aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorStephen Smalley <sds@tycho.nsa.gov>2017-05-18 16:00:39 -0400
committerJason Zaman <perfinion@gentoo.org>2020-02-15 15:26:20 +0800
commit8c38998a0c3024ef16de5fdc1bc12cef5c521759 (patch)
treee100cf73681e81c3679b08a654ba8f7709180af3 /policy/modules/services/squid.te
parentVagrant: allow VirtualBox provisionning to use dhclient and ip (diff)
downloadhardened-refpolicy-8c38998a0c3024ef16de5fdc1bc12cef5c521759.tar.gz
hardened-refpolicy-8c38998a0c3024ef16de5fdc1bc12cef5c521759.tar.bz2
hardened-refpolicy-8c38998a0c3024ef16de5fdc1bc12cef5c521759.zip
access_vectors: Remove unused permissions
Remove unused permission definitions from SELinux. Many of these were only ever used in pre-mainline versions of SELinux, prior to Linux 2.6.0. Some of them were used in the legacy network or compat_net=1 checks that were disabled by default in Linux 2.6.18 and fully removed in Linux 2.6.30. The corresponding classmap declarations were removed from the mainline kernel in: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42a9699a9fa179c0054ea3cf5ad3cc67104a6162 Permissions never used in mainline Linux: file swapon filesystem transition tcp_socket { connectto newconn acceptfrom } node enforce_dest unix_stream_socket { newconn acceptfrom } Legacy network checks, removed in 2.6.30: socket { recv_msg send_msg } node { tcp_recv tcp_send udp_recv udp_send rawip_recv rawip_send dccp_recv dccp_send } netif { tcp_recv tcp_send udp_recv udp_send rawip_recv rawip_send dccp_recv dccp_send } Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov> Signed-off-by: Jason Zaman <perfinion@gentoo.org>
Diffstat (limited to 'policy/modules/services/squid.te')
-rw-r--r--policy/modules/services/squid.te13
1 files changed, 0 insertions, 13 deletions
diff --git a/policy/modules/services/squid.te b/policy/modules/services/squid.te
index 78952c865..ef7166585 100644
--- a/policy/modules/services/squid.te
+++ b/policy/modules/services/squid.te
@@ -115,43 +115,33 @@ corenet_sendrecv_http_client_packets(squid_t)
corenet_tcp_connect_http_port(squid_t)
corenet_sendrecv_http_server_packets(squid_t)
corenet_tcp_bind_http_port(squid_t)
-corenet_tcp_sendrecv_http_port(squid_t)
corenet_sendrecv_http_cache_client_packets(squid_t)
corenet_tcp_connect_http_cache_port(squid_t)
corenet_sendrecv_http_cache_server_packets(squid_t)
corenet_tcp_bind_http_cache_port(squid_t)
corenet_udp_bind_http_cache_port(squid_t)
-corenet_tcp_sendrecv_http_cache_port(squid_t)
-corenet_udp_sendrecv_http_cache_port(squid_t)
corenet_sendrecv_ftp_client_packets(squid_t)
corenet_tcp_connect_ftp_port(squid_t)
corenet_sendrecv_ftp_server_packets(squid_t)
corenet_tcp_bind_ftp_port(squid_t)
-corenet_tcp_sendrecv_ftp_port(squid_t)
corenet_sendrecv_gopher_client_packets(squid_t)
corenet_tcp_connect_gopher_port(squid_t)
corenet_sendrecv_gopher_server_packets(squid_t)
corenet_tcp_bind_gopher_port(squid_t)
corenet_udp_bind_gopher_port(squid_t)
-corenet_tcp_sendrecv_gopher_port(squid_t)
-corenet_udp_sendrecv_gopher_port(squid_t)
corenet_sendrecv_squid_server_packets(squid_t)
corenet_tcp_bind_squid_port(squid_t)
corenet_udp_bind_squid_port(squid_t)
-corenet_tcp_sendrecv_squid_port(squid_t)
-corenet_udp_sendrecv_squid_port(squid_t)
corenet_sendrecv_wccp_server_packets(squid_t)
corenet_udp_bind_wccp_port(squid_t)
-corenet_udp_sendrecv_wccp_port(squid_t)
corenet_sendrecv_pgpkeyserver_client_packets(squid_t)
corenet_tcp_connect_pgpkeyserver_port(squid_t)
-corenet_tcp_sendrecv_pgpkeyserver_port(squid_t)
corecmd_exec_bin(squid_t)
corecmd_exec_shell(squid_t)
@@ -194,7 +184,6 @@ tunable_policy(`squid_connect_any',`
corenet_tcp_connect_all_ports(squid_t)
corenet_tcp_bind_all_ports(squid_t)
corenet_sendrecv_all_packets(squid_t)
- corenet_tcp_sendrecv_all_ports(squid_t)
')
tunable_policy(`squid_use_pinger',`
@@ -206,7 +195,6 @@ tunable_policy(`squid_use_tproxy',`
allow squid_t self:capability net_admin;
corenet_sendrecv_netport_server_packets(squid_t)
corenet_tcp_bind_netport_port(squid_t)
- corenet_tcp_sendrecv_netport_port(squid_t)
')
optional_policy(`
@@ -219,7 +207,6 @@ optional_policy(`
corenet_sendrecv_http_cache_client_packets(httpd_squid_script_t)
corenet_tcp_connect_http_cache_port(httpd_squid_script_t)
- corenet_tcp_sendrecv_http_cache_port(httpd_squid_script_t)
sysnet_dns_name_resolve(httpd_squid_script_t)