1 # IKE key management daemon 2 type racoon, domain; 3 type racoon_exec, exec_type, file_type; 4 5 typeattribute racoon mlstrustedsubject; 6 7 net_domain(racoon) 8 allowxperm racoon self:udp_socket ioctl { SIOCSIFFLAGS SIOCSIFADDR SIOCSIFNETMASK }; 9 10 binder_use(racoon) 11 12 allow racoon tun_device:chr_file r_file_perms; 13 allow racoon cgroup:dir { add_name create }; 14 allow racoon kernel:system module_request; 15 16 allow racoon self:key_socket create_socket_perms_no_ioctl; 17 allow racoon self:tun_socket create_socket_perms_no_ioctl; 18 allow racoon self:global_capability_class_set { net_admin net_bind_service net_raw }; 19 20 # XXX: should we give ip-up-vpn its own label (currently racoon domain) 21 allow racoon system_file:file rx_file_perms; 22 not_full_treble(`allow racoon vendor_file:file rx_file_perms;') 23 allow racoon vpn_data_file:file create_file_perms; 24 allow racoon vpn_data_file:dir w_dir_perms; 25 26 use_keystore(racoon) 27 28 # Racoon (VPN) has a restricted set of permissions from the default. 29 allow racoon keystore:keystore_key { 30 get 31 sign 32 verify 33 }; 34