misc filesystems. Domain allowed access. Register an interpreter for new binary file types, using the kernel binfmt_misc support.

Register an interpreter for new binary file types, using the kernel binfmt_misc support.

A common use for this is to register a JVM as an interpreter for Java byte code. Registered binaries can be directly executed on a command line without specifying the interpreter.

Domain allowed access.
Mount cgroup filesystems. Domain allowed access. Remount cgroup filesystems. Domain allowed access. Unmount cgroup filesystems. Domain allowed access. Get attributes of cgroup filesystems. Domain allowed access. Search cgroup directories. Domain allowed access. list cgroup directories. Domain allowed access. Delete cgroup directories. Domain allowed access. Manage cgroup directories. Domain allowed access. Read cgroup files. Domain allowed access. Write cgroup files. Domain allowed access. Read and write cgroup files. Domain allowed access. Do not audit attempts to open, get attributes, read and write cgroup files. Domain to not audit. Manage cgroup files. Domain allowed access. Mount on cgroup directories. Domain allowed access. Do not audit attempts to read dirs on a CIFS or SMB filesystem. Domain to not audit. Mount a CIFS or SMB network filesystem. Domain allowed access. Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a CIFS or SMB network filesystem. Domain allowed access. Get the attributes of a CIFS or SMB network filesystem. Domain allowed access. Search directories on a CIFS or SMB filesystem. Domain allowed access. List the contents of directories on a CIFS or SMB filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. Domain to not audit. Mounton a CIFS filesystem. Domain allowed access. Read files on a CIFS or SMB filesystem. Domain allowed access. Get the attributes of filesystems that do not have extended attribute support. Domain allowed access. Read all noxattrfs directories. Domain allowed access. Do not audit attempts to list all noxattrfs directories. Domain to not audit. Create, read, write, and delete all noxattrfs directories. Domain allowed access. Read all noxattrfs files. Domain allowed access. Do not audit attempts to read all noxattrfs files. Domain to not audit. Dont audit attempts to write to noxattrfs files. Domain to not audit. Create, read, write, and delete all noxattrfs files. Domain allowed access. Read all noxattrfs symbolic links. Domain allowed access. Relabel all objets from filesystems that do not support extended attributes. Domain allowed access. Do not audit attempts to read files on a CIFS or SMB filesystem. Domain to not audit. Append files on a CIFS filesystem. Domain allowed access. dontaudit Append files on a CIFS filesystem. Domain to not audit. Do not audit attempts to read or write files on a CIFS or SMB filesystem. Domain to not audit. Read symbolic links on a CIFS or SMB filesystem. Domain allowed access. Read named pipes on a CIFS or SMB network filesystem. Domain allowed access. Read named pipes on a CIFS or SMB network filesystem. Domain allowed access. Execute files on a CIFS or SMB network filesystem, in the caller domain. Domain allowed access. Create, read, write, and delete directories on a CIFS or SMB network filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a CIFS or SMB network filesystem. Domain to not audit. Create, read, write, and delete files on a CIFS or SMB network filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a CIFS or SMB network filesystem. Domain to not audit. Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. Domain allowed access. Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. Domain allowed access. Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. Domain allowed access. Execute a file on a CIFS or SMB filesystem in the specified domain.

Execute a file on a CIFS or SMB filesystem in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle home directories on CIFS/SMB filesystems, in particular used by the ssh-agent policy.

Domain allowed to transition. The type of the new process.
Create, read, write, and delete dirs on a configfs filesystem. Domain allowed access. Create, read, write, and delete files on a configfs filesystem. Domain allowed access. Mount a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Remount a DOS filesystem, such as FAT32 or NTFS. This allows some mount options to be changed. Domain allowed access. Unmount a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Get the attributes of a DOS filesystem, such as FAT32 or NTFS. Domain allowed access. Allow changing of the label of a DOS filesystem using the context= mount option. Domain allowed access. Search dosfs filesystem. Domain allowed access. List dirs DOS filesystem. Domain allowed access. Create, read, write, and delete dirs on a DOS filesystem. Domain allowed access. Read files on a DOS filesystem. Domain allowed access. Create, read, write, and delete files on a DOS filesystem. Domain allowed access. Read eventpollfs files.

Read eventpollfs files

This interface has been deprecated, and will be removed in the future.

Domain allowed access.
Mount a FUSE filesystem. Domain allowed access. Unmount a FUSE filesystem. Domain allowed access. Mounton a FUSEFS filesystem. Domain allowed access. Search directories on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a FUSEFS filesystem. Domain to not audit. Create, read, write, and delete directories on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a FUSEFS filesystem. Domain to not audit. Read, a FUSEFS filesystem. Domain allowed access. Execute files on a FUSEFS filesystem. Domain allowed access. Create, read, write, and delete files on a FUSEFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a FUSEFS filesystem. Domain to not audit. Read symbolic links on a FUSEFS filesystem. Domain allowed access. Get the attributes of an hugetlbfs filesystem. Domain allowed access. List hugetlbfs. Domain allowed access. Manage hugetlbfs dirs. Domain allowed access. Read and write hugetlbfs files. Domain allowed access. Allow the type to associate to hugetlbfs filesystems. The type of the object to be associated. Search inotifyfs filesystem. Domain allowed access. List inotifyfs filesystem. Domain allowed access. Dontaudit List inotifyfs filesystem. Domain to not audit. Create an object in a hugetlbfs filesystem, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Mount an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Remount an iso9660 filesystem, which is usually used on CDs. This allows some mount options to be changed. Domain allowed access. Unmount an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Get the attributes of an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Read files on an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Read files on an iso9660 filesystem, which is usually used on CDs. Domain allowed access. Mount a NFS filesystem. Domain allowed access. Remount a NFS filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a NFS filesystem. Domain allowed access. Get the attributes of a NFS filesystem. Domain allowed access. Search directories on a NFS filesystem. Domain allowed access. List NFS filesystem. Domain allowed access. Do not audit attempts to list the contents of directories on a NFS filesystem. Domain to not audit. Mounton a NFS filesystem. Domain allowed access. Read files on a NFS filesystem. Domain allowed access. Do not audit attempts to read files on a NFS filesystem. Domain to not audit. Read files on a NFS filesystem. Domain allowed access. Execute files on a NFS filesystem. Domain allowed access. Append files on a NFS filesystem. Domain allowed access. dontaudit Append files on a NFS filesystem. Domain to not audit. Do not audit attempts to read or write files on a NFS filesystem. Domain to not audit. Read symbolic links on a NFS filesystem. Domain allowed access. Dontaudit read symbolic links on a NFS filesystem. Domain to not audit. Read named sockets on a NFS filesystem. Domain allowed access. Read named pipes on a NFS network filesystem. Domain allowed access. Read directories of RPC file system pipes. Domain allowed access. Search directories of RPC file system pipes. Domain allowed access. Search removable storage directories. Domain allowed access. Do not audit attempts to list removable storage directories. Domain not to audit. Read removable storage files. Domain allowed access. Do not audit attempts to read removable storage files. Domain not to audit. Do not audit attempts to write removable storage files. Domain not to audit. Read removable storage symbolic links. Domain allowed access. Read block nodes on removable filesystems. Domain allowed access. Read and write block nodes on removable filesystems. Domain allowed access. Read directories of RPC file system pipes. Domain allowed access. Read files of RPC file system pipes. Domain allowed access. Read symbolic links of RPC file system pipes. Domain allowed access. Read sockets of RPC file system pipes. Domain allowed access. Read and write sockets of RPC file system pipes. Domain allowed access. Create, read, write, and delete directories on a NFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a NFS filesystem. Domain to not audit. Create, read, write, and delete files on a NFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a NFS filesystem. Domain to not audit. Create, read, write, and delete symbolic links on a NFS network filesystem. Domain allowed access. Create, read, write, and delete named pipes on a NFS filesystem. Domain allowed access. Create, read, write, and delete named sockets on a NFS filesystem. Domain allowed access. Execute a file on a NFS filesystem in the specified domain.

Execute a file on a NFS filesystem in the specified domain. This allows the specified domain to execute any file on a NFS filesystem in the specified domain. This is not suggested.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

This interface was added to handle home directories on NFS filesystems, in particular used by the ssh-agent policy.

Domain allowed to transition. The type of the new process.
Mount a NFS server pseudo filesystem. Domain allowed access. Mount a NFS server pseudo filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a NFS server pseudo filesystem. Domain allowed access. Get the attributes of a NFS server pseudo filesystem. Domain allowed access. Search NFS server directories. Domain allowed access. List NFS server directories. Domain allowed access. Getattr files on an nfsd filesystem Domain allowed access. Read and write NFS server files. Domain allowed access. Allow the type to associate to ramfs filesystems. The type of the object to be associated. Mount a RAM filesystem. Domain allowed access. Remount a RAM filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a RAM filesystem. Domain allowed access. Get the attributes of a RAM filesystem. Domain allowed access. Search directories on a ramfs Domain allowed access. Dontaudit Search directories on a ramfs Domain to not audit. Create, read, write, and delete directories on a ramfs. Domain allowed access. Dontaudit read on a ramfs files. Domain to not audit. Dontaudit read on a ramfs fifo_files. Domain to not audit. Create, read, write, and delete files on a ramfs filesystem. Domain allowed access. Write to named pipe on a ramfs filesystem. Domain allowed access. Do not audit attempts to write to named pipes on a ramfs filesystem. Domain to not audit. Read and write a named pipe on a ramfs filesystem. Domain allowed access. Create, read, write, and delete named pipes on a ramfs filesystem. Domain allowed access. Write to named socket on a ramfs filesystem. Domain allowed access. Create, read, write, and delete named sockets on a ramfs filesystem. Domain allowed access. Mount a ROM filesystem. Domain allowed access. Remount a ROM filesystem. This allows some mount options to be changed. Domain allowed access. Unmount a ROM filesystem. Domain allowed access. Get the attributes of a ROM filesystem. Domain allowed access. Mount a RPC pipe filesystem. Domain allowed access. Remount a RPC pipe filesystem. This allows some mount option to be changed. Domain allowed access. Unmount a RPC pipe filesystem. Domain allowed access. Get the attributes of a RPC pipe filesystem. Domain allowed access. Read and write RPC pipe filesystem named pipes. Domain allowed access. Mount a tmpfs filesystem. Domain allowed access. Remount a tmpfs filesystem. Domain allowed access. Unmount a tmpfs filesystem. Domain allowed access. Get the attributes of a tmpfs filesystem. Domain allowed access. Allow the type to associate to tmpfs filesystems. The type of the object to be associated. Get the attributes of tmpfs directories. Domain allowed access. Do not audit attempts to get the attributes of tmpfs directories. Domain to not audit. Set the attributes of tmpfs directories. Domain allowed access. Search tmpfs directories. Domain allowed access. List the contents of generic tmpfs directories. Domain allowed access. Do not audit attempts to list the contents of generic tmpfs directories. Domain to not audit. Create, read, write, and delete tmpfs directories Domain allowed access. Do not audit attempts to write tmpfs directories Domain to not audit. Create an object in a tmpfs filesystem, with a private type using a type transition. Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created. Do not audit attempts to getattr generic tmpfs files. Domain to not audit. Do not audit attempts to read or write generic tmpfs files. Domain to not audit. Create, read, write, and delete auto moutpoints. Domain allowed access. Read generic tmpfs files. Domain allowed access. Read and write generic tmpfs files. Domain allowed access. Read tmpfs link files. Domain allowed access. Read and write character nodes on tmpfs filesystems. Domain allowed access. dontaudit Read and write character nodes on tmpfs filesystems. Domain to not audit. Relabel character nodes on tmpfs filesystems. Domain allowed access. Read and write block nodes on tmpfs filesystems. Domain allowed access. Relabel block nodes on tmpfs filesystems. Domain allowed access. Read and write, create and delete generic files on tmpfs filesystems. Domain allowed access. Read and write, create and delete symbolic links on tmpfs filesystems. Domain allowed access. Read and write, create and delete socket files on tmpfs filesystems. Domain allowed access. Read and write, create and delete character nodes on tmpfs filesystems. Domain allowed access. Read and write, create and delete block nodes on tmpfs filesystems. Domain allowed access. Mount a XENFS filesystem. Domain allowed access. Search the XENFS filesystem. Domain allowed access. Create, read, write, and delete directories on a XENFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete directories on a XENFS filesystem. Domain to not audit. Create, read, write, and delete files on a XENFS filesystem. Domain allowed access. Do not audit attempts to create, read, write, and delete files on a XENFS filesystem. Domain to not audit. Mount all filesystems. Domain allowed access. Remount all filesystems. This allows some mount options to be changed. Domain allowed access. Unmount all filesystems. Domain allowed access. Get the attributes of all filesystems.

Allow the specified domain to et the attributes of all filesystems. Example attributes:

  • Type of the file system (e.g., ext3)
  • Size of the file system
  • Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes all filesystems. Domain to not audit. Get the quotas of all filesystems. Domain allowed access. Set the quotas of all filesystems. Domain allowed access. Relabelfrom all filesystems. Domain allowed access. Get the attributes of all directories with a filesystem type. Domain allowed access. Search all directories with a filesystem type. Domain allowed access. List all directories with a filesystem type. Domain allowed access. Get the attributes of all files with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all files with a filesystem type. Domain to not audit. Get the attributes of all symbolic links with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all symbolic links with a filesystem type. Domain to not audit. Get the attributes of all named pipes with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all named pipes with a filesystem type. Domain to not audit. Get the attributes of all named sockets with a filesystem type. Domain allowed access. Do not audit attempts to get the attributes of all named sockets with a filesystem type. Domain to not audit. Get the attributes of all block device nodes with a filesystem type. Domain allowed access. Get the attributes of all character device nodes with a filesystem type. Domain allowed access. Unconfined access to filesystems Domain allowed access.
Policy for kernel threads, proc filesystem, and unlabeled processes and objects. This module has initial SIDs. Allows to start userland processes by transitioning to the specified domain. The process type entered by kernel. The executable type for the entrypoint. Allows to start userland processes by transitioning to the specified domain, with a range transition. The process type entered by kernel. The executable type for the entrypoint. Range for the domain. Allows the kernel to mount filesystems on the specified directory type. The type of the directory to use as a mountpoint. Set the process group of kernel threads. Domain allowed access. Set the priority of kernel threads. Domain allowed access. Send a SIGCHLD signal to kernel threads. Domain allowed access. Send a kill signal to kernel threads. Domain allowed access. Send a generic signal to kernel threads. Domain allowed access. Allows the kernel to share state information with the caller. The type of the process with which to share state information. Permits caller to use kernel file descriptors. Domain allowed access. Do not audit attempts to use kernel file descriptors. Domain to not audit. Read and write kernel unnamed pipes. Domain allowed access. Read and write kernel unix datagram sockets. Domain allowed access. Send messages to kernel unix datagram sockets. Domain allowed access. Receive messages from kernel TCP sockets. (Deprecated) Domain allowed access. Send UDP network traffic to the kernel. (Deprecated) Domain allowed access. Receive messages from kernel UDP sockets. (Deprecated) Domain allowed access. Allows caller to load kernel modules Domain allowed access. Allow search the kernel key ring. Domain allowed access. dontaudit search the kernel key ring. Domain to not audit. Allow link to the kernel key ring. Domain allowed access. dontaudit link to the kernel key ring. Domain to not audit. Allows caller to read the ring buffer. Domain allowed access. Do not audit attempts to read the ring buffer. Domain to not audit. Change the level of kernel messages logged to the console. Domain allowed access. Allows the caller to clear the ring buffer. Domain allowed access. Allows caller to request the kernel to load a module

Allow the specified domain to request that the kernel load a kernel module. An example of this is the auto-loading of network drivers when doing an ioctl() on a network interface.

In the specific case of a module loading request on a network interface, the domain will also need the net_admin capability.

Domain allowed access.
Do not audit requests to the kernel to load a module. Domain to not audit. Get information on all System V IPC objects. Domain allowed access. Get the attributes of a kernel debugging filesystem. Domain allowed access. Mount a kernel debugging filesystem. Domain allowed access. Unmount a kernel debugging filesystem. Domain allowed access. Remount a kernel debugging filesystem. Domain allowed access. Search the contents of a kernel debugging filesystem. Domain allowed access. Do not audit attempts to search the kernel debugging filesystem. Domain to not audit. Read information from the debugging filesystem. Domain allowed access. Do not audit attempts to write kernel debugging filesystem dirs. Domain to not audit. Manage information from the debugging filesystem. Domain allowed access. Mount a kernel VM filesystem. Domain allowed access. Unmount the proc filesystem. Domain allowed access. Get the attributes of the proc filesystem. Domain allowed access. Do not audit attempts to set the attributes of directories in /proc. Domain to not audit. Search directories in /proc. Domain allowed access. List the contents of directories in /proc. Domain allowed access. Do not audit attempts to list the contents of directories in /proc. Domain to not audit. Do not audit attempts to write the directories in /proc. Domain to not audit. Get the attributes of files in /proc. Domain allowed access. Read generic symbolic links in /proc.

Allow the specified domain to read (follow) generic symbolic links (symlinks) in the proc filesystem (/proc). This interface does not include access to the targets of these links. An example symlink is /proc/self.

Domain allowed access.
Allows caller to read system state information in /proc.

Allow the specified domain to read general system state information from the proc filesystem (/proc).

Generally it should be safe to allow this access. Some example files that can be read based on this interface:

  • /proc/cpuinfo
  • /proc/meminfo
  • /proc/uptime

This does not allow access to sysctl entries (/proc/sys/*) nor process state information (/proc/pid).

Domain allowed access.
Write to generic proc entries. Domain allowed access. Do not audit attempts by caller to read system state information in proc. Domain to not audit. Do not audit attempts by caller to read system state information in proc. Domain to not audit. Allow caller to read and write state information for AFS. Domain allowed access. Allow caller to read the state information for software raid. Domain allowed access. Allow caller to read and set the state information for software raid. Domain allowed access. Allows caller to get attribues of core kernel interface. Domain allowed access. Do not audit attempts to get the attributes of core kernel interfaces. Domain to not audit. Allows caller to read the core kernel interface. Domain allowed access. Allow caller to read kernel messages using the /proc/kmsg interface. Domain allowed access. Allow caller to get the attributes of kernel message interface (/proc/kmsg). Domain allowed access. Do not audit attempts by caller to get the attributes of kernel message interfaces. Domain to not audit. Do not audit attempts to search the network state directory. Domain to not audit. Allow searching of network state directory. Domain allowed access. Read the network state information.

Allow the specified domain to read the networking state information. This includes several pieces of networking information, such as network interface names, netfilter (iptables) statistics, protocol information, routes, and remote procedure call (RPC) information.

Domain allowed access.
Allow caller to read the network state symbolic links. Domain allowed access. Allow searching of xen state directory. Domain allowed access. Do not audit attempts to search the xen state directory. Domain to not audit. Allow caller to read the xen state information. Domain allowed access. Allow caller to read the xen state symbolic links. Domain allowed access. Allow caller to write xen state information. Domain allowed access. Allow attempts to list all proc directories. Domain allowed access. Do not audit attempts to list all proc directories. Domain to not audit. Do not audit attempts by caller to search the base directory of sysctls. Domain to not audit. Allow access to read sysctl directories. Domain allowed access. Allow caller to read the device sysctls. Domain allowed access. Read and write device sysctls. Domain allowed access. Allow caller to search virtual memory sysctls. Domain allowed access. Allow caller to read virtual memory sysctls. Domain allowed access. Read and write virtual memory sysctls. Domain allowed access. Search network sysctl directories. Domain allowed access. Do not audit attempts by caller to search network sysctl directories. Domain to not audit. Allow caller to read network sysctls. Domain allowed access. Allow caller to modiry contents of sysctl network files. Domain allowed access. Allow caller to read unix domain socket sysctls. Domain allowed access. Read and write unix domain socket sysctls. Domain allowed access. Read the hotplug sysctl. Domain allowed access. Read and write the hotplug sysctl. Domain allowed access. Read the modprobe sysctl. Domain allowed access. Read and write the modprobe sysctl. Domain allowed access. Do not audit attempts to search generic kernel sysctls. Domain to not audit. Read generic crypto sysctls. Domain allowed access. Read general kernel sysctls.

Allow the specified domain to read general kernel sysctl settings. These settings are typically read using the sysctl program. The settings that are included by this interface are prefixed with "kernel.", for example, kernel.sysrq.

This does not include access to the hotplug handler setting (kernel.hotplug) nor the module installer handler setting (kernel.modprobe).

Related interfaces:

  • kernel_rw_kernel_sysctl()
Domain allowed access.
Do not audit attempts to write generic kernel sysctls. Domain to not audit. Read and write generic kernel sysctls. Domain allowed access. Read filesystem sysctls. Domain allowed access. Read and write fileystem sysctls. Domain allowed access. Read IRQ sysctls. Domain allowed access. Read and write IRQ sysctls. Domain allowed access. Read RPC sysctls. Domain allowed access. Read and write RPC sysctls. Domain allowed access. Do not audit attempts to list all sysctl directories. Domain to not audit. Allow caller to read all sysctls. Domain allowed access. Read and write all sysctls. Domain allowed access. Send a kill signal to unlabeled processes. Domain allowed access. Mount a kernel unlabeled filesystem. Domain allowed access. Unmount a kernel unlabeled filesystem. Domain allowed access. Send general signals to unlabeled processes. Domain allowed access. Send a null signal to unlabeled processes. Domain allowed access. Send a stop signal to unlabeled processes. Domain allowed access. Send a child terminated signal to unlabeled processes. Domain allowed access. List unlabeled directories. Domain allowed access. Read the process state (/proc/pid) of all unlabeled_t. Domain allowed access. Do not audit attempts to list unlabeled directories. Domain allowed access. Read and write unlabeled directories. Domain allowed access. Read and write unlabeled files. Domain allowed access. Do not audit attempts by caller to get the attributes of an unlabeled file. Domain to not audit. Do not audit attempts by caller to read an unlabeled file. Domain to not audit. Do not audit attempts by caller to get the attributes of unlabeled symbolic links. Domain to not audit. Do not audit attempts by caller to get the attributes of unlabeled named pipes. Domain to not audit. Do not audit attempts by caller to get the attributes of unlabeled named sockets. Domain to not audit. Do not audit attempts by caller to get attributes for unlabeled block devices. Domain to not audit. Read and write unlabeled block device nodes. Domain allowed access. Do not audit attempts by caller to get attributes for unlabeled character devices. Domain to not audit. Allow caller to relabel unlabeled directories. Domain allowed access. Allow caller to relabel unlabeled files. Domain allowed access. Allow caller to relabel unlabeled symbolic links. Domain allowed access. Allow caller to relabel unlabeled named pipes. Domain allowed access. Allow caller to relabel unlabeled named sockets. Domain allowed access. Send and receive messages from an unlabeled IPSEC association.

Send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_non_ipsec_sendrecv() should be used instead of this one.

Domain allowed access.
Do not audit attempts to send and receive messages from an unlabeled IPSEC association.

Do not audit attempts to send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_dontaudit_non_ipsec_sendrecv() should be used instead of this one.

Domain to not audit.
Receive TCP packets from an unlabeled connection.

Receive TCP packets from an unlabeled connection.

The corenetwork interface corenet_tcp_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive TCP packets from an unlabeled connection.

Do not audit attempts to receive TCP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Receive UDP packets from an unlabeled connection.

Receive UDP packets from an unlabeled connection.

The corenetwork interface corenet_udp_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive UDP packets from an unlabeled connection.

Do not audit attempts to receive UDP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_udp_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Receive Raw IP packets from an unlabeled connection.

Receive Raw IP packets from an unlabeled connection.

The corenetwork interface corenet_raw_recv_unlabeled() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive Raw IP packets from an unlabeled connection.

Do not audit attempts to receive Raw IP packets from an unlabeled connection.

The corenetwork interface corenet_dontaudit_raw_recv_unlabeled() should be used instead of this one.

Domain to not audit.
Send and receive unlabeled packets.

Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules.

The corenetwork interface corenet_sendrecv_unlabeled_packets() should be used instead of this one.

Domain allowed access.
Receive packets from an unlabeled peer.

Receive packets from an unlabeled peer, these packets do not have any peer labeling information present.

The corenetwork interface corenet_recvfrom_unlabeled_peer() should be used instead of this one.

Domain allowed access.
Do not audit attempts to receive packets from an unlabeled peer.

Do not audit attempts to receive packets from an unlabeled peer, these packets do not have any peer labeling information present.

The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled() should be used instead of this one.

Domain to not audit.
Relabel from unlabeled database objects. Domain allowed access. Unconfined access to kernel module resources. Domain allowed access.

Disable kernel module loading.

Multicategory security policy Contains attributes used in MCS policy. This domain is allowed to read files and directories regardless of their MCS category set. Domain target for user exemption. This domain is allowed to write files and directories regardless of their MCS category set. Domain target for user exemption. This domain is allowed to sigkill and sigstop all domains regardless of their MCS category set. Domain target for user exemption. This domain is allowed to ptrace all domains regardless of their MCS category set. Domain target for user exemption. Make specified domain MCS trusted for setting any category set for the processes it executes. Domain target for user exemption. Multilevel security policy

This module contains interfaces for handling multilevel security. The interfaces allow the specified subjects and objects to be allowed certain privileges in the MLS rules.

Contains attributes used in MLS policy. Make specified domain MLS trusted for reading from files up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from files at all levels. (Deprecated)

Make specified domain MLS trusted for reading from files at all levels.

This interface has been deprecated, please use mls_file_read_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for reading from files at all levels. Domain allowed access. Make specified domain MLS trusted for write to files up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to files at all levels. (Deprecated)

Make specified domain MLS trusted for writing to files at all levels.

This interface has been deprecated, please use mls_file_write_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for writing to files at all levels. Domain allowed access. Make specified domain MLS trusted for raising the level of files. Domain allowed access. Make specified domain MLS trusted for lowering the level of files. Domain allowed access. Make specified domain trusted to be written to within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. Domain allowed access. Make specified domain MLS trusted for reading from sockets at any level. Domain allowed access. Make specified domain MLS trusted for reading from sockets at any level that is dominated by the process clearance. Domain allowed access. Make specified domain MLS trusted for writing to sockets up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to sockets at any level. Domain allowed access. Make specified domain MLS trusted for receiving network data from network interfaces or hosts at any level. Domain allowed access. Make specified domain trusted to write to network objects within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. Domain allowed access. Make specified domain trusted to write inbound packets regardless of the network's or node's MLS range. Domain allowed access. Make specified domain trusted to write outbound packets regardless of the network's or node's MLS range. Domain allowed access. Make specified domain MLS trusted for reading from System V IPC objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from System V IPC objects at any level. Domain allowed access. Make specified domain MLS trusted for writing to System V IPC objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to System V IPC objects at any level. Domain allowed access. Allow the specified domain to do a MLS range transition that changes the current level. Domain allowed access. Make specified domain a target domain for MLS range transitions that change the current level. Domain allowed access. Make specified domain MLS trusted for reading from processes up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from processes at all levels. (Deprecated)

Make specified domain MLS trusted for reading from processes at all levels.

This interface has been deprecated, please use mls_process_read_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for reading from processes at all levels. Domain allowed access. Make specified domain MLS trusted for writing to processes up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to processes at all levels. (Deprecated)

Make specified domain MLS trusted for writing to processes at all levels.

This interface has been deprecated, please use mls_process_write_all_levels() instead.

Domain allowed access.
Make specified domain MLS trusted for writing to processes at all levels. Domain allowed access. Make specified domain MLS trusted for setting the level of processes it executes. Domain allowed access. Make specified domain MLS trusted for reading from X objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for reading from X objects at any level. Domain allowed access. Make specified domain MLS trusted for write to X objects up to its clearance. Domain allowed access. Make specified domain MLS trusted for writing to X objects at any level. Domain allowed access. Make specified domain MLS trusted for reading from X colormaps at any level. Domain allowed access. Make specified domain MLS trusted for writing to X colormaps at any level. Domain allowed access. Make specified object MLS trusted.

Make specified object MLS trusted. This allows all levels to read and write the object.

This currently only applies to filesystem objects, for example, files and directories.

The type of the object.
Make the specified domain trusted to inherit and use file descriptors from all levels. Domain allowed access. Make the file descriptors from the specifed domain inheritable by all levels. Domain allowed access. Make specified domain MLS trusted for translating contexts at all levels. Domain allowed access. Make specified domain MLS trusted for reading from databases at any level. Domain allowed access. Make specified domain MLS trusted for writing to databases at any level. Domain allowed access. Make specified domain MLS trusted for raising the level of databases. Domain allowed access. Make specified domain MLS trusted for lowering the level of databases. Domain allowed access. Make specified domain MLS trusted for sending dbus messages to all levels. Domain allowed access. Make specified domain MLS trusted for receiving dbus messages from all levels. Domain allowed access.
Policy for kernel security interface, in particular, selinuxfs. Contains the policy for the kernel SELinux security interface. Make the specified type used for labeling SELinux Booleans. This interface is only usable in the base module.

Make the specified type used for labeling SELinux Booleans.

This makes use of genfscon statements, which are only available in the base module. Thus any module which calls this interface must be included in the base module.

Type used for labeling a Boolean. Name of the Boolean.
Get the mountpoint of the selinuxfs filesystem. Domain allowed access. Do not audit attempts to get the mountpoint of the selinuxfs filesystem. Domain to not audit. Mount the selinuxfs filesystem. Domain allowed access. Remount the selinuxfs filesystem. This allows some mount options to be changed. Domain allowed access. Unmount the selinuxfs filesystem. Domain allowed access. Get the attributes of the selinuxfs filesystem Domain allowed access. Do not audit attempts to get the attributes of the selinuxfs filesystem Domain to not audit. Do not audit attempts to get the attributes of the selinuxfs directory. Domain to not audit. Search selinuxfs. Domain allowed access. Do not audit attempts to search selinuxfs. Domain to not audit. Do not audit attempts to read generic selinuxfs entries Domain to not audit. Allows the caller to get the mode of policy enforcement (enforcing or permissive mode). Domain allowed access. Allow caller to set the mode of policy enforcement (enforcing or permissive mode).

Allow caller to set the mode of policy enforcement (enforcing or permissive mode).

Since this is a security event, this action is always audited.

Domain allowed access.
Allow caller to load the policy into the kernel. Domain allowed access. Allow caller to read the policy from the kernel. Domain allowed access. Allow caller to set the state of Booleans to enable or disable conditional portions of the policy. (Deprecated)

Allow caller to set the state of Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

This interface has been deprecated. Please use selinux_set_generic_booleans() or selinux_set_all_booleans() instead.

Domain allowed access.
Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy.

Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

Domain allowed access.
Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy.

Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy.

Since this is a security event, this action is always audited.

Domain allowed access.
Allow caller to set SELinux access vector cache parameters.

Allow caller to set SELinux access vector cache parameters. The allows the domain to set performance related parameters of the AVC, such as cache threshold.

Since this is a security event, this action is always audited.

Domain allowed access.
Allows caller to validate security contexts. Domain allowed access. Do not audit attempts to validate security contexts. Domain to not audit. Allows caller to compute an access vector. Domain allowed access. Calculate the default type for object creation. Domain allowed access. Allows caller to compute polyinstatntiated directory members. Domain allowed access. Calculate the context for relabeling objects.

Calculate the context for relabeling objects. This is determined by using the type_change rules in the policy, and is generally used for determining the context for relabeling a terminal when a user logs in.

Domain allowed access.
Allows caller to compute possible contexts for a user. Domain allowed access. Unconfined access to the SELinux kernel security server. Domain allowed access.

Boolean to determine whether the system permits loading policy, setting enforcing mode, and changing boolean values. Set this to true and you have to reboot to set it back.

Policy controlling access to storage devices Allow the caller to get the attributes of fixed disk device nodes. Domain allowed access. Do not audit attempts made by the caller to get the attributes of fixed disk device nodes. Domain to not audit. Allow the caller to set the attributes of fixed disk device nodes. Domain allowed access. Do not audit attempts made by the caller to set the attributes of fixed disk device nodes. Domain to not audit. Allow the caller to directly read from a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Do not audit attempts made by the caller to read fixed disk device nodes. Domain to not audit. Allow the caller to directly write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Do not audit attempts made by the caller to write fixed disk device nodes. Domain to not audit. Allow the caller to directly read and write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Allow the caller to create fixed disk device nodes. Domain allowed access. Allow the caller to create fixed disk device nodes. Domain allowed access. Create, read, write, and delete fixed disk device nodes. Domain allowed access. Create block devices in /dev with the fixed disk type via an automatic type transition. Domain allowed access. Create block devices in on a tmpfs filesystem with the fixed disk type via an automatic type transition. Domain allowed access. Relabel fixed disk device nodes. Domain allowed access. Enable a fixed disk device as swap space Domain allowed access. Allow the caller to get the attributes of device nodes of fuse devices. Domain allowed access. read or write fuse device interfaces. Domain allowed access. Do not audit attempts to read or write fuse device interfaces. Domain to not audit. Allow the caller to get the attributes of the generic SCSI interface device nodes. Domain allowed access. Allow the caller to set the attributes of the generic SCSI interface device nodes. Domain allowed access. Allow the caller to directly read, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Allow the caller to directly write, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Set attributes of the device nodes for the SCSI generic inerface. Domain allowed access. Do not audit attempts to read or write SCSI generic device interfaces. Domain to not audit. Allow the caller to get the attributes of removable devices device nodes. Domain allowed access. Do not audit attempts made by the caller to get the attributes of removable devices device nodes. Domain to not audit. Do not audit attempts made by the caller to read removable devices device nodes. Domain to not audit. Do not audit attempts made by the caller to write removable devices device nodes. Domain to not audit. Allow the caller to set the attributes of removable devices device nodes. Domain allowed access. Do not audit attempts made by the caller to set the attributes of removable devices device nodes. Domain to not audit. Allow the caller to directly read from a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Do not audit attempts to directly read removable devices. Domain to not audit. Allow the caller to directly write to a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. Domain allowed access. Do not audit attempts to directly write removable devices. Domain to not audit. Allow the caller to directly read a tape device. Domain allowed access. Allow the caller to directly read a tape device. Domain allowed access. Allow the caller to get the attributes of device nodes of tape devices. Domain allowed access. Allow the caller to set the attributes of device nodes of tape devices. Domain allowed access. Unconfined access to storage devices. Domain allowed access. Policy for terminals. Depended on by other required modules. Transform specified type into a pty type. An object type that will applied to a pty. Transform specified type into an user pty type. This allows it to be relabeled via type change by login programs such as ssh. The type of the user domain associated with this pty. An object type that will applied to a pty. Transform specified type into a pty type used by login programs, such as sshd. An object type that will applied to a pty. Transform specified type into a tty type. An object type that will applied to a tty. Transform specified type into a user tty type. User domain that is related to this tty. An object type that will applied to a tty. Create a pty in the /dev/pts directory. The type of the process creating the pty. The type of the pty. Write the console, all ttys and all ptys. Domain allowed access. Read and write the console, all ttys and all ptys. Domain allowed access. Write to the console. Domain allowed access. Read from the console. Domain allowed access. Do not audit attempts to read from the console. Domain to not audit. Read from and write to the console. Domain allowed access. Do not audit attemtps to read from or write to the console. Domain to not audit. Set the attributes of the console device node. Domain allowed access. Relabel from and to the console type. Domain allowed access. Create the console device (/dev/console). Domain allowed access. Get the attributes of a pty filesystem Domain allowed access. Do not audit attempts to get the attributes of the /dev/pts directory. Domain to not audit. Search the contents of the /dev/pts directory. Domain allowed access. Do not audit attempts to search the contents of the /dev/pts directory. Domain to not audit. Read the /dev/pts directory to list all ptys. Domain allowed access. Do not audit attempts to read the /dev/pts directory. Domain to not audit. Do not audit attempts to create, read, write, or delete the /dev/pts directory. Domain to not audit. Do not audit attempts to get the attributes of generic pty devices. Domain to not audit. ioctl of generic pty devices. Domain allowed access. Allow setting the attributes of generic pty devices. Domain allowed access. Dontaudit setting the attributes of generic pty devices. Domain to not audit. Read and write the generic pty type. This is generally only used in the targeted policy. Domain allowed access. Dot not audit attempts to read and write the generic pty type. This is generally only used in the targeted policy. Domain to not audit. Set the attributes of the tty device Domain allowed access. Read and write the controlling terminal (/dev/tty). Domain allowed access. Get the attributes of the pty multiplexor (/dev/ptmx). Domain to not audit. Do not audit attempts to get attributes on the pty multiplexor (/dev/ptmx). Domain to not audit. Read and write the pty multiplexor (/dev/ptmx). Domain allowed access. Do not audit attempts to read and write the pty multiplexor (/dev/ptmx). Domain to not audit. Get the attributes of all pty device nodes. Domain allowed access. Do not audit attempts to get the attributes of any pty device nodes. Domain to not audit. Set the attributes of all pty device nodes. Domain allowed access. Relabel to all ptys. Domain allowed access. Write to all ptys. Domain allowed access. Read and write all ptys. Domain allowed access. Do not audit attempts to read or write any ptys. Domain to not audit. Relabel from and to all pty device nodes. Domain allowed access. Get the attributes of all user pty device nodes. (Deprecated) Domain allowed access. Do not audit attempts to get the attributes of any user pty device nodes. (Deprecated) Domain allowed access. Set the attributes of all user pty device nodes. (Deprecated) Domain allowed access. Relabel to all user ptys. (Deprecated) Domain allowed access. Write to all user ptys. (Deprecated) Domain allowed access. Read and write all user ptys. (Deprecated) Domain allowed access. Do not audit attempts to read any user ptys. (Deprecated) Domain to not audit. Relabel from and to all user user pty device nodes. (Deprecated) Domain allowed access. Get the attributes of all unallocated tty device nodes. Domain allowed access. Do not audit attempts to get the attributes of all unallocated tty device nodes. Domain to not audit. Set the attributes of all unallocated tty device nodes. Domain allowed access. Do not audit attempts to set the attributes of unallocated tty device nodes. Domain to not audit. Do not audit attempts to ioctl unallocated tty device nodes. Domain to not audit. Relabel from and to the unallocated tty type. Domain allowed access. Relabel from all user tty types to the unallocated tty type. Domain allowed access. Append to unallocated ttys. Domain allowed access. Write to unallocated ttys. Domain allowed access. Read and write unallocated ttys. Domain allowed access. Do not audit attempts to read or write unallocated ttys. Domain to not audit. Get the attributes of all tty device nodes. Domain allowed access. Do not audit attempts to get the attributes of any tty device nodes. Domain to not audit. Set the attributes of all tty device nodes. Domain allowed access. Relabel from and to all tty device nodes. Domain allowed access. Write to all ttys. Domain allowed access. Read and write all ttys. Domain allowed access. Do not audit attempts to read or write any ttys. Domain to not audit. Get the attributes of all user tty device nodes. (Deprecated) Domain allowed access. Do not audit attempts to get the attributes of any user tty device nodes. (Deprecated) Domain to not audit. Set the attributes of all user tty device nodes. (Deprecated) Domain allowed access. Relabel from and to all user user tty device nodes. (Deprecated) Domain allowed access. Write to all user ttys. (Deprecated) Domain allowed access. Read and write all user to all user ttys. (Deprecated) Domain allowed access. Do not audit attempts to read or write any user ttys. (Deprecated) Domain allowed access. User-based access control policy Contains attributes used in UBAC policy. Constrain by user-based access control (UBAC).

Constrain the specified type by user-based access control (UBAC). Typically, these are user processes or user files that need to be differentiated by SELinux user. Normally this does not include administrative or privileged programs. For the UBAC rules to be enforced, both the subject (source) type and the object (target) types must be UBAC constrained.

Type to be constrained by UBAC.
Exempt user-based access control for files. Domain to be exempted. Exempt user-based access control for processes. Domain to be exempted. Exempt user-based access control for file descriptors. Domain to be exempted. Exempt user-based access control for sockets. Domain to be exempted. Exempt user-based access control for SysV IPC. Domain to be exempted. Exempt user-based access control for X Windows. Domain to be exempted. Exempt user-based access control for dbus. Domain to be exempted. Exempt user-based access control for keys. Domain to be exempted. Exempt user-based access control for databases. Domain to be exempted.
Policy modules for user roles. Audit administrator role Change to the audit administrator role. Role allowed access. Change from the audit administrator role.

Change from the audit administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Log administrator role Change to the log administrator role. Role allowed access. Change from the log administrator role.

Change from the log administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Security administrator role Change to the security administrator role. Role allowed access. Change from the security administrator role.

Change from the security administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Administrator's unprivileged user role Change to the staff role. Role allowed access. Change from the staff role.

Change from the staff role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
General system administration role Change to the system administrator role. Role allowed access. Change from the system administrator role.

Change from the system administrator role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Execute a shell in the sysadm domain. Domain allowed access. Execute a generic bin program in the sysadm domain. Domain allowed access. Execute all entrypoint files in the sysadm domain. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute all entrypoint files in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain allowed access.
Allow sysadm to execute a generic bin program in a specified domain. This is an explicit transition, requiring the caller to use setexeccon().

Allow sysadm to execute a generic bin program in a specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in.
Send a SIGCHLD signal to sysadm users. Domain allowed access. Inherit and use sysadm file descriptors Domain allowed access. Read and write sysadm user unnamed pipes. Domain allowed access.

Allow sysadm to debug or ptrace all processes.

Generic unprivileged user role Change to the generic user role. Role allowed access. Change from the generic user role.

Change from the generic user role to the specified role.

This is an interface to support third party modules and its use is not allowed in upstream reference policy.

Role allowed access.
Policy modules for system services, like cron, and network services, like sshd. PostgreSQL relational database Role access for SE-PostgreSQL. The role associated with the user domain. The type of the user domain. Marks as a SE-PostgreSQL loadable shared library module Type marked as a database object type. Marks as a SE-PostgreSQL database object type Type marked as a database object type. Marks as a SE-PostgreSQL schema object type Type marked as a schema object type. Marks as a SE-PostgreSQL table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL system table/column/tuple object type Type marked as a table/column/tuple object type. Marks as a SE-PostgreSQL sequence type Type marked as a sequence type. Marks as a SE-PostgreSQL view object type Type marked as a view object type. Marks as a SE-PostgreSQL procedure object type Type marked as a procedure object type. Marks as a SE-PostgreSQL trusted procedure object type Type marked as a trusted procedure object type. Marks as a SE-PostgreSQL procedural language object type Type marked as a procedural language object type. Marks as a SE-PostgreSQL binary large object type Type marked as a database binary large object type. Allow the specified domain to search postgresql's database directory. Domain allowed access. Allow the specified domain to manage postgresql's database. Domain allowed access. Execute postgresql in the postgresql domain. Domain allowed to transition. Allow domain to signal postgresql Domain allowed access. Allow the specified domain to read postgresql's etc. Domain allowed access. Allow the specified domain to connect to postgresql with a tcp socket. Domain allowed access. Allow the specified domain to connect to postgresql with a unix socket. Domain allowed access. Allow the specified domain unprivileged accesses to unifined database objects managed by SE-PostgreSQL, Domain allowed access. Allow the specified domain unconfined accesses to any database objects managed by SE-PostgreSQL, Domain allowed access. All of the rules required to administrate an postgresql environment Domain allowed access. The role to be allowed to manage the postgresql domain.

Allow unprived users to execute DDL statement

Allow transmit client label to foreign database

Allow database admins to execute DML statement

Secure shell client and server policy. Send a SIGCHLD signal to the ssh server. Domain allowed access. Send a generic signal to the ssh server. Domain allowed access. Send a null signal to sshd processes. Domain allowed access. Read a ssh server unnamed pipe. Domain allowed access. Read and write a ssh server unnamed pipe. Domain allowed access. Read and write ssh server unix domain stream sockets. Domain allowed access. Read and write ssh server TCP sockets. Domain allowed access. Do not audit attempts to read and write ssh server TCP sockets. Domain to not audit. Connect to SSH daemons over TCP sockets. (Deprecated) Domain allowed access. Execute the ssh daemon sshd domain. Domain allowed to transition. Execute the ssh client in the caller domain. Domain allowed access. Set the attributes of sshd key files. Domain allowed access. Execute the ssh agent client in the caller domain. Domain allowed access. Read ssh home directory content Domain allowed access. Execute the ssh key generator in the ssh keygen domain. Domain allowed to transition. Read ssh server keys Domain to not audit. Manage ssh home directory content Domain allowed access. Delete from the ssh temp files. Domain allowed access.

allow host key based authentication

Allow ssh logins as sysadm_r:sysadm_t

X Windows Server Rules required for using the X Windows server and environment, for restricted users. Role allowed access. Domain allowed access. Rules required for using the X Windows server and environment. Role allowed access. Domain allowed access. Create sessions on the X server, with read-only access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create sessions on the X server, with read and write access to the X server shared memory segments. Domain allowed access. The type of the domain SYSV tmpfs files. Create non-drawing client sessions on an X server. Domain allowed access. Create full client sessions on a user X server. Domain allowed access. The type of the domain SYSV tmpfs files. Read user fonts, user font configuration, and manage the user font cache.

Read user fonts, user font configuration, and manage the user font cache.

This is a templated interface, and should only be called from a per-userdomain template.

Domain allowed access.
Transition to the Xauthority domain. Domain allowed to transition. Create a Xauthority file in the user home directory. Domain allowed access. Read all users fonts, user font configurations, and manage all users font caches. Domain allowed access. Read all users .Xauthority. Domain allowed access. Set the attributes of the X windows console named pipes. Domain allowed access. Read and write the X windows console named pipe. Domain allowed access. Use file descriptors for xdm. Domain allowed access. Do not audit attempts to inherit XDM file descriptors. Domain to not audit. Read and write XDM unnamed pipes. Domain allowed access. Do not audit attempts to read and write XDM unnamed pipes. Domain to not audit. Connect to XDM over a unix domain stream socket. Domain allowed access. Read xdm-writable configuration files. Domain allowed access. Set the attributes of XDM temporary directories. Domain allowed access. Create a named socket in a XDM temporary directory. Domain allowed access. Read XDM pid files. Domain allowed access. Read XDM var lib files. Domain allowed access. Make an X session script an entrypoint for the specified domain. The domain for which the shell is an entrypoint. Execute an X session in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

Execute an Xsession in the target domain. This is an explicit transition, requiring the caller to use setexeccon().

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. The type of the shell process.
Get the attributes of X server logs. Domain allowed access. Do not audit attempts to write the X server log files. Domain to not audit. Delete X server log files. Domain allowed access. Read X keyboard extension libraries. Domain allowed access. Read xdm temporary files. Domain allowed access. Do not audit attempts to read xdm temporary files. Domain to not audit. Read write xdm temporary files. Domain allowed access. Create, read, write, and delete xdm temporary files. Domain allowed access. Do not audit attempts to get the attributes of xdm temporary named sockets. Domain to not audit. Execute the X server in the X server domain. Domain allowed to transition. Signal X servers Domain allowed access. Kill X servers Domain allowed access. Read and write X server Sys V Shared memory segments. Domain allowed access. Do not audit attempts to read and write to X server sockets. Domain to not audit. Do not audit attempts to read and write X server unix domain stream sockets. Domain to not audit. Connect to the X server over a unix domain stream socket. Domain allowed access. Read X server temporary files. Domain allowed access. Interface to provide X object permissions on a given X server to an X client domain. Gives the domain permission to read the virtual core keyboard and virtual core pointer devices. Domain allowed access. Interface to provide X object permissions on a given X server to an X client domain. Gives the domain complete control over the display. Domain allowed access.

Allows clients to write to the X server shared memory segments.

Allow xdm logins as sysadm

Support X userspace object manager

Policy modules for system functions from init to multi-user login. Policy for user executable applications. Make the specified type usable as an application domain. Type to be used as a domain type. Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. Type to be used for files. Execute application executables in the caller domain. Domain allowed access. Execute all executable files. Domain allowed access. Create a domain for applications.

Create a domain for applications. Typically these are programs that are run interactively.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

Type to be used as an application domain. Type of the program to be used as an entry point to this domain.
Send null signals to all application domains. Domain allowed access. Do not audit attempts to send null signals to all application domains. Domain to not audit. Send general signals to all application domains. Domain allowed access. Do not audit attempts to send general signals to all application domains. Domain to not audit. Do not audit attempts to send kill signals to all application domains. Domain to not audit.
Common policy for authentication and user login. Role access for password authentication. Role allowed access. Domain allowed access. Use PAM for authentication. Domain allowed access. Make the specified domain used for a login program. Domain type used for a login program domain. Use the login program as an entry point program. Domain allowed access. Make the specified type usable as a login file.

Make the specified type usable as a login file, This type has restricted modification capabilities when used with other interfaces that permit files_type access. The default type has properties similar to that of the shadow file. This will also make the type usable as a security file, making calls to files_security_file() redundant.

Type to be used as a login file.
Execute a login_program in the target domain. Domain allowed to transition. The type of the login_program process. Execute a login_program in the target domain, with a range transition. Domain allowed to transition. The type of the login_program process. Range of the login program. Search authentication cache Domain allowed access. Read authentication cache Domain allowed access. Read/Write authentication cache Domain allowed access. Manage authentication cache Domain allowed access. Automatic transition from cache_t to cache. Domain allowed access. Run unix_chkpwd to check a password. Domain allowed to transition. Run unix_chkpwd to check a password. Stripped down version to be called within boolean Domain allowed to transition. Execute chkpwd programs in the chkpwd domain. Domain allowed to transition. The role to allow the chkpwd domain. Execute a domain transition to run unix_update. Domain allowed to transition. Execute updpwd programs in the updpwd domain. Domain allowed to transition. The role to allow the updpwd domain. Get the attributes of the shadow passwords file. Domain allowed access. Do not audit attempts to get the attributes of the shadow passwords file. Domain to not audit. Read the shadow passwords file (/etc/shadow) Domain allowed access. Pass shadow assertion for reading.

Pass shadow assertion for reading. This should only be used with auth_tunable_read_shadow(), and only exists because typeattribute does not work in conditionals.

Domain allowed access.
Read the shadow password file.

Read the shadow password file. This should only be used in a conditional; it does not pass the reading shadow assertion.

Domain allowed access.
Do not audit attempts to read the shadow password file (/etc/shadow). Domain to not audit. Read and write the shadow password file (/etc/shadow). Domain allowed access. Create, read, write, and delete the shadow password file. Domain allowed access. Automatic transition from etc to shadow. Domain allowed access. Relabel to the shadow password file type. Domain allowed access. Relabel from and to the shadow password file type. Domain allowed access. Append to the login failure log. Domain allowed access. Read and write the login failure log. Domain allowed access. Read the last logins log. Domain allowed access. Append only to the last logins log. Domain allowed access. Read and write to the last logins log. Domain allowed access. Execute pam programs in the pam domain. Domain allowed to transition. Send generic signals to pam processes. Domain allowed access. Execute pam programs in the PAM domain. Domain allowed to transition. The role to allow the PAM domain. Execute the pam program. Domain allowed access. Read var auth files. Used by various other applications and pam applets etc. Domain allowed access. Read and write var auth files. Used by various other applications and pam applets etc. Domain allowed access. Manage var auth files. Used by various other applications and pam applets etc. Domain allowed access. Read PAM PID files. Domain allowed access. Do not audit attemps to read PAM PID files. Domain to not audit. Delete pam PID files. Domain allowed access. Manage pam PID files. Domain allowed access. Execute pam_console with a domain transition. Domain allowed to transition. Search the contents of the pam_console data directory. Domain allowed access. List the contents of the pam_console data directory. Domain allowed access. Relabel pam_console data directories. Domain allowed access. Read pam_console data files. Domain allowed access. Create, read, write, and delete pam_console data files. Domain allowed access. Delete pam_console data. Domain allowed access. Read all directories on the filesystem, except login files and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all directories on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except login files and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all files on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except login files and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read all symbolic links on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Relabel all files on the filesystem, except login files and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Relabel all files on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read and write all files on the filesystem, except login files and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Read and write all files on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except login files passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Manage all files on the filesystem, except the shadow passwords and listed exceptions. Domain allowed access. The types to be excluded. Each type or attribute must be negated by the caller. Execute utempter programs in the utempter domain. Domain allowed to transition. Execute utempter programs in the utempter domain. Domain allowed to transition. The role to allow the utempter domain. Do not audit attemps to execute utempter executable. Domain to not audit. Set the attributes of login record files. Domain allowed access. Read login records files (/var/log/wtmp). Domain allowed access. Do not audit attempts to read login records files (/var/log/wtmp). Domain to not audit. Do not audit attempts to write to login records files. Domain to not audit. Append to login records (wtmp). Domain allowed access. Write to login records (wtmp). Domain allowed access. Read and write login records. Domain allowed access. Create a login records in the log directory using a type transition. Domain allowed access. Create, read, write, and delete login records files. Domain allowed access. Relabel login record files. Domain allowed access. Use nsswitch to look up user, password, group, or host information.

Allow the specified domain to look up user, password, group, or host information using the name service. The most common use of this interface is for services that do host name resolution (usually DNS resolution).

Domain allowed access.
Unconfined access to the authlogin module.

Unconfined access to the authlogin module.

Currently, this only allows assertions for the shadow passwords file (/etc/shadow) to be passed. No access is granted yet.

Domain allowed access.

Allow users to resolve user passwd entries directly from ldap rather then using a sssd server

Policy for reading and setting the hardware clock. Execute hwclock in the clock domain. Domain allowed to transition. Execute hwclock in the clock domain, and allow the specified role the hwclock domain. Domain allowed to transition. Role allowed access. Execute hwclock in the caller domain. Domain allowed access. Do not audit attempts to write clock drift adjustments. Domain to not audit. Read and write clock drift adjustments. Domain allowed access. Tools for filesystem management, such as mkfs and fsck. Execute fs tools in the fstools domain. Domain allowed to transition. Execute fs tools in the fstools domain, and allow the specified role the fs tools domain. Domain allowed to transition. Role allowed access. Execute fsadm in the caller domain. Domain allowed access. Send signal to fsadm process Domain allowed access. Read fstools unnamed pipes. Domain allowed access. Relabel a file to the type used by the filesystem tools programs. Domain allowed access. Create, read, write, and delete a file used by the filesystem tools programs. Domain allowed access. Getattr swapfile Domain allowed access. Policy for getty. Execute gettys in the getty domain. Domain allowed to transition. Inherit and use getty file descriptors. Domain allowed access. Allow process to read getty log file. Domain allowed access. Allow process to read getty config file. Domain allowed access. Allow process to edit getty config file. Domain allowed access. Policy for changing the system host name. Execute hostname in the hostname domain. Domain allowed to transition. Execute hostname in the hostname domain, and allow the specified role the hostname domain. Domain allowed to transition. Role allowed access. Execute hostname in the caller domain. Domain allowed access. Policy for hotplug system, for supporting the connection and disconnection of devices at runtime. Execute hotplug with a domain transition. Domain allowed to transition. Execute hotplug in the caller domain. Domain allowed access. Inherit and use hotplug file descriptors. Domain allowed access. Do not audit attempts to inherit hotplug file descriptors. Domain to not audit. Do not audit attempts to search the hotplug configuration directories. Domain to not audit. Get the attributes of the hotplug configuration directory. Domain allowed access. Search the hotplug configuration directory. Domain allowed access. Read the configuration files for hotplug. Domain allowed access. Search the hotplug PIDs. Domain allowed access. System initialization programs (init and init scripts). Create a file type used for init scripts.

Create a file type used for init scripts. It can not be used in conjunction with init_script_domain(). These script files are typically stored in the /etc/init.d directory.

Typically this is used to constrain what services an admin can start/stop. For example, a policy writer may want to constrain a web administrator to only being able to restart the web server, not other services. This special type will help address that goal.

This also makes the type usable for files; thus an explicit call to files_type() is redundant.

Type to be used for a script file.
Create a domain used for init scripts.

Create a domain used for init scripts. Can not be used in conjunction with init_script_file().

Type to be used as an init script domain. Type of the script file used as an entry point to this domain.
Create a domain which can be started by init. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Create a domain which can be started by init, with a range transition. Type to be used as a domain. Type of the program to be used as an entry point to this domain. Range for the domain. Create a domain for long running processes (daemons/services) which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. Short running processes should use the init_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_daemon_domain() should be used instead.

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain.
Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range.

Create a domain for long running processes (daemons/services) which are started by init scripts, running at a specified MLS/MCS range. Short running processes should use the init_ranged_system_domain() interface instead. Typically all long running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_daemon_domain().

Type to be used as a daemon domain. Type of the program to be used as an entry point to this domain. MLS/MCS range for the domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for short running processes which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes, such as daemons/services should use the init_daemon_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the process must also run in a specific MLS/MCS level, the init_ranged_system_domain() should be used instead.

Type to be used as a system domain. Type of the program to be used as an entry point to this domain.
Create a domain for short running processes which are started by init scripts.

Create a domain for long running processes (daemons/services) which are started by init scripts. These are generally applications that are used to initialize the system during boot. Long running processes should use the init_ranged_system_domain() interface instead. Typically all short running processes started by an init script (usually in /etc/init.d) will need to use this interface if they need to run in a specific MLS/MCS range.

The types will be made usable as a domain and file, making calls to domain_type() and files_type() redundant.

If the policy build option TYPE is standard (MLS and MCS disabled), this interface has the same behavior as init_system_domain().

Type to be used as a system domain. Type of the program to be used as an entry point to this domain. Range for the domain.
Execute init (/sbin/init) with a domain transition. Domain allowed to transition. Execute the init program in the caller domain. Domain allowed access. Execute the rc application in the caller domain.

This is only applicable to Gentoo or distributions that use the OpenRC init system.

The OpenRC /sbin/rc binary is used for both init scripts as well as management applications and tools. When used for management purposes, calling /sbin/rc should never cause a transition to initrc_t.

Domain allowed access.
Get the process group of init. Domain allowed access. Send init a null signal. Domain allowed access. Send init a SIGCHLD signal. Domain allowed access. Connect to init with a unix socket. Domain allowed access. Inherit and use file descriptors from init.

Allow the specified domain to inherit file descriptors from the init program (process ID 1). Typically the only file descriptors to be inherited from init are for the console. This does not allow the domain any access to the object to which the file descriptors references.

Related interfaces:

  • init_dontaudit_use_fds()
  • term_dontaudit_use_console()
  • term_use_console()

Example usage:

init_use_fds(mydomain_t) term_use_console(mydomain_t)

Normally, processes that can inherit these file descriptors (usually services) write messages to the system log instead of writing to the console. Therefore, in many cases, this access should dontaudited instead.

Example dontaudit usage:

init_dontaudit_use_fds(mydomain_t) term_dontaudit_use_console(mydomain_t)

Domain allowed access.
Do not audit attempts to inherit file descriptors from init. Domain to not audit. Send UDP network traffic to init. (Deprecated) Domain allowed access. Get the attributes of initctl. Domain allowed access. Do not audit attempts to get the attributes of initctl. Domain to not audit. Write to initctl. Domain allowed access. Use telinit (Read and write initctl). Domain allowed access. Read and write initctl. Domain allowed access. Do not audit attempts to read and write initctl. Domain allowed access. Make init scripts an entry point for the specified domain. Domain allowed access. Execute init scripts with a specified domain transition. Domain allowed to transition. Execute init scripts with an automatic domain transition. Domain allowed to transition. Execute a init script in a specified domain.

Execute a init script in a specified domain.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. Domain to transition to.
Transition to the init script domain on a specified labeled init script. Domain allowed to transition. Labeled init script file. Transition to the init script domain for all labeled init script types Domain allowed to transition. Start and stop daemon programs directly.

Start and stop daemon programs directly in the traditional "/etc/init.d/daemon start" style, and do not require run_init.

Domain allowed access. The role to be performing this action.
Read the process state (/proc/pid) of init. Domain allowed access. Ptrace init Domain allowed access. Write an init script unnamed pipe. Domain allowed access. Get the attribute of init script entrypoint files. Domain allowed access. Read init scripts. Domain allowed access. Execute init scripts in the caller domain. Domain allowed access. Get the attribute of all init script entrypoint files. Domain allowed access. Read all init script files. Domain allowed access. Dontaudit read all init script files. Domain to not audit. Execute all init scripts in the caller domain. Domain allowed access. Read the process state (/proc/pid) of the init scripts. Domain allowed access. Inherit and use init script file descriptors. Domain allowed access. Do not audit attempts to inherit init script file descriptors. Domain to not audit. Search init script keys. Domain allowed access. Get the process group ID of init scripts. Domain allowed access. Send SIGCHLD signals to init scripts. Domain allowed access. Send generic signals to init scripts. Domain allowed access. Send null signals to init scripts. Domain allowed access. Read and write init script unnamed pipes. Domain allowed access. Send UDP network traffic to init scripts. (Deprecated) Domain allowed access. Allow the specified domain to connect to init scripts with a unix socket. Domain allowed access. Allow the specified domain to read/write to init scripts with a unix domain stream sockets. Domain allowed access. Dont audit the specified domain connecting to init scripts with a unix domain stream socket. Domain to not audit. Send messages to init scripts over dbus. Domain allowed access. Send and receive messages from init scripts over dbus. Domain allowed access. Read and write the init script pty.

Read and write the init script pty. This pty is generally opened by the open_init_pty portion of the run_init program so that the daemon does not require direct access to the administrator terminal.

Domain allowed access.
Do not audit attempts to read and write the init script pty. Domain to not audit. Get the attributes of init script status files. Domain allowed access. Do not audit attempts to read init script status files. Domain to not audit. Read init script temporary data. Domain allowed access. Read and write init script temporary data. Domain allowed access. Create files in a init script temporary data directory. Domain allowed access. The type of the object to be created The object class. The name of the object being created. Get the attributes of init script process id files. Domain allowed access. Read utmp. Domain allowed access. Do not audit attempts to write utmp. Domain to not audit. Write to utmp. Domain allowed access. Do not audit attempts to lock init script pid files. Domain to not audit. Read and write utmp. Domain allowed access. Do not audit attempts to read and write utmp. Domain to not audit. Create, read, write, and delete utmp. Domain allowed access. Create files in /var/run with the utmp file type. Domain allowed access. Allow the specified domain to connect to daemon with a tcp socket Domain allowed access. Allow the specified domain to connect to daemon with a udp socket Domain allowed access.

Enable support for upstart as the init program.

TCP/IP encryption Execute ipsec in the ipsec domain. Domain allowed to transition. Connect to IPSEC using a unix domain stream socket. Domain allowed access. Execute ipsec in the ipsec mgmt domain. Domain allowed access. Connect to racoon using a unix domain stream socket. Domain allowed access. Get the attributes of an IPSEC key socket. Domain allowed access. Execute the IPSEC management program in the caller domain. Domain allowed access. Send ipsec mgmt a general signal. Domain allowed access. Send ipsec mgmt a null signal. Domain allowed access. Send ipsec mgmt a kill signal. Domain allowed access. Send and receive messages from ipsec-mgmt over dbus. Domain allowed access. Read the IPSEC configuration Domain allowed access. Match the default SPD entry. Domain allowed access. Set the context of a SPD entry to the default context. Domain allowed access. write the ipsec_var_run_t files. Domain allowed access. Create, read, write, and delete the IPSEC pid files. Domain allowed access. Execute racoon in the racoon domain. Domain allowed to transition. Execute racoon and allow the specified role the domain. Domain allowed to transition. Role allowed access. Execute setkey in the setkey domain. Domain allowed to transition. Execute setkey and allow the specified role the domains. Domain allowed to transition. Role allowed access..

Allow racoon to read shadow

Policy for iptables. Execute iptables in the iptables domain. Domain allowed to transition. Execute iptables in the iptables domain, and allow the specified role the iptables domain. Domain allowed to transition. Role allowed access. Execute iptables in the caller domain. Domain allowed access. Execute iptables in the iptables domain. Domain allowed to transition. Set the attributes of iptables config files. Domain allowed access. Read iptables config files. Domain allowed access. Create files in /etc with the type used for the iptables config files. Domain allowed access. Manage iptables config files. Domain allowed access. Policy for system libraries. Execute ldconfig in the ldconfig domain. Domain allowed to transition. Execute ldconfig in the ldconfig domain. Domain allowed to transition. The role to allow the ldconfig domain. Execute ldconfig in the caller domain. Domain allowed access. Use the dynamic link/loader for automatic loading of shared libraries. Domain allowed access. Use the dynamic link/loader for automatic loading of shared libraries with legacy support. Domain allowed access. Execute the dynamic link/loader in the caller's domain. Domain allowed access. Create, read, write, and delete the dynamic link/loader. Domain allowed access. Relabel to and from the type used for the dynamic link/loader. Domain allowed access. Modify the dynamic link/loader's cached listing of shared libraries. Domain allowed access. Search library directories. Domain allowed access. Do not audit attempts to write to library directories.

Do not audit attempts to write to library directories. Typically this is used to quiet attempts to recompile python byte code.

Domain to not audit.
Create, read, write, and delete library directories. Domain allowed access. dontaudit attempts to setattr on library files Domain to not audit. Read files in the library directories, such as static libraries. Domain allowed access. Execute library scripts in the caller domain. Domain allowed access. Load and execute functions from generic lib files as shared libraries. Domain allowed access. Create, read, write, and delete generic files in library directories. Domain allowed access. Relabel files to the type used in library directories. Domain allowed access. Relabel to and from the type used for generic lib files. Domain allowed access. Delete generic symlinks in library directories. Domain allowed access. Create, read, write, and delete shared libraries. Domain allowed access. Load and execute functions from shared libraries. Domain allowed access. Load and execute functions from shared libraries, with legacy support. Domain allowed access. Relabel to and from the type used for shared libraries. Domain allowed access. Create an object in lib directories, with the shared libraries type using a type transition. Domain allowed access. The object class of the object being created. Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

Create an object in lib directories, with the shared libraries type using a type transition. (Deprecated)

lib_filetrans_shared_lib() should be used instead.

Domain allowed access. The object class of the object being created.
Policy for local logins. Execute local logins in the local login domain. Domain allowed to transition. Allow processes to inherit local login file descriptors. Domain allowed access. Do not audit attempts to inherit local login file descriptors. Domain to not audit. Send a null signal to local login processes. Domain allowed access. Search for key. Domain allowed access. Allow link to the local_login key ring. Domain allowed access. Execute local logins in the local login domain. Domain allowed to transition. Policy for the kernel message logger and system logging daemon. Make the specified type usable for log files in a filesystem.

Make the specified type usable for log files in a filesystem. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a log file type may result in problems with log rotation, log analysis, and log monitoring programs.

Related interfaces:

  • logging_log_filetrans()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Type to be used for files.
Send audit messages. Domain allowed access. dontaudit attempts to send audit messages. Domain to not audit. Set login uid Domain allowed access. Set tty auditing Domain allowed access. Set up audit Domain allowed access. Read the audit log. Domain allowed access. Execute auditctl in the auditctl domain. Domain allowed to transition. Execute auditctl in the auditctl domain, and allow the specified role the auditctl domain. Domain allowed to transition. Role allowed access. Execute auditd in the auditd domain. Domain allowed to transition. Execute auditd in the auditd domain, and allow the specified role the auditd domain. Domain allowed to transition. Role allowed access. Connect to auditdstored over an unix stream socket. Domain allowed access. Execute a domain transition to run the audit dispatcher. Domain allowed to transition. Signal the audit dispatcher. Domain allowed access. Create a domain for processes which can be started by the system audit dispatcher Type to be used as a domain. Type of the program to be used as an entry point to this domain. Connect to the audit dispatcher over an unix stream socket. Domain allowed access. Manage the auditd configuration files. Domain allowed access. Manage the audit log. Domain allowed access. Execute klogd in the klog domain. Domain allowed to transition. Check if syslogd is executable. Domain allowed access. Execute syslogd in the syslog domain. Domain allowed to transition. Create an object in the log directory, with a private type.

Allow the specified domain to create an object in the general system log directories (e.g., /var/log) with a private type. Typically this is used for creating private log files in /var/log with the private type instead of the general system log type. To accomplish this goal, either the program must be SELinux-aware, or use this interface.

Related interfaces:

  • logging_log_file()

Example usage with a domain that can create and append to a private log file stored in the general directories (e.g., /var/log):

type mylogfile_t; logging_log_file(mylogfile_t) allow mydomain_t mylogfile_t:file { create_file_perms append_file_perms }; logging_log_filetrans(mydomain_t, mylogfile_t, file)

Domain allowed access. The type of the object to be created. The object class of the object being created. The name of the object being created.
Send system log messages.

Allow the specified domain to connect to the system log service (syslog), to send messages be added to the system logs. Typically this is used by services that do not have their own log file in /var/log.

This does not allow messages to be sent to the auditing system.

Programs which use the libc function syslog() will require this access.

Related interfaces:

  • logging_send_audit_msgs()
Domain allowed access.
Read the auditd configuration files. Domain allowed access. dontaudit search of auditd configuration files. Domain to not audit. Read syslog configuration files. Domain allowed access. Allows the domain to open a file in the log directory, but does not allow the listing of the contents of the log directory. Domain allowed access. Do not audit attempts to search the var log directory. Domain not to audit. List the contents of the generic log directory (/var/log). Domain allowed access. Read and write the generic log directory (/var/log). Domain allowed access. Set attributes on all log dirs. Domain allowed access. Do not audit attempts to get the atttributes of any log files. Domain to not audit. Append to all log files. Domain allowed access. Read all log files. Domain allowed access. Execute all log files in the caller domain. Domain allowed access. read/write to all log files. Domain allowed access. Create, read, write, and delete all log files. Domain allowed access. Read generic log files. Domain allowed access. Write generic log files. Domain allowed access. Dontaudit Write generic log files. Domain to not audit. Read and write generic log files. Domain allowed access. Create, read, write, and delete generic log files. Domain allowed access. All of the rules required to administrate the audit environment Domain allowed access. User role allowed access. All of the rules required to administrate the syslog environment Domain allowed access. User role allowed access. All of the rules required to administrate the logging environment Domain allowed access. User role allowed access.
Policy for logical volume management programs. Execute lvm programs in the lvm domain. Domain allowed to transition. Execute lvm programs in the caller domain. Domain allowed access. Execute lvm programs in the lvm domain. Domain allowed to transition. The role to allow the LVM domain. Read LVM configuration files. Domain allowed access. Manage LVM configuration files. Domain allowed access. Execute a domain transition to run clvmd. Domain allowed to transition. Miscelaneous files. Make the specified type usable as a cert file.

Make the specified type usable for cert files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with cert management tools.

Related interfaces:

  • files_type()

Example:

type mycertfile_t; cert_type(mycertfile_t) allow mydomain_t mycertfile_t:file read_file_perms; files_search_etc(mydomain_t)

Type to be used for files.
Read all SSL certificates. Domain allowed access. Read generic SSL certificates. Domain allowed access. Manage generic SSL certificates. Domain allowed access. Manage generic SSL certificates. Domain allowed access. Read SSL certificates. Domain allowed access. Manage SSL certificates. Domain allowed access. Manage SSL certificates. Domain allowed access. Read fonts. Domain allowed access. Set the attributes on a fonts directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts directory. Domain to not audit. Do not audit attempts to write fonts. Domain to not audit. Create, read, write, and delete fonts. Domain allowed access. Set the attributes on a fonts cache directory. Domain allowed access. Do not audit attempts to set the attributes on a fonts cache directory. Domain to not audit. Create, read, write, and delete fonts cache. Domain allowed access. Read hardware identification data. Domain allowed access. Allow process to setattr localization info Domain allowed access. Allow process to read localization information.

Allow the specified domain to read the localization files. This is typically for time zone configuration files, such as /etc/localtime and files in /usr/share/zoneinfo. Typically, any domain which needs to know the GMT/UTC offset of the current timezone will need access to these files. Generally, it should be safe for any domain to read these files.

Domain allowed access.
Allow process to write localization info Domain allowed access. Allow process to relabel localization info Domain allowed access. Allow process to read legacy time localization info Domain allowed access. Search man pages. Domain allowed access. Do not audit attempts to search man pages. Domain to not audit. Read man pages Domain allowed access. Delete man pages Domain allowed access. Create, read, write, and delete man pages Domain allowed access. Read public files used for file transfer services. Domain allowed access. Create, read, write, and delete public files and directories used for file transfer services. Domain allowed access. Read TeX data Domain allowed access. Execute TeX data programs in the caller domain. Domain allowed access. Let test files be an entry point for a specified domain. Domain allowed access. Read test files and directories. Domain allowed access. Execute test files. Domain allowed access. Execute test files. Domain allowed access. Create, read, write, and delete localization Domain allowed access.
Policy for kernel module utilities Getattr the dependencies of kernel modules. Domain allowed access. Read the dependencies of kernel modules. Domain allowed access. Read the configuration options used when loading modules. Domain allowed access. Rename a file with the configuration options used when loading modules. Domain allowed access. Unlink a file with the configuration options used when loading modules. Domain allowed access. Manage files with the configuration options used when loading modules. Domain allowed access. Unconditionally execute insmod in the insmod domain. Domain allowed to transition. Execute insmod in the insmod domain. Domain allowed to transition. Execute insmod in the insmod domain, and allow the specified role the insmod domain, and use the caller's terminal. Has a sigchld backchannel. Domain allowed to transition. Role allowed access. Execute insmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed to transition. Execute depmod in the depmod domain. Domain allowed to transition. Role allowed access. Execute depmod in the caller domain. Domain allowed access. Execute depmod in the depmod domain. Domain allowed to transition. Execute update_modules in the update_modules domain. Domain allowed to transition. Role allowed access. Execute update_modules in the caller domain. Domain allowed access. Policy for mount. Execute mount in the mount domain. Domain allowed to transition. Execute mount in the mount domain, and allow the specified role the mount domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute mount in the caller domain. Domain allowed access. Send a generic signal to mount. Domain allowed access. Use file descriptors for mount. The type of the process performing this action. Allow the mount domain to send nfs requests for mounting network drives

Allow the mount domain to send nfs requests for mounting network drives

This interface has been deprecated as these rules were a side effect of leaked mount file descriptors. This interface has no effect.

Domain allowed access.
Execute mount in the unconfined mount domain. Domain allowed to transition. Execute mount in the unconfined mount domain, and allow the specified role the unconfined mount domain, and use the caller's terminal. Domain allowed to transition. Role allowed access.

Allow the mount command to mount any directory or file.

NetLabel/CIPSO labeled networking management Execute netlabel_mgmt in the netlabel_mgmt domain. Domain allowed to transition. Execute netlabel_mgmt in the netlabel_mgmt domain, and allow the specified role the netlabel_mgmt domain. Domain allowed to transition. Role allowed access. Policy for SELinux policy and userland applications. Execute checkpolicy in the checkpolicy domain. Domain allowed to transition. Execute checkpolicy in the checkpolicy domain, and allow the specified role the checkpolicy domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute checkpolicy in the caller domain. Domain allowed access. Execute load_policy in the load_policy domain. Domain allowed to transition. Execute load_policy in the load_policy domain, and allow the specified role the load_policy domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute load_policy in the caller domain. Domain allowed access. Read the load_policy program file. Domain allowed access. Execute newrole in the newole domain. Domain allowed to transition. Execute newrole in the newrole domain, and allow the specified role the newrole domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute newrole in the caller domain. Domain allowed access. Do not audit the caller attempts to send a signal to newrole. Domain to not audit. Send a SIGCHLD signal to newrole.

Allow the specified domain to send a SIGCHLD signal to newrole. This signal is automatically sent from a process that is terminating to its parent. This may be needed by domains that are executed from newrole.

Domain allowed access.
Inherit and use newrole file descriptors. Domain allowed access. Do not audit attempts to inherit and use newrole file descriptors. Domain to not audit. Execute restorecon in the restorecon domain. (Deprecated) Domain allowed to transition. Execute restorecon in the restorecon domain, and allow the specified role the restorecon domain, and use the caller's terminal. (Deprecated) Domain allowed to transition. Role allowed access. Execute restorecon in the caller domain. (Deprecated) Domain allowed access. Execute run_init in the run_init domain. Domain allowed to transition. Execute init scripts in the run_init domain.

Execute init scripts in the run_init domain. This is used for the Gentoo integrated run_init.

Domain allowed to transition.
Execute run_init in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

Execute init scripts in the run_init domain, and allow the specified role the run_init domain, and use the caller's terminal.

This is used for the Gentoo integrated run_init.

Domain allowed to transition. Role allowed access.
Inherit and use run_init file descriptors. Domain allowed access. Execute setfiles in the setfiles domain. Domain allowed to transition. Execute setfiles in the setfiles domain, and allow the specified role the setfiles domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute setfiles in the caller domain. Domain allowed access. Do not audit attempts to search the SELinux configuration directory (/etc/selinux). Domain to not audit. Do not audit attempts to read the SELinux userland configuration (/etc/selinux). Domain to not audit. Read the general SELinux configuration files. Domain allowed access. Read and write the general SELinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. (Deprecated)

Create, read, write, and delete the general selinux configuration files.

This interface has been deprecated, please use the seutil_manage_config() interface instead.

Domain allowed access.
Create, read, write, and delete the general selinux configuration files. Domain allowed access. Create, read, write, and delete the general selinux configuration files. Domain allowed access. Search the policy directory with default_context files. Domain allowed access. Read the default_contexts files. Domain allowed access. Create, read, write, and delete the default_contexts files. Domain allowed access. Read the file_contexts files. Domain allowed access. Do not audit attempts to read the file_contexts files. Domain to not audit. Read and write the file_contexts files. Domain allowed access. Create, read, write, and delete the file_contexts files. Domain allowed access. Read the SELinux binary policy. Domain allowed access. Create the SELinux binary policy. Domain allowed access. Allow the caller to relabel a file to the binary policy type. Domain allowed access. Create, read, write, and delete the SELinux binary policy. Domain allowed access. Read SELinux policy source files. Domain allowed access. Create, read, write, and delete SELinux policy source files. Domain allowed access. Execute a domain transition to run semanage. Domain allowed to transition. Execute semanage in the semanage domain, and allow the specified role the semanage domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Full management of the semanage module store. Domain allowed access. Get read lock on module store Domain allowed access. Get trans lock on module store Domain allowed access. SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will allow access required for the libselinux constructor to function.

Domain allowed access.
Do not audit SELinux-enabled program access for libselinux-linked programs.

SELinux-enabled programs are typically linked to the libselinux library. This interface will dontaudit access required for the libselinux constructor to function.

Generally this should not be used on anything but simple SELinux-enabled programs that do not rely on data initialized by the libselinux constructor.

Domain to not audit.
SELinux MLS/MCS label translation service. Execute setrans server in the setrans domain. Domain allowed to transition. Allow a domain to translate contexts. Domain allowed access. Policy for network configuration: ifconfig and dhcp client. Execute dhcp client in dhcpc domain. Domain allowed to transition. Execute DHCP clients in the dhcpc domain, and allow the specified role the dhcpc domain. Domain allowed to transition. Role allowed access. Do not audit attempts to use the dhcp file descriptors. Domain to not audit. Do not audit attempts to read/write to the dhcp unix stream socket descriptors. Domain to not audit. Send a SIGCHLD signal to the dhcp client. Domain allowed access. Send a kill signal to the dhcp client. Domain allowed access. Send a SIGSTOP signal to the dhcp client. Domain allowed access. Send a null signal to the dhcp client. Domain allowed access. Send a generic signal to the dhcp client. Domain allowed access. Send and receive messages from dhcpc over dbus. Domain allowed access. Read and write dhcp configuration files. Domain allowed access. Search the DHCP client state directories. Domain allowed access. Read dhcp client state files. Domain allowed access. Delete the dhcp client state files. Domain allowed access. Set the attributes of network config files. Domain allowed access. Read network config files.

Allow the specified domain to read the general network configuration files. A common example of this is the /etc/resolv.conf file, which has domain name system (DNS) server IP addresses. Typically, most networking processes will require the access provided by this interface.

Higher-level interfaces which involve networking will generally call this interface, for example:

  • sysnet_dns_name_resolve()
  • sysnet_use_ldap()
  • sysnet_use_portmap()
Domain allowed access.
Do not audit attempts to read network config files. Domain to not audit. Write network config files. Domain allowed access. Create network config files. Domain allowed access. Create files in /etc with the type used for the network config files. Domain allowed access. The name of the object being created. Create, read, write, and delete network config files. Domain allowed access. Read the dhcp client pid file. Domain allowed access. Delete the dhcp client pid file. Domain allowed access. Execute ifconfig in the ifconfig domain. Domain allowed to transition. Execute ifconfig in the ifconfig domain, and allow the specified role the ifconfig domain, and use the caller's terminal. Domain allowed to transition. Role allowed access. Execute ifconfig in the caller domain. Domain allowed access. Send a generic signal to ifconfig. Domain allowed access. Read the DHCP configuration files. Domain allowed access. Search the DHCP state data directory. Domain allowed access. Create DHCP state data.

Create DHCP state data.

This is added for DHCP server, as the server and client put their state files in the same directory.

Domain allowed access. The type of the object to be created The object class. The name of the object being created.
Perform a DNS name resolution. Domain allowed access. Connect and use a LDAP server. Domain allowed access. Connect and use remote port mappers. Domain allowed access.
Policy for udev. Send generic signals to udev. Domain allowed access. Execute udev in the udev domain. Domain allowed to transition. Execute udev in the caller domain. Domain allowed access. Execute a udev helper in the udev domain. Domain allowed to transition. Allow process to read udev process state. Domain allowed access. Do not audit attempts to inherit a udev file descriptor. Domain to not audit. Do not audit attempts to read or write to a udev unix datagram socket. Domain to not audit. Manage udev rules files Domain allowed access. Do not audit search of udev database directories. Domain to not audit. Read the udev device table.

Allow the specified domain to read the udev device table.

Domain allowed access.
Allow process to modify list of devices. Domain allowed access. Search through udev pid content Domain allowed access. Create, read, write, and delete udev pid directories Domain allowed access. Create directories in the run location with udev_var_run_t type Domain allowed access. Name of the directory that is created Create, read, write, and delete udev pid files. Domain allowed access.
The unconfined domain. Make the specified domain unconfined. Domain to make unconfined. Make the specified domain unconfined and audit executable heap usage.

Make the specified domain unconfined and audit executable heap usage. With exception of memory protections, usage of this interface will result in the level of access the domain has is like SELinux was not being used.

Only completely trusted domains should use this interface.

Domain to make unconfined.
Add an alias type to the unconfined domain. (Deprecated)

Add an alias type to the unconfined domain. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined domain.
Add an alias type to the unconfined execmem program file type. (Deprecated)

Add an alias type to the unconfined execmem program file type. (Deprecated)

This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy.

New alias of the unconfined execmem program type.
Transition to the unconfined domain. Domain allowed to transition. Execute specified programs in the unconfined domain. Domain allowed to transition. The role to allow the unconfined domain. Transition to the unconfined domain by executing a shell. Domain allowed to transition. Allow unconfined to execute the specified program in the specified domain.

Allow unconfined to execute the specified program in the specified domain.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

Allow unconfined to execute the specified program in the specified domain. Allow the specified domain the unconfined role and use of unconfined user terminals.

This is a interface to support third party modules and its use is not allowed in upstream reference policy.

Domain to execute in. Domain entry point file.
Inherit file descriptors from the unconfined domain. Domain allowed access. Send a SIGCHLD signal to the unconfined domain. Domain allowed access. Send a SIGNULL signal to the unconfined domain. Domain allowed access. Send generic signals to the unconfined domain. Domain allowed access. Read unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read unconfined domain unnamed pipes. Domain to not audit. Read and write unconfined domain unnamed pipes. Domain allowed access. Do not audit attempts to read and write unconfined domain unnamed pipes. Domain to not audit. Connect to the unconfined domain using a unix domain stream socket. Domain allowed access. Do not audit attempts to read or write unconfined domain tcp sockets.

Do not audit attempts to read or write unconfined domain tcp sockets.

This interface was added due to a broken symptom in ldconfig.

Domain to not audit.
Create keys for the unconfined domain. Domain allowed access. Send messages to the unconfined domain over dbus. Domain allowed access. Send and receive messages from unconfined_t over dbus. Domain allowed access. Connect to the the unconfined DBUS for service (acquire_svc). Domain allowed access.
Policy for user domains Allow a home directory for which the role has read-only access.

Allow a home directory for which the role has read-only access.

This does not allow execute access.

The user role The user domain
Allow a home directory for which the role has full access.

Allow a home directory for which the role has full access.

This does not allow execute access.

The user role The user domain
Manage user temporary files Role allowed access. Domain allowed access. The execute access user temporary files. Domain allowed access. Role access for the user tmpfs type that the user has full access.

Role access for the user tmpfs type that the user has full access.

This does not allow execute access.

Role allowed access. Domain allowed access.
Make the specified type usable as a user application domain type. Type to be used as a user application domain. Make the specified type usable as a user application domain. Type to be used as a user application domain. Type to be used as the domain entry point. Make the specified type usable in a user home directory. Type to be used as a file in the user home directory. Make the specified type usable as a user temporary file. Type to be used as a file in the temporary directories. Make the specified type usable as a user tmpfs file. Type to be used as a file in tmpfs directories. Allow domain to attach to TUN devices created by administrative users. Domain allowed access. Set the attributes of a user pty. Domain allowed access. Create a user pty. Domain allowed access. Get the attributes of user home directories. Domain allowed access. Do not audit attempts to get the attributes of user home directories. Domain to not audit. Search user home directories. Domain allowed access. Do not audit attempts to search user home directories.

Do not audit attempts to search user home directories. This will supress SELinux denial messages when the specified domain is denied the permission to search these directories.

Domain to not audit.
List user home directories. Domain allowed access. Do not audit attempts to list user home subdirectories. Domain to not audit. Create user home directories. Domain allowed access. Create user home directories. Domain allowed access. Relabel to user home directories. Domain allowed access. Create directories in the home dir root with the user home directory type. Domain allowed access. The name of the object being created. Do a domain transition to the specified domain when executing a program in the user home directory.

Do a domain transition to the specified domain when executing a program in the user home directory.

No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module.

Domain allowed to transition. Domain to transition to.
Do not audit attempts to search user home content directories. Domain to not audit. List contents of users home directory. Domain allowed access. Create, read, write, and delete directories in a user home subdirectory. Domain allowed access. Delete directories in a user home subdirectory. Domain allowed access. Do not audit attempts to set the attributes of user home files. Domain to not audit. Mmap user home files. Domain allowed access. Read user home files. Domain allowed access. Do not audit attempts to read user home files. Domain to not audit. Do not audit attempts to append user home files. Domain to not audit. Do not audit attempts to write user home files. Domain to not audit. Delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to write user home files. Domain to not audit. Read user home subdirectory symbolic links. Domain allowed access. Execute user home files. Domain allowed access. Do not audit attempts to execute user home files. Domain to not audit. Create, read, write, and delete files in a user home subdirectory. Domain allowed access. Do not audit attempts to create, read, write, and delete directories in a user home subdirectory. Domain to not audit. Create, read, write, and delete symbolic links in a user home subdirectory. Domain allowed access. Delete symbolic links in a user home directory. Domain allowed access. Create, read, write, and delete named pipes in a user home subdirectory. Domain allowed access. Create, read, write, and delete named sockets in a user home subdirectory. Domain allowed access. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. The name of the object being created. Create objects in a user home directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. The name of the object being created. Create objects in a user home directory with an automatic type transition to the user home file type. Domain allowed access. The class of the object to be created. The name of the object being created. Write to user temporary named sockets. Domain allowed access. List user temporary directories. Domain allowed access. Do not audit attempts to list user temporary directories. Domain to not audit. Do not audit attempts to manage users temporary directories. Domain to not audit. Read user temporary files. Domain allowed access. Do not audit attempts to read users temporary files. Domain to not audit. Do not audit attempts to append users temporary files. Domain to not audit. Read and write user temporary files. Domain allowed access. Do not audit attempts to manage users temporary files. Domain to not audit. Read user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary directories. Domain allowed access. Create, read, write, and delete user temporary files. Domain allowed access. Create, read, write, and delete user temporary symbolic links. Domain allowed access. Create, read, write, and delete user temporary named pipes. Domain allowed access. Create, read, write, and delete user temporary named sockets. Domain allowed access. Create objects in a user temporary directory with an automatic type transition to a specified private type. Domain allowed access. The type of the object to create. The class of the object to be created. The name of the object being created. Create objects in the temporary directory with an automatic type transition to the user temporary type. Domain allowed access. The class of the object to be created. The name of the object being created. Read user tmpfs files. Domain allowed access. Read user tmpfs files. Domain allowed access. Create, read, write, and delete user tmpfs files. Domain allowed access. Get the attributes of a user domain tty. Domain allowed access. Do not audit attempts to get the attributes of a user domain tty. Domain to not audit. Set the attributes of a user domain tty. Domain allowed access. Do not audit attempts to set the attributes of a user domain tty. Domain to not audit. Read and write a user domain tty. Domain allowed access. Read and write a user domain pty. Domain allowed access. Read and write a user TTYs and PTYs.

Allow the specified domain to read and write user TTYs and PTYs. This will allow the domain to interact with the user via the terminal. Typically all interactive applications will require this access.

However, this also allows the applications to spy on user sessions or inject information into the user session. Thus, this access should likely not be allowed for non-interactive domains.

Domain allowed access.
Do not audit attempts to read and write a user domain tty and pty. Domain to not audit. Execute a shell in all user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed to transition. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed to transition. Execute a shell in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed to transition. Execute an Xserver session in all unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed to transition. Read and write unpriviledged user SysV sempaphores. Domain allowed access. Manage unpriviledged user SysV sempaphores. Domain allowed access. Read and write unpriviledged user SysV shared memory segments. Domain allowed access. Manage unpriviledged user SysV shared memory segments. Domain allowed access. Execute bin_t in the unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed to transition. Execute all entrypoint files in unprivileged user domains. This is an explicit transition, requiring the caller to use setexeccon(). Domain allowed access. Search users home directories. Domain allowed access. Send signull to unprivileged user domains. Domain allowed access. Send general signals to unprivileged user domains. Domain allowed access. Inherit the file descriptors from unprivileged user domains. Domain allowed access. Do not audit attempts to inherit the file descriptors from unprivileged user domains.

Do not audit attempts to inherit the file descriptors from unprivileged user domains. This will supress SELinux denial messages when the specified domain is denied the permission to inherit these file descriptors.

Domain to not audit.
Do not audit attempts to use user ptys. Domain to not audit. Relabel files to unprivileged user pty types. Domain allowed access. Do not audit attempts to relabel files from user pty types. Domain to not audit. Write all users files in /tmp Domain allowed access. Do not audit attempts to use user ttys. Domain to not audit. Read the process state of all user domains. Domain allowed access. Get the attributes of all user domains. Domain allowed access. Inherit the file descriptors from all user domains Domain allowed access. Do not audit attempts to inherit the file descriptors from any user domains. Domain to not audit. Send general signals to all user domains. Domain allowed access. Send a SIGCHLD signal to all user domains. Domain allowed access. Create keys for all user domains. Domain allowed access. Send a dbus message to all user domains. Domain allowed access.

Allow users to connect to mysql

Allow users to connect to PostgreSQL

Allow regular users direct mouse access

Allow users to read system messages.

Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)

Allow w to display everyone

Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla

Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")

Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")

Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")

Enable polyinstantiated directory support.

Allow system to run with NIS

Allow logging in and using the system from /dev/console.

Enable reading of urandom for all domains.

This should be enabled when all programs are compiled with ProPolice/SSP stack smashing protection. All domains will be allowed to read from /dev/urandom.

Allow email client to various content. nfs, samba, removable devices, and user temp files

Allow any files/directories to be exported read/write via NFS.

Allow any files/directories to be exported read/only via NFS.

Support NFS home directories

Support SAMBA home directories

Allow users to run TCP servers (bind to ports and accept connection from the same domain and outside users) disabling this forces FTP passive mode and may change other protocols.

Enabling secure mode disallows programs, such as newrole, from transitioning to administrative user domains.