|
|
|
@ -45,7 +45,6 @@ allow fail2ban_t self:netlink_netfilter_socket create_socket_perms;
|
|
|
|
|
|
|
|
|
|
read_files_pattern(fail2ban_t, fail2ban_t, fail2ban_t)
|
|
|
|
|
|
|
|
|
|
#allow fail2ban_t fail2ban_log_t:file watch;
|
|
|
|
|
append_files_pattern(fail2ban_t, fail2ban_log_t, fail2ban_log_t)
|
|
|
|
|
create_files_pattern(fail2ban_t, fail2ban_log_t, fail2ban_log_t)
|
|
|
|
|
setattr_files_pattern(fail2ban_t, fail2ban_log_t, fail2ban_log_t)
|
|
|
|
@ -100,10 +99,18 @@ logging_read_syslog_pid(fail2ban_t)
|
|
|
|
|
logging_dontaudit_search_audit_logs(fail2ban_t)
|
|
|
|
|
logging_mmap_generic_logs(fail2ban_t)
|
|
|
|
|
logging_mmap_journal(fail2ban_t)
|
|
|
|
|
allow fail2ban_t fail2ban_log_t:file watch;
|
|
|
|
|
# Not in EL9 yet
|
|
|
|
|
#logging_watch_audit_log_files(fail2ban_t)
|
|
|
|
|
gen_require(`
|
|
|
|
|
type var_log_t, auditd_log_t;
|
|
|
|
|
')
|
|
|
|
|
watch_files_pattern(fail2ban_t, auditd_log_t, auditd_log_t)
|
|
|
|
|
#logging_watch_audit_log_dirs(fail2ban_t)
|
|
|
|
|
#logging_watch_generic_log_dirs(fail2ban_t)
|
|
|
|
|
#logging_watch_journal_dir(fail2ban_t)
|
|
|
|
|
allow fail2ban_t var_log_t:dir search_dir_perms;
|
|
|
|
|
watch_dirs_pattern(fail2ban_t, auditd_log_t, auditd_log_t)
|
|
|
|
|
logging_watch_generic_log_dirs(fail2ban_t)
|
|
|
|
|
logging_watch_journal_dir(fail2ban_t)
|
|
|
|
|
|
|
|
|
|
mta_send_mail(fail2ban_t)
|
|
|
|
|
|
|
|
|
|