From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 33A56138A1F for ; Tue, 8 Apr 2014 16:02:13 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C03E8E0BD0; Tue, 8 Apr 2014 16:02:05 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id E3E4CE0CE9 for ; Tue, 8 Apr 2014 16:02:03 +0000 (UTC) Received: from spoonbill.gentoo.org (spoonbill.gentoo.org [81.93.255.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id D407633FFDC for ; Tue, 8 Apr 2014 16:02:02 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by spoonbill.gentoo.org (Postfix) with ESMTP id 14053188D0 for ; Tue, 8 Apr 2014 16:02:01 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <1396972486.cf6444b17f433683e92dc5f94814896bf0c6a34b.swift@gentoo> Subject: [gentoo-commits] proj/hardened-refpolicy:master commit in: policy/modules/contrib/ X-VCS-Repository: proj/hardened-refpolicy X-VCS-Files: policy/modules/contrib/apache.te policy/modules/contrib/shibboleth.fc policy/modules/contrib/shibboleth.if policy/modules/contrib/shibboleth.te X-VCS-Directories: policy/modules/contrib/ X-VCS-Committer: swift X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: cf6444b17f433683e92dc5f94814896bf0c6a34b X-VCS-Branch: master Date: Tue, 8 Apr 2014 16:02:01 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 02b7efb7-99fe-4ee3-abfa-85eafdfdd53d X-Archives-Hash: 4f4314c7688c2fe8cad910d897474dbe commit: cf6444b17f433683e92dc5f94814896bf0c6a34b Author: Martin Lang automata rwth-aachen de> AuthorDate: Sat Mar 15 13:29:46 2014 +0000 Commit: Sven Vermeulen gentoo org> CommitDate: Tue Apr 8 15:54:46 2014 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=proj/hardened-refpolicy.git;a=commit;h=cf6444b1 Add a policy module for shibboleth authentication Signed-off-by: Martin Lang automata.rwth-aachen.de> --- policy/modules/contrib/apache.te | 5 +++ policy/modules/contrib/shibboleth.fc | 6 +++ policy/modules/contrib/shibboleth.if | 40 +++++++++++++++++++ policy/modules/contrib/shibboleth.te | 75 ++++++++++++++++++++++++++++++++++++ 4 files changed, 126 insertions(+) diff --git a/policy/modules/contrib/apache.te b/policy/modules/contrib/apache.te index 102d5a8..32f9251 100644 --- a/policy/modules/contrib/apache.te +++ b/policy/modules/contrib/apache.te @@ -867,6 +867,11 @@ optional_policy(` ') optional_policy(` + shibboleth_read_config(httpd_t) + shibboleth_stream_connect(httpd_t) +') + +optional_policy(` smokeping_read_lib_files(httpd_t) ') diff --git a/policy/modules/contrib/shibboleth.fc b/policy/modules/contrib/shibboleth.fc new file mode 100644 index 0000000..a0b9626 --- /dev/null +++ b/policy/modules/contrib/shibboleth.fc @@ -0,0 +1,6 @@ +/etc/shibboleth(/.*)? gen_context(system_u:object_r:shibboleth_etc_t,s0) + +/usr/sbin/shibd -- gen_context(system_u:object_r:shibboleth_exec_t,s0) + +/var/log/shibboleth(/.*)? gen_context(system_u:object_r:shibboleth_log_t,s0) +/var/run/shibboleth(/.*)? gen_context(system_u:object_r:shibboleth_var_run_t,s0) diff --git a/policy/modules/contrib/shibboleth.if b/policy/modules/contrib/shibboleth.if new file mode 100644 index 0000000..4a3ba02 --- /dev/null +++ b/policy/modules/contrib/shibboleth.if @@ -0,0 +1,40 @@ +## Shibboleth authentication deamon + +######################################## +## +## Allow your application domain to access +## config files from shibboleth +## +## +## +## The domain which should be enabled. +## +## +# +interface(`shibboleth_read_config',` + gen_require(` + type shibboleth_etc_t; + ') + + read_files_pattern($1, shibboleth_etc_t, shibboleth_etc_t) +') + +######################################## +## +## Allow the specified domain to connect to shibboleth with a unix socket. +## +## +## +## Domain allowed access. +## +## +# +interface(`shibboleth_stream_connect',` + gen_require(` + type shibboleth_t; + type shibboleth_var_run_t; + ') + + stream_connect_pattern($1, shibboleth_var_run_t, shibboleth_var_run_t, shibboleth_t) + files_search_pids($1) +') diff --git a/policy/modules/contrib/shibboleth.te b/policy/modules/contrib/shibboleth.te new file mode 100644 index 0000000..d1f4212 --- /dev/null +++ b/policy/modules/contrib/shibboleth.te @@ -0,0 +1,75 @@ +policy_module(shibboleth, 2.0.0) + +######################################## +# +# Declarations +# + +type shibboleth_t; +type shibboleth_exec_t; +init_daemon_domain(shibboleth_t, shibboleth_exec_t) + +type shibboleth_etc_t; +files_config_file(shibboleth_etc_t) + +type shibboleth_log_t; +logging_log_file(shibboleth_log_t) + +type shibboleth_var_run_t; +files_pid_file(shibboleth_var_run_t) +init_daemon_run_dir(shibboleth_var_run_t, "shibboleth") + +######################################## +# +# Local policy +# + +allow shibboleth_t self:process { signal_perms }; + +# networking: +# shibboleth uses tcp sockets for connecting to central +# authentication server and unix stream sockets +# to exchange information with the apache module +allow shibboleth_t self:unix_stream_socket create_stream_socket_perms; +allow shibboleth_t self:tcp_socket create_stream_socket_perms; + +read_files_pattern(shibboleth_t, shibboleth_etc_t, shibboleth_etc_t) +read_lnk_files_pattern(shibboleth_t, shibboleth_etc_t, shibboleth_etc_t) + +manage_files_pattern(shibboleth_t, shibboleth_log_t, shibboleth_log_t) + +manage_files_pattern(shibboleth_t, shibboleth_var_run_t, shibboleth_var_run_t) +manage_sock_files_pattern(shibboleth_t, shibboleth_var_run_t, shibboleth_var_run_t) + + +corenet_all_recvfrom_netlabel(shibboleth_t) +corenet_all_recvfrom_unlabeled(shibboleth_t) +corenet_tcp_connect_http_port(shibboleth_t) +corenet_tcp_sendrecv_all_ports(shibboleth_t) +corenet_tcp_sendrecv_generic_if(shibboleth_t) +corenet_tcp_sendrecv_generic_node(shibboleth_t) + +dev_read_urand(shibboleth_t) + +domain_dontaudit_use_interactive_fds(shibboleth_t) + +files_read_etc_files(shibboleth_t) +files_read_usr_files(shibboleth_t) +files_search_etc(shibboleth_t) + +term_dontaudit_search_ptys(shibboleth_t) +term_dontaudit_use_all_ptys(shibboleth_t) +term_dontaudit_use_all_ttys(shibboleth_t) + + +logging_log_filetrans(shibboleth_t, shibboleth_log_t, { file dir }) +logging_send_syslog_msg(shibboleth_t) + +miscfiles_read_localization(shibboleth_t) + +sysnet_dns_name_resolve(shibboleth_t) + + +# permissions for the configuration files +# there is shared information between apache and shibboleth, e.g., certificates +apache_read_config(shibboleth_t)