Master tunable index:
Module:
abrt
Layer:
contrib
abrt_anon_write
(Default: false)
Allow ABRT to modify public files
used for public file transfer services.
Module:
abrt
Layer:
contrib
abrt_handle_event
(Default: false)
Determine whether ABRT can run in
the abrt_handle_event_t domain to
handle ABRT event scripts.
Module:
abrt
Layer:
contrib
abrt_upload_watch_anon_write
(Default: true)
Determine whether abrt-handle-upload
can modify public files used for public file
transfer services in /var/spool/abrt-upload/.
Module:
amavis
Layer:
contrib
amavis_use_jit
(Default: false)
Determine whether amavis can
use JIT compiler.
Module:
antivirus
Layer:
contrib
antivirus_can_scan_system
(Default: false)
Allow antivirus programs to read non security files on a system
Module:
antivirus
Layer:
contrib
antivirus_use_jit
(Default: false)
Determine whether can antivirus programs use JIT compiler.
Module:
authlogin
Layer:
system
authlogin_nsswitch_use_ldap
(Default: false)
Allow users to resolve user passwd entries directly from ldap rather then using a sssd server
Module:
authlogin
Layer:
system
authlogin_radius
(Default: false)
Allow users to login using a radius server
Module:
authlogin
Layer:
system
authlogin_yubikey
(Default: false)
Allow users to login using a yubikey OTP server or challenge response mode
Module:
awstats
Layer:
contrib
awstats_purge_apache_log_files
(Default: false)
Determine whether awstats can
purge httpd log files.
Module:
boinc
Layer:
contrib
boinc_execmem
(Default: true)
Determine whether boinc can execmem/execstack.
Module:
cdrecord
Layer:
contrib
cdrecord_read_content
(Default: false)
Determine whether cdrecord can read
various content. nfs, samba, removable
devices, user temp and untrusted
content files
Module:
clamav
Layer:
contrib
clamav_read_all_non_security_files_clamscan
(Default: false)
Determine whether clamscan can read
all non-security files.
Module:
clamav
Layer:
contrib
clamav_read_user_content_files_clamscan
(Default: false)
Determine whether clamscan can
read user content files.
Module:
clamav
Layer:
contrib
clamd_use_jit
(Default: false)
Determine whether can clamd use JIT compiler.
Module:
rhcs
Layer:
contrib
cluster_can_network_connect
(Default: false)
Allow cluster administrative domains to connect to the network using TCP.
Module:
rhcs
Layer:
contrib
cluster_manage_all_files
(Default: false)
Allow cluster administrative domains to manage all files on a system.
Module:
rhcs
Layer:
contrib
cluster_use_execmem
(Default: false)
Allow cluster administrative cluster domains memcheck-amd64- to use executable memory
Module:
cobbler
Layer:
contrib
cobbler_anon_write
(Default: false)
Determine whether Cobbler can modify
public files used for public file
transfer services.
Module:
cobbler
Layer:
contrib
cobbler_can_network_connect
(Default: false)
Determine whether Cobbler can connect
to the network using TCP.
Module:
cobbler
Layer:
contrib
cobbler_use_cifs
(Default: false)
Determine whether Cobbler can access
cifs file systems.
Module:
cobbler
Layer:
contrib
cobbler_use_nfs
(Default: false)
Determine whether Cobbler can access
nfs file systems.
Module:
collectd
Layer:
contrib
collectd_tcp_network_connect
(Default: false)
Determine whether collectd can connect
to the network using TCP.
Module:
condor
Layer:
contrib
condor_tcp_network_connect
(Default: false)
Determine whether Condor can connect
to the network using TCP.
Module:
conman
Layer:
contrib
conman_can_network
(Default: false)
Determine whether conman can
connect to all TCP ports
Module:
container
Layer:
contrib
container_connect_any
(Default: false)
Determine whether container can
connect to all TCP ports.
Module:
cron
Layer:
contrib
cron_can_relabel
(Default: false)
Allow system cron jobs to relabel filesystem
for restoring file contexts.
Module:
cron
Layer:
contrib
cron_system_cronjob_use_shares
(Default: false)
Allow system cronjob to be executed on
on NFS, CIFS or FUSE filesystem.
Module:
cron
Layer:
contrib
cron_userdomain_transition
(Default: true)
Determine whether crond can execute jobs
in the user domain as opposed to the
the generic cronjob domain.
Module:
cups
Layer:
contrib
cups_execmem
(Default: false)
Allow cups execmem/execstack
Module:
cvs
Layer:
contrib
cvs_read_shadow
(Default: false)
Determine whether cvs can read shadow
password files.
Module:
init
Layer:
system
daemons_dump_core
(Default: false)
Allow all daemons to write corefiles to /
Module:
init
Layer:
system
daemons_enable_cluster_mode
(Default: false)
Enable cluster mode for daemons.
Module:
init
Layer:
system
daemons_use_tcp_wrapper
(Default: false)
Allow all daemons to use tcp wrappers.
Module:
init
Layer:
system
daemons_use_tty
(Default: false)
Allow all daemons the ability to read/write terminals
Module:
dbadm
Layer:
contrib
dbadm_manage_user_files
(Default: false)
Determine whether dbadm can manage
generic user files.
Module:
dbadm
Layer:
contrib
dbadm_read_user_files
(Default: false)
Determine whether dbadm can read
generic user files.
Global
deny_execmem
(Default: false)
Deny user domains applications to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla
Global
deny_ptrace
(Default: false)
Deny any process from ptracing or debugging any other processes.
Module:
sysnetwork
Layer:
system
dhcpc_exec_iptables
(Default: false)
Allow dhcpc client applications to execute iptables commands
Module:
dhcp
Layer:
contrib
dhcpd_use_ldap
(Default: false)
Determine whether DHCP daemon
can use LDAP backends.
Module:
domain
Layer:
kernel
domain_fd_use
(Default: true)
Allow all domains to use other domains file descriptors
Module:
domain
Layer:
kernel
domain_kernel_load_modules
(Default: false)
Allow all domains to have the kernel load modules
Module:
entropyd
Layer:
contrib
entropyd_use_audio
(Default: true)
Determine whether entropyd can use
audio devices as the source for
the entropy feeds.
Module:
exim
Layer:
contrib
exim_can_connect_db
(Default: false)
Determine whether exim can connect to
databases.
Module:
exim
Layer:
contrib
exim_manage_user_files
(Default: false)
Determine whether exim can create,
read, write, and delete generic user
content files.
Module:
exim
Layer:
contrib
exim_read_user_files
(Default: false)
Determine whether exim can read generic
user content files.
Module:
cron
Layer:
contrib
fcron_crond
(Default: false)
Enable extra rules in the cron domain
to support fcron.
Module:
rhcs
Layer:
contrib
fenced_can_network_connect
(Default: false)
Determine whether fenced can
connect to the TCP network.
Module:
rhcs
Layer:
contrib
fenced_can_ssh
(Default: false)
Determine whether fenced can use ssh.
Module:
domain
Layer:
kernel
fips_mode
(Default: true)
Allow all domains to execute in fips_mode
Module:
ftp
Layer:
contrib
ftpd_anon_write
(Default: false)
Determine whether ftpd can modify
public files used for public file
transfer services. Directories/Files must
be labeled public_content_rw_t.
Module:
ftp
Layer:
contrib
ftpd_connect_all_unreserved
(Default: false)
Determine whether ftpd can connect to
all unreserved ports.
Module:
ftp
Layer:
contrib
ftpd_connect_db
(Default: false)
Determine whether ftpd can connect to
databases over the TCP network.
Module:
ftp
Layer:
contrib
ftpd_full_access
(Default: false)
Determine whether ftpd can login to
local users and can read and write
all files on the system, governed by DAC.
Module:
ftp
Layer:
contrib
ftpd_use_cifs
(Default: false)
Determine whether ftpd can use CIFS
used for public file transfer services.
Module:
ftp
Layer:
contrib
ftpd_use_fusefs
(Default: false)
Allow ftpd to use ntfs/fusefs volumes.
Module:
ftp
Layer:
contrib
ftpd_use_nfs
(Default: false)
Determine whether ftpd can use NFS
used for public file transfer services.
Module:
ftp
Layer:
contrib
ftpd_use_passive_mode
(Default: false)
Determine whether ftpd can bind to all
unreserved ports for passive mode.
Module:
git
Layer:
contrib
git_cgi_enable_homedirs
(Default: false)
Determine whether Git CGI
can search home directories.
Module:
git
Layer:
contrib
git_cgi_use_cifs
(Default: false)
Determine whether Git CGI
can access cifs file systems.
Module:
git
Layer:
contrib
git_cgi_use_nfs
(Default: false)
Determine whether Git CGI
can access nfs file systems.
Module:
git
Layer:
contrib
git_session_bind_all_unreserved_ports
(Default: false)
Determine whether Git session daemon
can bind TCP sockets to all
unreserved ports.
Module:
git
Layer:
contrib
git_session_users
(Default: false)
Determine whether calling user domains
can execute Git daemon in the
git_session_t domain.
Module:
git
Layer:
contrib
git_system_enable_homedirs
(Default: false)
Determine whether Git system daemon
can search home directories.
Module:
git
Layer:
contrib
git_system_use_cifs
(Default: false)
Determine whether Git system daemon
can access cifs file systems.
Module:
git
Layer:
contrib
git_system_use_nfs
(Default: false)
Determine whether Git system daemon
can access nfs file systems.
Module:
gitosis
Layer:
contrib
gitosis_can_sendmail
(Default: false)
Determine whether Gitosis can send mail.
Module:
glance
Layer:
contrib
glance_api_can_network
(Default: false)
Determine whether glance-api can
connect to all TCP ports
Module:
glance
Layer:
contrib
glance_use_execmem
(Default: false)
Allow glance domain to use executable memory and executable stack
Module:
glance
Layer:
contrib
glance_use_fusefs
(Default: false)
Allow glance domain to manage fuse files
Global
global_ssp
(Default: false)
Enable reading of urandom for all domains.
This should be enabled when all programs
are compiled with ProPolice/SSP
stack smashing protection. All domains will
be allowed to read from /dev/urandom.
Module:
glusterd
Layer:
contrib
gluster_anon_write
(Default: false)
Allow glusterfsd to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Module:
glusterd
Layer:
contrib
gluster_export_all_ro
(Default: false)
Allow glusterfsd to share any file/directory read only.
Module:
glusterd
Layer:
contrib
gluster_export_all_rw
(Default: true)
Allow glusterfsd to share any file/directory read/write.
Module:
gpg
Layer:
contrib
gpg_web_anon_write
(Default: false)
Allow gpg web domain to modify public files
used for public file transfer services.
Module:
rpc
Layer:
contrib
gssd_read_tmp
(Default: true)
Allow gssd to list tmp directories and read the kerberos credential cache.
Module:
rhcs
Layer:
contrib
haproxy_connect_any
(Default: false)
Determine whether haproxy can
connect to all TCP ports.
Module:
apache
Layer:
contrib
httpd_anon_write
(Default: false)
Allow Apache to modify public files
used for public file transfer services. Directories/Files must
be labeled public_content_rw_t.
Module:
apache
Layer:
contrib
httpd_builtin_scripting
(Default: false)
Allow httpd to use built in scripting (usually php)
Module:
apache
Layer:
contrib
httpd_can_check_spam
(Default: false)
Allow http daemon to check spam
Module:
apache
Layer:
contrib
httpd_can_connect_ftp
(Default: false)
Allow httpd to act as a FTP client
connecting to the ftp port and ephemeral ports
Module:
apache
Layer:
contrib
httpd_can_connect_ldap
(Default: false)
Allow httpd to connect to the ldap port
Module:
apache
Layer:
contrib
httpd_can_connect_mythtv
(Default: false)
Allow http daemon to connect to mythtv
Module:
apache
Layer:
contrib
httpd_can_connect_zabbix
(Default: false)
Allow http daemon to connect to zabbix
Module:
apache
Layer:
contrib
httpd_can_network_connect
(Default: false)
Allow HTTPD scripts and modules to connect to the network using TCP.
Module:
apache
Layer:
contrib
httpd_can_network_connect_cobbler
(Default: false)
Allow HTTPD scripts and modules to connect to cobbler over the network.
Module:
apache
Layer:
contrib
httpd_can_network_connect_db
(Default: false)
Allow HTTPD scripts and modules to connect to databases over the network.
Module:
apache
Layer:
contrib
httpd_can_network_memcache
(Default: false)
Allow httpd to connect to memcache server
Module:
apache
Layer:
contrib
httpd_can_network_relay
(Default: false)
Allow httpd to act as a relay
Module:
apache
Layer:
contrib
httpd_can_sendmail
(Default: false)
Allow http daemon to send mail
Module:
apache
Layer:
contrib
httpd_dbus_avahi
(Default: false)
Allow Apache to communicate with avahi service via dbus
Module:
apache
Layer:
contrib
httpd_dbus_sssd
(Default: false)
Allow Apache to communicate with sssd service via dbus
Module:
apache
Layer:
contrib
httpd_dontaudit_search_dirs
(Default: false)
Dontaudit Apache to search dirs.
Module:
apache
Layer:
contrib
httpd_enable_ftp_server
(Default: false)
Allow httpd to act as a FTP server by
listening on the ftp port.
Module:
apache
Layer:
contrib
httpd_enable_homedirs
(Default: false)
Allow httpd to read home directories
Module:
apache
Layer:
contrib
httpd_execmem
(Default: false)
Allow httpd scripts and modules execmem/execstack
Module:
apache
Layer:
contrib
httpd_graceful_shutdown
(Default: false)
Allow HTTPD to connect to port 80 for graceful shutdown
Module:
apache
Layer:
contrib
httpd_manage_ipa
(Default: false)
Allow httpd processes to manage IPA content
Module:
apache
Layer:
contrib
httpd_mod_auth_ntlm_winbind
(Default: false)
Allow Apache to use mod_auth_ntlm_winbind
Module:
apache
Layer:
contrib
httpd_mod_auth_pam
(Default: false)
Allow Apache to use mod_auth_pam
Module:
apache
Layer:
contrib
httpd_read_user_content
(Default: false)
Allow httpd to read user content
Module:
apache
Layer:
contrib
httpd_run_ipa
(Default: false)
Allow httpd processes to run IPA helper.
Module:
apache
Layer:
contrib
httpd_run_preupgrade
(Default: false)
Allow Apache to run preupgrade
Module:
apache
Layer:
contrib
httpd_run_stickshift
(Default: false)
Allow Apache to run in stickshift mode, not transition to passenger
Module:
apache
Layer:
contrib
httpd_serve_cobbler_files
(Default: false)
Allow HTTPD scripts and modules to server cobbler files.
Module:
apache
Layer:
contrib
httpd_setrlimit
(Default: false)
Allow httpd daemon to change its resource limits
Module:
apache
Layer:
contrib
httpd_ssi_exec
(Default: false)
Allow HTTPD to run SSI executables in the same domain as system CGI scripts.
Module:
apache
Layer:
contrib
httpd_sys_script_anon_write
(Default: false)
Allow apache scripts to write to public content, directories/files must be labeled public_rw_content_t.
Module:
apache
Layer:
contrib
httpd_tmp_exec
(Default: false)
Allow Apache to execute tmp content.
Module:
apache
Layer:
contrib
httpd_tty_comm
(Default: false)
Unify HTTPD to communicate with the terminal.
Needed for entering the passphrase for certificates at
the terminal.
Module:
apache
Layer:
contrib
httpd_unified
(Default: false)
Unify HTTPD handling of all content files.
Module:
apache
Layer:
contrib
httpd_use_cifs
(Default: false)
Allow httpd to access cifs file systems
Module:
apache
Layer:
contrib
httpd_use_fusefs
(Default: false)
Allow httpd to access FUSE file systems
Module:
apache
Layer:
contrib
httpd_use_nfs
(Default: false)
Allow httpd to access nfs file systems
Module:
apache
Layer:
contrib
httpd_use_openstack
(Default: false)
Allow httpd to access openstack ports
Module:
apache
Layer:
contrib
httpd_use_sasl
(Default: false)
Allow httpd to connect to sasl
Module:
apache
Layer:
contrib
httpd_verify_dns
(Default: false)
Allow Apache to query NS records
Module:
icecast
Layer:
contrib
icecast_use_any_tcp_ports
(Default: false)
Determine whether icecast can listen
on and connect to any TCP port.
Module:
irc
Layer:
contrib
irc_use_any_tcp_ports
(Default: false)
Determine whether irc clients can
listen on and connect to any
unreserved TCP ports.
Module:
irc
Layer:
contrib
irssi_use_full_network
(Default: false)
Allow the Irssi IRC Client to connect to any port,
and to bind to any unreserved port.
Module:
java
Layer:
contrib
java_execstack
(Default: false)
Determine whether java can make
its stack executable.
Module:
kdumpgui
Layer:
contrib
kdumpgui_run_bootloader
(Default: false)
Allow s-c-kdump to run bootloader in bootloader_t.
Module:
kerberos
Layer:
contrib
kerberos_enabled
(Default: false)
Allow confined applications to run with kerberos.
Module:
ksmtuned
Layer:
contrib
ksmtuned_use_cifs
(Default: false)
Allow ksmtuned to use cifs/Samba file systems
Module:
ksmtuned
Layer:
contrib
ksmtuned_use_nfs
(Default: false)
Allow ksmtuned to use nfs file systems
Module:
logging
Layer:
system
logging_syslogd_can_sendmail
(Default: false)
Allow syslogd daemon to send mail
Module:
logging
Layer:
system
logging_syslogd_run_nagios_plugins
(Default: false)
Allow syslogd the ability to call nagios plugins. It is
turned on by omprog rsyslog plugin.
Module:
logging
Layer:
system
logging_syslogd_use_tty
(Default: true)
Allow syslogd the ability to read/write terminals
Global
login_console_enabled
(Default: true)
Allow logging in and using the system from /dev/console.
Module:
logrotate
Layer:
contrib
logrotate_read_inside_containers
(Default: false)
Allow logrotate to read logs inside
Module:
logrotate
Layer:
contrib
logrotate_use_nfs
(Default: false)
Allow logrotate to manage nfs files
Module:
logwatch
Layer:
contrib
logwatch_can_network_connect_mail
(Default: false)
Determine whether logwatch can connect
to mail over the network.
Module:
lsm
Layer:
contrib
lsmd_plugin_connect_any
(Default: false)
Determine whether lsmd_plugin can
connect to all TCP ports.
Module:
mailman
Layer:
contrib
mailman_use_fusefs
(Default: false)
Allow mailman to access FUSE file systems
Module:
mcelog
Layer:
contrib
mcelog_client
(Default: false)
Determine whether mcelog supports
client mode.
Module:
mcelog
Layer:
contrib
mcelog_exec_scripts
(Default: true)
Determine whether mcelog can execute scripts.
Module:
mcelog
Layer:
contrib
mcelog_foreground
(Default: false)
Determine whether mcelog can use all
the user ttys.
Module:
mcelog
Layer:
contrib
mcelog_server
(Default: false)
Determine whether mcelog supports
server mode.
Module:
minidlna
Layer:
contrib
minidlna_read_generic_user_content
(Default: false)
Determine whether minidlna can read generic user content.
Module:
domain
Layer:
kernel
mmap_low_allowed
(Default: false)
Control the ability to mmap a low area of the address space,
as configured by /proc/sys/vm/mmap_min_addr.
Module:
mock
Layer:
contrib
mock_enable_homedirs
(Default: false)
Allow mock to read files in home directories.
Global
mount_anyfile
(Default: false)
Allow the mount commands to mount any directory or file.
Module:
mozilla
Layer:
contrib
mozilla_plugin_bind_unreserved_ports
(Default: false)
Allow mozilla plugin domain to bind unreserved tcp/udp ports.
Module:
mozilla
Layer:
contrib
mozilla_plugin_can_network_connect
(Default: true)
Allow mozilla plugin domain to connect to the network using TCP.
Module:
mozilla
Layer:
contrib
mozilla_plugin_use_bluejeans
(Default: false)
Allow mozilla plugin to use Bluejeans.
Module:
mozilla
Layer:
contrib
mozilla_plugin_use_gps
(Default: false)
Allow mozilla plugin to support GPS.
Module:
mozilla
Layer:
contrib
mozilla_plugin_use_spice
(Default: false)
Allow mozilla plugin to support spice protocols.
Module:
mozilla
Layer:
contrib
mozilla_read_content
(Default: false)
Allow confined web browsers to read home directory content
Module:
mpd
Layer:
contrib
mpd_enable_homedirs
(Default: false)
Determine whether mpd can traverse
user home directories.
Module:
mpd
Layer:
contrib
mpd_use_cifs
(Default: false)
Determine whether mpd can use
cifs file systems.
Module:
mpd
Layer:
contrib
mpd_use_nfs
(Default: false)
Determine whether mpd can use
nfs file systems.
Module:
mplayer
Layer:
contrib
mplayer_execstack
(Default: false)
Determine whether mplayer can make
its stack executable.
Module:
mysql
Layer:
contrib
mysql_connect_any
(Default: false)
Allow mysqld to connect to all ports
Module:
mysql
Layer:
contrib
mysql_connect_http
(Default: false)
Allow mysqld to connect to http port
Module:
nagios
Layer:
contrib
nagios_run_pnp4nagios
(Default: false)
Allow nagios run in conjunction with PNP4Nagios.
Module:
nagios
Layer:
contrib
nagios_run_sudo
(Default: false)
Allow nagios/nrpe to call sudo from NRPE utils scripts.
Module:
bind
Layer:
contrib
named_tcp_bind_http_port
(Default: false)
Determine whether Bind can bind tcp socket to http ports.
Module:
bind
Layer:
contrib
named_write_master_zones
(Default: false)
Determine whether Bind can write to master zone files.
Generally this is used for dynamic DNS or zone transfers.
Module:
quantum
Layer:
contrib
neutron_can_network
(Default: false)
Determine whether neutron can
connect to all TCP ports
Global
nfs_export_all_ro
(Default: false)
Allow any files/directories to be exported read/only via NFS.
Global
nfs_export_all_rw
(Default: false)
Allow any files/directories to be exported read/write via NFS.
Module:
rpc
Layer:
contrib
nfsd_anon_write
(Default: false)
Allow nfs servers to modify public files
used for public file transfer services. Files/Directories must be
labeled public_content_rw_t.
Global
nis_enabled
(Default: false)
Allow system to run with NIS
Module:
nscd
Layer:
contrib
nscd_use_shm
(Default: false)
Allow confined applications to use nscd shared memory.
Module:
nsplugin
Layer:
contrib
nsplugin_can_network
(Default: true)
Allow nsplugin code to connect to unreserved ports
Module:
nsplugin
Layer:
contrib
nsplugin_execmem
(Default: false)
Allow nsplugin code to execmem/execstack
Module:
openshift
Layer:
contrib
openshift_use_nfs
(Default: false)
Allow openshift to access nfs file systems without labels
Module:
openvpn
Layer:
contrib
openvpn_can_network_connect
(Default: true)
Determine whether openvpn can
connect to the TCP network.
Module:
openvpn
Layer:
contrib
openvpn_enable_homedirs
(Default: false)
Determine whether openvpn can
read generic user home content files.
Module:
openvpn
Layer:
contrib
openvpn_run_unconfined
(Default: false)
Allow openvpn to run unconfined scripts
Module:
pacemaker
Layer:
contrib
pacemaker_use_execmem
(Default: false)
Allow pacemaker memcheck-amd64- to use executable memory
Module:
pcp
Layer:
contrib
pcp_bind_all_unreserved_ports
(Default: false)
Allow pcp to bind to all unreserved_ports
Module:
pcp
Layer:
contrib
pcp_read_generic_logs
(Default: false)
Allow pcp to read generic logs
Module:
pdns
Layer:
contrib
pdns_can_network_connect_db
(Default: false)
Allow PowerDNS to connect to databases over the network.
Module:
piranha
Layer:
contrib
piranha_lvs_can_network_connect
(Default: false)
Allow piranha-lvs domain to connect to the network using TCP.
Module:
polipo
Layer:
contrib
polipo_connect_all_unreserved
(Default: false)
Allow polipo to connect to all ports > 1023
Module:
polipo
Layer:
contrib
polipo_session_bind_all_unreserved_ports
(Default: false)
Determine whether Polipo session daemon
can bind tcp sockets to all unreserved ports.
Module:
polipo
Layer:
contrib
polipo_session_users
(Default: false)
Determine whether calling user domains
can execute Polipo daemon in the
polipo_session_t domain.
Module:
polipo
Layer:
contrib
polipo_use_cifs
(Default: false)
Determine whether polipo can
access cifs file systems.
Module:
polipo
Layer:
contrib
polipo_use_nfs
(Default: false)
Determine whether Polipo can
access nfs file systems.
Global
polyinstantiation_enabled
(Default: false)
Enable polyinstantiated directory support.
Module:
portage
Layer:
contrib
portage_use_nfs
(Default: false)
Determine whether portage can
use nfs filesystems.
Module:
postfix
Layer:
contrib
postfix_local_write_mail_spool
(Default: true)
Allow postfix_local domain full write access to mail_spool directories
Module:
postgresql
Layer:
services
postgresql_can_rsync
(Default: false)
Allow postgresql to use ssh and rsync for point-in-time recovery
Module:
postgresql
Layer:
services
postgresql_selinux_transmit_client_label
(Default: false)
Allow transmit client label to foreign database
Module:
postgresql
Layer:
services
postgresql_selinux_unconfined_dbadm
(Default: true)
Allow database admins to execute DML statement
Module:
postgresql
Layer:
services
postgresql_selinux_users_ddl
(Default: true)
Allow unprivileged users to execute DDL statement
Module:
ppp
Layer:
contrib
pppd_can_insmod
(Default: false)
Allow pppd to load kernel modules for certain modems
Module:
ppp
Layer:
contrib
pppd_for_user
(Default: false)
Allow pppd to be run for a regular user
Module:
privoxy
Layer:
contrib
privoxy_connect_any
(Default: false)
Determine whether privoxy can
connect to all tcp ports.
Module:
prosody
Layer:
contrib
prosody_bind_http_port
(Default: false)
Permit to prosody to bind apache port.
Need to be activated to use BOSH.
Module:
puppet
Layer:
contrib
puppetagent_manage_all_files
(Default: false)
Allow Puppet client to manage all file
types.
Module:
puppet
Layer:
contrib
puppetmaster_use_db
(Default: false)
Allow Puppet master to use connect to MySQL and PostgreSQL database
Module:
qemu
Layer:
contrib
qemu_full_network
(Default: false)
Allow qemu to connect fully to the network
Module:
qemu
Layer:
contrib
qemu_use_cifs
(Default: true)
Allow qemu to use cifs/Samba file systems
Module:
qemu
Layer:
contrib
qemu_use_comm
(Default: false)
Allow qemu to use serial/parallel communication ports
Module:
qemu
Layer:
contrib
qemu_use_nfs
(Default: true)
Allow qemu to use nfs file systems
Module:
qemu
Layer:
contrib
qemu_use_usb
(Default: true)
Allow qemu to use usb devices
Module:
ipsec
Layer:
system
racoon_read_shadow
(Default: false)
Allow racoon to read shadow
Module:
rgmanager
Layer:
contrib
rgmanager_can_network_connect
(Default: false)
Allow rgmanager domain to connect to the network using TCP.
Module:
rpc
Layer:
contrib
rpcd_use_fusefs
(Default: false)
Allow rpcd_t to manage fuse files
Module:
rsync
Layer:
contrib
rsync_anon_write
(Default: false)
Allow rsync to modify public files
used for public file transfer services. Files/Directories must be
labeled public_content_rw_t.
Module:
rsync
Layer:
contrib
rsync_client
(Default: false)
Allow rsync to run as a client
Module:
rsync
Layer:
contrib
rsync_export_all_ro
(Default: false)
Allow rsync to export any files/directories read only.
Module:
rsync
Layer:
contrib
rsync_full_access
(Default: false)
Allow rsync server to manage all files/directories on the system.
Module:
samba
Layer:
contrib
samba_create_home_dirs
(Default: false)
Allow samba to create new home directories (e.g. via PAM)
Module:
samba
Layer:
contrib
samba_domain_controller
(Default: false)
Allow samba to act as the domain controller, add users,
groups and change passwords.
Module:
samba
Layer:
contrib
samba_enable_home_dirs
(Default: false)
Allow samba to share users home directories.
Module:
samba
Layer:
contrib
samba_export_all_ro
(Default: false)
Allow samba to share any file/directory read only.
Module:
samba
Layer:
contrib
samba_export_all_rw
(Default: false)
Allow samba to share any file/directory read/write.
Module:
samba
Layer:
contrib
samba_load_libgfapi
(Default: false)
Allow smbd to load libgfapi from gluster.
Module:
samba
Layer:
contrib
samba_portmapper
(Default: false)
Allow samba to act as a portmapper
Module:
samba
Layer:
contrib
samba_run_unconfined
(Default: false)
Allow samba to run unconfined scripts
Module:
samba
Layer:
contrib
samba_share_fusefs
(Default: false)
Allow samba to export ntfs/fusefs volumes.
Module:
samba
Layer:
contrib
samba_share_nfs
(Default: false)
Allow samba to export NFS volumes.
Module:
sanlock
Layer:
contrib
sanlock_use_fusefs
(Default: false)
Allow sanlock to read/write fuse files
Module:
sanlock
Layer:
contrib
sanlock_use_nfs
(Default: false)
Allow sanlock to manage nfs files
Module:
sanlock
Layer:
contrib
sanlock_use_samba
(Default: false)
Allow sanlock to manage cifs files
Module:
sasl
Layer:
contrib
saslauthd_read_shadow
(Default: false)
Allow sasl to read shadow
Module:
xserver
Layer:
services
selinuxuser_direct_dri_enabled
(Default: false)
Allow regular users direct dri device access
Global
selinuxuser_execheap
(Default: false)
Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Global
selinuxuser_execmod
(Default: false)
Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t
Global
selinuxuser_execstack
(Default: false)
Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla
Module:
userdomain
Layer:
system
selinuxuser_mysql_connect_enabled
(Default: false)
Allow users to connect to the local mysql server
Module:
netutils
Layer:
admin
selinuxuser_ping
(Default: false)
Allow confined users the ability to execute the ping and traceroute commands.
Module:
userdomain
Layer:
system
selinuxuser_postgresql_connect_enabled
(Default: false)
Allow users to connect to PostgreSQL
Module:
userdomain
Layer:
system
selinuxuser_rw_noexattrfile
(Default: false)
Allow user to r/w files on filesystems
that do not have extended attributes (FAT, CDROM, FLOPPY)
Global
selinuxuser_tcp_server
(Default: false)
Allow users to run TCP servers (bind to ports and accept connection from
the same domain and outside users) disabling this forces FTP passive mode
and may change other protocols.
Global
selinuxuser_udp_server
(Default: false)
Allow users to run UDP servers (bind to ports and accept connection from
the same domain and outside users) disabling this may break avahi
discovering services on the network and other udp related services.
Module:
userdomain
Layer:
system
selinuxuser_use_ssh_chroot
(Default: false)
Allow user to use ssh chroot environment.
Module:
sge
Layer:
contrib
sge_domain_can_network_connect
(Default: false)
Allow sge to connect to the network using any TCP port
Module:
sge
Layer:
contrib
sge_use_nfs
(Default: false)
Allow sge to access nfs file systems.
Module:
smartmon
Layer:
contrib
smartmon_3ware
(Default: false)
Determine whether smartmon can support
devices on 3ware controllers.
Module:
samba
Layer:
contrib
smbd_anon_write
(Default: false)
Allow samba to modify public files used for public file
transfer services. Files/Directories must be labeled
public_content_rw_t.
Module:
spamassassin
Layer:
contrib
spamassassin_can_network
(Default: false)
Allow user spamassassin clients to use the network.
Module:
spamassassin
Layer:
contrib
spamd_enable_home_dirs
(Default: true)
Allow spamd to read/write user home directories.
Module:
spamassassin
Layer:
contrib
spamd_update_can_network
(Default: false)
Allow spamd_update to connect to all ports.
Module:
squid
Layer:
contrib
squid_connect_any
(Default: false)
Determine whether squid can
connect to all TCP ports.
Module:
squid
Layer:
contrib
squid_use_tproxy
(Default: false)
Determine whether squid can run
as a transparent proxy.
Module:
ssh
Layer:
services
ssh_chroot_rw_homedirs
(Default: false)
Allow ssh with chroot env to read and write files
in the user home directories
Module:
ssh
Layer:
services
ssh_keysign
(Default: false)
allow host key based authentication
Module:
ssh
Layer:
services
ssh_sysadm_login
(Default: false)
Allow ssh logins as sysadm_r:sysadm_t
Module:
sslh
Layer:
contrib
sslh_can_bind_any_port
(Default: false)
Determine whether sslh can listen
on any tcp port or if it is restricted
to the standard http.
Module:
sslh
Layer:
contrib
sslh_can_connect_any_port
(Default: false)
Determine whether sslh can connect
to any tcp port or if it is restricted
to the standard http, openvpn and jabber ports.
Module:
staff
Layer:
roles
staff_use_svirt
(Default: false)
allow staff user to create and transition to svirt domains.
Module:
swift
Layer:
contrib
swift_can_network
(Default: false)
Determine whether swift can
connect to all TCP ports
Module:
telepathy
Layer:
contrib
telepathy_connect_all_ports
(Default: false)
Allow the Telepathy connection managers
to connect to any network port.
Module:
telepathy
Layer:
contrib
telepathy_tcp_connect_generic_network_ports
(Default: false)
Allow the Telepathy connection managers
to connect to any generic TCP port.
Module:
tftp
Layer:
contrib
tftp_anon_write
(Default: false)
Allow tftp to modify public files
used for public file transfer services.
Module:
tftp
Layer:
contrib
tftp_home_dir
(Default: false)
Allow tftp to read and write files in the user home directories
Module:
tmpreaper
Layer:
contrib
tmpreaper_use_cifs
(Default: false)
Determine whether tmpreaper can use
cifs file systems.
Module:
tmpreaper
Layer:
contrib
tmpreaper_use_nfs
(Default: false)
Determine whether tmpreaper can use
nfs file systems.
Module:
tmpreaper
Layer:
contrib
tmpreaper_use_samba
(Default: false)
Determine whether tmpreaper can use samba_share files
Module:
tor
Layer:
contrib
tor_bind_all_unreserved_ports
(Default: false)
Determine whether tor can bind
tcp sockets to all unreserved ports.
Module:
tor
Layer:
contrib
tor_can_network_relay
(Default: false)
Allow tor to act as a relay
Module:
unconfineduser
Layer:
roles
unconfined_chrome_sandbox_transition
(Default: false)
allow unconfined users to transition to the chrome sandbox domains when running chrome-sandbox
Module:
unconfineduser
Layer:
roles
unconfined_login
(Default: true)
Allow a user to login as an unconfined domain
Module:
unconfineduser
Layer:
roles
unconfined_mozilla_plugin_transition
(Default: false)
Allow unconfined users to transition to the Mozilla plugin domain when running xulrunner plugin-container.
Module:
unprivuser
Layer:
roles
unprivuser_use_svirt
(Default: false)
Allow unprivileged user to create and transition to svirt domains.
Global
use_ecryptfs_home_dirs
(Default: false)
Support ecryptfs home directories
Global
use_fusefs_home_dirs
(Default: false)
Support fusefs home directories
Module:
lpd
Layer:
contrib
use_lpd_server
(Default: false)
Determine whether to support lpd server.
Global
use_nfs_home_dirs
(Default: false)
Support NFS home directories
Global
use_samba_home_dirs
(Default: false)
Support SAMBA home directories
Module:
varnishd
Layer:
contrib
varnishd_connect_any
(Default: false)
Determine whether varnishd can
use the full TCP network.
Module:
vbetool
Layer:
contrib
vbetool_mmap_zero_ignore
(Default: false)
Determine whether attempts by
vbetool to mmap low regions should
be silently blocked.
Module:
virt
Layer:
contrib
virt_read_qemu_ga_data
(Default: false)
Allow qemu-ga to read qemu-ga date.
Module:
virt
Layer:
contrib
virt_rw_qemu_ga_data
(Default: false)
Allow qemu-ga to manage qemu-ga date.
Module:
virt
Layer:
contrib
virt_sandbox_use_all_caps
(Default: true)
Allow sandbox containers to use all capabilities
Module:
virt
Layer:
contrib
virt_sandbox_use_audit
(Default: true)
Allow sandbox containers to send audit messages
Module:
virt
Layer:
contrib
virt_sandbox_use_fusefs
(Default: false)
Allow sandbox containers manage fuse files
Module:
virt
Layer:
contrib
virt_sandbox_use_mknod
(Default: false)
Allow sandbox containers to use mknod system calls
Module:
virt
Layer:
contrib
virt_sandbox_use_netlink
(Default: false)
Allow sandbox containers to use netlink system calls
Module:
virt
Layer:
contrib
virt_sandbox_use_sys_admin
(Default: false)
Allow sandbox containers to use sys_admin system calls, for example mount
Module:
virt
Layer:
contrib
virt_transition_userdomain
(Default: false)
Allow virtual processes to run as userdomains
Module:
virt
Layer:
contrib
virt_use_comm
(Default: false)
Allow confined virtual guests to use serial/parallel communication ports
Module:
virt
Layer:
contrib
virt_use_execmem
(Default: false)
Allow confined virtual guests to use executable memory and executable stack
Module:
virt
Layer:
contrib
virt_use_fusefs
(Default: false)
Allow confined virtual guests to read fuse files
Module:
virt
Layer:
contrib
virt_use_nfs
(Default: false)
Allow confined virtual guests to manage nfs files
Module:
virt
Layer:
contrib
virt_use_pcscd
(Default: false)
Allow confined virtual guests to use smartcards
Module:
virt
Layer:
contrib
virt_use_rawip
(Default: false)
Allow confined virtual guests to interact with rawip sockets
Module:
virt
Layer:
contrib
virt_use_samba
(Default: false)
Allow confined virtual guests to manage cifs files
Module:
virt
Layer:
contrib
virt_use_sanlock
(Default: false)
Allow confined virtual guests to interact with the sanlock
Module:
virt
Layer:
contrib
virt_use_usb
(Default: true)
Allow confined virtual guests to use usb devices
Module:
virt
Layer:
contrib
virt_use_xserver
(Default: false)
Allow confined virtual guests to interact with the xserver
Module:
webadm
Layer:
contrib
webadm_manage_user_files
(Default: false)
Determine whether webadm can
manage generic user files.
Module:
webadm
Layer:
contrib
webadm_read_user_files
(Default: false)
Determine whether webadm can
read generic user files.
Module:
wine
Layer:
contrib
wine_mmap_zero_ignore
(Default: false)
Determine whether attempts by
wine to mmap low regions should
be silently blocked.
Module:
xserver
Layer:
services
xdm_bind_vnc_tcp_port
(Default: false)
Allows xdm_t to bind on vnc_port_t(5910)
Module:
xserver
Layer:
services
xdm_exec_bootloader
(Default: false)
Allow the graphical login program to execute bootloader
Module:
xserver
Layer:
services
xdm_sysadm_login
(Default: false)
Allow the graphical login program to login directly as sysadm_r:sysadm_t
Module:
xserver
Layer:
services
xdm_write_home
(Default: false)
Allow the graphical login program to create files in HOME dirs as xdm_home_t.
Module:
xen
Layer:
contrib
xen_use_nfs
(Default: false)
Allow xen to manage nfs files
Module:
xen
Layer:
contrib
xend_run_blktap
(Default: true)
Allow xend to run blktapctrl/tapdisk.
Not required if using dedicated logical volumes for disk images.
Module:
xen
Layer:
contrib
xend_run_qemu
(Default: true)
Allow xend to run qemu-dm.
Not required if using paravirt and no vfb.
Module:
xguest
Layer:
contrib
xguest_connect_network
(Default: true)
Allow xguest users to configure Network Manager and connect to apache ports
Module:
xguest
Layer:
contrib
xguest_mount_media
(Default: true)
Allow xguest users to mount removable media
Module:
xguest
Layer:
contrib
xguest_use_bluetooth
(Default: true)
Allow xguest to use blue tooth devices
Module:
xserver
Layer:
services
xserver_clients_write_xshm
(Default: false)
Allows clients to write to the X server shared
memory segments.
Module:
xserver
Layer:
services
xserver_execmem
(Default: false)
Allows XServer to execute writable memory
Module:
xserver
Layer:
services
xserver_object_manager
(Default: false)
Support X userspace object manager
Module:
zabbix
Layer:
contrib
zabbix_can_network
(Default: false)
Determine whether zabbix can
connect to all TCP ports
Module:
zarafa
Layer:
contrib
zarafa_setrlimit
(Default: false)
Allow zarafa domains to setrlimit/sys_resource.
Module:
zebra
Layer:
contrib
zebra_write_config
(Default: false)
Allow zebra daemon to write it configuration files
Module:
zoneminder
Layer:
contrib
zoneminder_anon_write
(Default: false)
Allow ZoneMinder to modify public files
used for public file transfer services.
Module:
zoneminder
Layer:
contrib
zoneminder_run_sudo
(Default: false)
Allow ZoneMinder to run su/sudo.