2015-11-21 16:14:31 -05:00
|
|
|
## <summary>ossec policy</summary>
|
|
|
|
## <desc>
|
|
|
|
## <p>
|
|
|
|
## More descriptive text about ossec. The desc
|
|
|
|
## tag can also use p, ul, and ol
|
|
|
|
## html tags for formatting.
|
|
|
|
## </p>
|
|
|
|
## <p>
|
|
|
|
## This policy supports the following ossec features:
|
|
|
|
## <ul>
|
|
|
|
## <li>Feature A</li>
|
|
|
|
## <li>Feature B</li>
|
|
|
|
## <li>Feature C</li>
|
|
|
|
## </ul>
|
|
|
|
## </p>
|
|
|
|
## </desc>
|
|
|
|
#
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Execute a domain transition to run ossec.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed to transition.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`ossec_domtrans',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_t, ossec_exec_t;
|
|
|
|
type httpd_t, httpd_exec_t;
|
|
|
|
role system_r;
|
|
|
|
')
|
|
|
|
|
|
|
|
domain_type(ossec_t)
|
|
|
|
domain_entry_file(ossec_t, ossec_exec_t)
|
|
|
|
|
|
|
|
role system_r types ossec_t;
|
|
|
|
|
|
|
|
domtrans_pattern($1, ossec_exec_t, ossec_t)
|
|
|
|
#domtrans_pattern($1,ossec_exec_t,ossec_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Read ossec log files.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed to read the log files.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`ossec_read_log',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_log_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
logging_search_logs($1)
|
|
|
|
allow $1 ossec_log_t:file read_file_perms;
|
|
|
|
')
|
|
|
|
|
|
|
|
########################################
|
|
|
|
## <summary>
|
|
|
|
## Write ossec log files.
|
|
|
|
## </summary>
|
|
|
|
## <param name="domain">
|
|
|
|
## <summary>
|
|
|
|
## Domain allowed to write the log files.
|
|
|
|
## </summary>
|
|
|
|
## </param>
|
|
|
|
#
|
|
|
|
interface(`ossec_write_log',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_log_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 ossec_log_t:file write;
|
|
|
|
')
|
|
|
|
|
2015-11-23 19:04:56 -05:00
|
|
|
|
|
|
|
|
|
|
|
interface(`ossec_read_config',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_etc_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
search_dirs_pattern($1, ossec_etc_t, ossec_etc_t)
|
|
|
|
read_lnk_files_pattern($1, ossec_etc_t, ossec_etc_t)
|
|
|
|
read_files_pattern($1, ossec_etc_t, ossec_etc_t)
|
|
|
|
sysnet_read_config($1)
|
|
|
|
')
|
|
|
|
|
|
|
|
interface(`ossec_read_etc_shared',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_etc_t;
|
|
|
|
type ossec_etc_share_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
search_dirs_pattern($1, ossec_etc_t, ossec_etc_t)
|
|
|
|
search_dirs_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
|
|
|
|
read_files_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
|
|
|
|
')
|
|
|
|
|
|
|
|
interface(`ossec_manage_etc_shared',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_etc_t;
|
|
|
|
type ossec_etc_share_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
search_dirs_pattern($1, ossec_etc_t, ossec_etc_t)
|
|
|
|
search_dirs_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
|
|
|
|
manage_files_pattern($1, ossec_etc_share_t, ossec_etc_share_t)
|
|
|
|
')
|
|
|
|
|
2015-11-24 01:27:25 -05:00
|
|
|
interface(`ossec_pid_filetrans',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_var_t, ossec_var_run_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
allow $1 ossec_var_t:dir search_dir_perms;
|
|
|
|
allow $1 ossec_var_run_t:lnk_file read_lnk_file_perms;
|
|
|
|
filetrans_pattern($1, ossec_var_run_t, $2, $3, $4)
|
|
|
|
')
|
|
|
|
|
|
|
|
interface(`ossec_log_filetrans',`
|
|
|
|
gen_require(`
|
|
|
|
type ossec_log_t;
|
|
|
|
')
|
|
|
|
|
|
|
|
filetrans_pattern($1, ossec_log_t, $2, $3, $4)
|
|
|
|
')
|
|
|
|
|