Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
system /
[ HOME SHELL ]
Name
Size
Permission
Action
application.if
4.2
KB
-rw-r--r--
authlogin.if
33.85
KB
-rw-r--r--
clock.if
1.9
KB
-rw-r--r--
daemontools.if
4.21
KB
-rw-r--r--
fstools.if
2.95
KB
-rw-r--r--
getty.if
1.72
KB
-rw-r--r--
hostname.if
1.24
KB
-rw-r--r--
hotplug.if
3.29
KB
-rw-r--r--
init.if
41.11
KB
-rw-r--r--
ipsec.if
8
KB
-rw-r--r--
iptables.if
3.27
KB
-rw-r--r--
iscsi.if
1.51
KB
-rw-r--r--
kdump.if
2.18
KB
-rw-r--r--
libraries.if
10.88
KB
-rw-r--r--
locallogin.if
2.85
KB
-rw-r--r--
logging.if
23.83
KB
-rw-r--r--
lvm.if
3.91
KB
-rw-r--r--
miscfiles.if
15.45
KB
-rw-r--r--
modutils.if
6.94
KB
-rw-r--r--
mount.if
7.07
KB
-rw-r--r--
netlabel.if
1013
B
-rw-r--r--
pcmcia.if
3.01
KB
-rw-r--r--
raid.if
1.38
KB
-rw-r--r--
selinuxutil.if
35.72
KB
-rw-r--r--
setrans.if
977
B
-rw-r--r--
sosreport.if
2.41
KB
-rw-r--r--
sysnetwork.if
16.6
KB
-rw-r--r--
udev.if
5.99
KB
-rw-r--r--
unconfined.if
4.33
KB
-rw-r--r--
userdomain.if
103.05
KB
-rw-r--r--
xen.if
4.76
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : miscfiles.if
## <summary>Miscelaneous files.</summary> ####################################### ## <summary> ## Make the specified type usable as a cert file. ## </summary> ## <desc> ## <p> ## Make the specified type usable for cert files. ## This will also make the type usable for files, making ## calls to files_type() redundant. Failure to use this interface ## for a temporary file may result in problems with ## cert management tools. ## </p> ## <p> ## Related interfaces: ## </p> ## <ul> ## <li>files_type()</li> ## </ul> ## <p> ## Example: ## </p> ## <p> ## type mycertfile_t; ## cert_type(mycertfile_t) ## allow mydomain_t mycertfile_t:file read_file_perms; ## files_search_etc(mydomain_t) ## </p> ## </desc> ## <param name="type"> ## <summary> ## Type to be used for files. ## </summary> ## </param> ## <infoflow type="none"/> # interface(`miscfiles_cert_type',` gen_require(` attribute cert_type; ') typeattribute $1 cert_type; files_type($1) ') ######################################## ## <summary> ## Read system SSL certificates. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_read_certs',` gen_require(` attribute cert_type; ') allow $1 cert_type:dir list_dir_perms; read_files_pattern($1, cert_type, cert_type) read_lnk_files_pattern($1, cert_type, cert_type) ') ######################################## ## <summary> ## Dontaudit read/writei certificates. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_dontaudit_rw_certs',` gen_require(` attribute cert_type; ') dontaudit $1 cert_type:file rw_inherited_file_perms; ') ######################################## ## <summary> ## manange system SSL certificates. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_cert_dirs',` gen_require(` type cert_t; ') manage_dirs_pattern($1, cert_t, cert_t) ') ######################################## ## <summary> ## manange system SSL certificates. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_cert_files',` gen_require(` type cert_t; ') manage_files_pattern($1, cert_t, cert_t) read_lnk_files_pattern($1, cert_t, cert_t) ') ######################################## ## <summary> ## Read fonts. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_read_fonts',` gen_require(` type fonts_t, fonts_cache_t; ') # cjp: fonts can be in either of these dirs files_search_usr($1) libs_search_lib($1) allow $1 fonts_t:dir list_dir_perms; read_files_pattern($1, fonts_t, fonts_t) read_lnk_files_pattern($1, fonts_t, fonts_t) allow $1 fonts_cache_t:dir list_dir_perms; read_files_pattern($1, fonts_cache_t, fonts_cache_t) read_lnk_files_pattern($1, fonts_cache_t, fonts_cache_t) ') ######################################## ## <summary> ## Set the attributes on a fonts directory. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_setattr_fonts_dirs',` gen_require(` type fonts_t; ') allow $1 fonts_t:dir setattr; ') ######################################## ## <summary> ## Do not audit attempts to set the attributes ## on a fonts directory. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_dontaudit_setattr_fonts_dirs',` gen_require(` type fonts_t; ') dontaudit $1 fonts_t:dir setattr; ') ######################################## ## <summary> ## Do not audit attempts to write fonts. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_dontaudit_write_fonts',` gen_require(` type fonts_t; ') dontaudit $1 fonts_t:dir { write setattr }; dontaudit $1 fonts_t:file write; ') ######################################## ## <summary> ## Create, read, write, and delete fonts. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_fonts',` gen_require(` type fonts_t; ') # cjp: fonts can be in either of these dirs files_search_usr($1) libs_search_lib($1) manage_dirs_pattern($1, fonts_t, fonts_t) manage_files_pattern($1, fonts_t, fonts_t) manage_lnk_files_pattern($1, fonts_t, fonts_t) ') ######################################## ## <summary> ## Set the attributes on a fonts cache directory. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_setattr_fonts_cache_dirs',` gen_require(` type fonts_cache_t; ') allow $1 fonts_cache_t:dir setattr; ') ######################################## ## <summary> ## Do not audit attempts to set the attributes ## on a fonts cache directory. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_dontaudit_setattr_fonts_cache_dirs',` gen_require(` type fonts_cache_t; ') dontaudit $1 fonts_cache_t:dir setattr; ') ######################################## ## <summary> ## Create, read, write, and delete fonts cache. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_fonts_cache',` gen_require(` type fonts_cache_t; ') files_search_var($1) manage_dirs_pattern($1, fonts_cache_t, fonts_cache_t) manage_files_pattern($1, fonts_cache_t, fonts_cache_t) manage_lnk_files_pattern($1, fonts_cache_t, fonts_cache_t) ') ######################################## ## <summary> ## Read hardware identification data. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_read_hwdata',` gen_require(` type hwdata_t; ') allow $1 hwdata_t:dir list_dir_perms; read_files_pattern($1, hwdata_t, hwdata_t) read_lnk_files_pattern($1, hwdata_t, hwdata_t) ') ######################################## ## <summary> ## Allow process to setattr localization info ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_setattr_localization',` gen_require(` type locale_t; ') files_search_usr($1) allow $1 locale_t:dir list_dir_perms; allow $1 locale_t:file setattr; ') ######################################## ## <summary> ## Allow process to read localization information. ## </summary> ## <desc> ## <p> ## Allow the specified domain to read the localization files. ## This is typically for time zone configuration files, such as ## /etc/localtime and files in /usr/share/zoneinfo. ## Typically, any domain which needs to know the GMT/UTC ## offset of the current timezone will need access ## to these files. Generally, it should be safe for any ## domain to read these files. ## </p> ## </desc> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <infoflow type="read" weight="10"/> # interface(`miscfiles_read_localization',` gen_require(` type locale_t; ') files_read_etc_symlinks($1) files_search_usr($1) allow $1 locale_t:dir list_dir_perms; read_files_pattern($1, locale_t, locale_t) read_lnk_files_pattern($1, locale_t, locale_t) ') ######################################## ## <summary> ## Allow process to write localization info ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_rw_localization',` gen_require(` type locale_t; ') files_search_usr($1) allow $1 locale_t:dir list_dir_perms; rw_files_pattern($1, locale_t, locale_t) ') ######################################## ## <summary> ## Allow process to relabel localization info ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_relabel_localization',` gen_require(` type locale_t; ') files_search_usr($1) relabel_files_pattern($1, locale_t, locale_t) ') ######################################## ## <summary> ## Allow process to read legacy time localization info ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_legacy_read_localization',` gen_require(` type locale_t; ') miscfiles_read_localization($1) allow $1 locale_t:file execute; ') ######################################## ## <summary> ## Search man pages. ## </summary> ## <param name="domain"> ## <summary> ## Domain to not audit. ## </summary> ## </param> # interface(`miscfiles_search_man_pages',` gen_require(` type man_t; ') allow $1 man_t:dir search_dir_perms; files_search_usr($1) ') ######################################## ## <summary> ## Do not audit attempts to search man pages. ## </summary> ## <param name="domain"> ## <summary> ## Domain to not audit. ## </summary> ## </param> # interface(`miscfiles_dontaudit_search_man_pages',` gen_require(` type man_t; ') dontaudit $1 man_t:dir search_dir_perms; ') ######################################## ## <summary> ## Read man pages ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_read_man_pages',` gen_require(` type man_t; ') files_search_usr($1) allow $1 man_t:dir list_dir_perms; read_files_pattern($1, man_t, man_t) read_lnk_files_pattern($1, man_t, man_t) ') ######################################## ## <summary> ## Delete man pages ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # cjp: added for tmpreaper # interface(`miscfiles_delete_man_pages',` gen_require(` type man_t; ') files_search_usr($1) allow $1 man_t:dir setattr; # RH bug #309351 allow $1 man_t:dir list_dir_perms; delete_dirs_pattern($1, man_t, man_t) delete_files_pattern($1, man_t, man_t) delete_lnk_files_pattern($1, man_t, man_t) ') ######################################## ## <summary> ## Create, read, write, and delete man pages ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_manage_man_pages',` gen_require(` type man_t; ') files_search_usr($1) manage_dirs_pattern($1, man_t, man_t) manage_files_pattern($1, man_t, man_t) read_lnk_files_pattern($1, man_t, man_t) ') ######################################## ## <summary> ## Read public files used for file ## transfer services. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_read_public_files',` gen_require(` type public_content_t, public_content_rw_t; ') allow $1 { public_content_t public_content_rw_t }:dir list_dir_perms; read_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t }) read_lnk_files_pattern($1, { public_content_t public_content_rw_t }, { public_content_t public_content_rw_t }) ') ######################################## ## <summary> ## Create, read, write, and delete public files ## and directories used for file transfer services. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_public_files',` gen_require(` type public_content_rw_t; ') manage_dirs_pattern($1, public_content_rw_t, public_content_rw_t) manage_files_pattern($1, public_content_rw_t, public_content_rw_t) manage_lnk_files_pattern($1, public_content_rw_t, public_content_rw_t) ') ######################################## ## <summary> ## Read TeX data ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_read_tetex_data',` gen_require(` type tetex_data_t; ') files_search_var($1) files_search_var_lib($1) # cjp: TeX data can be in either of the above dirs allow $1 tetex_data_t:dir list_dir_perms; read_files_pattern($1, tetex_data_t, tetex_data_t) read_lnk_files_pattern($1, tetex_data_t, tetex_data_t) ') ######################################## ## <summary> ## Execute TeX data programs in the caller domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_exec_tetex_data',` gen_require(` type fonts_t; type tetex_data_t; ') files_search_var($1) files_search_var_lib($1) # cjp: TeX data can be in either of the above dirs allow $1 tetex_data_t:dir list_dir_perms; exec_files_pattern($1, tetex_data_t, tetex_data_t) ') ######################################## ## <summary> ## Let test files be an entry point for ## a specified domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be entered. ## </summary> ## </param> # interface(`miscfiles_domain_entry_test_files',` gen_require(` type test_file_t; ') domain_entry_file($1, test_file_t) ') ######################################## ## <summary> ## Read test files and directories. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_read_test_files',` gen_require(` type test_file_t; ') read_files_pattern($1, test_file_t, test_file_t) read_lnk_files_pattern($1, test_file_t, test_file_t) ') ######################################## ## <summary> ## Execute test files. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_exec_test_files',` gen_require(` type test_file_t; ') exec_files_pattern($1, test_file_t, test_file_t) read_lnk_files_pattern($1, test_file_t, test_file_t) ') ######################################## ## <summary> ## Execute test files. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_etc_filetrans_localization',` gen_require(` type locale_t; ') files_etc_filetrans($1, locale_t, file) ') ######################################## ## <summary> ## Create, read, write, and delete localization ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`miscfiles_manage_localization',` gen_require(` type locale_t; ') manage_dirs_pattern($1, locale_t, locale_t) manage_files_pattern($1, locale_t, locale_t) manage_lnk_files_pattern($1, locale_t, locale_t) ') ######################################## ## <summary> ## Dontaudit attempts to write generic SSL certificates. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`miscfiles_dontaudit_write_generic_cert',` gen_require(` type cert_t; ') dontaudit $1 cert_t:file write; dontaudit $1 cert_t:dir write; ') ######################################## ## <summary> ## Do not audit attempts to access check cert dirs/files. ## </summary> ## <param name="domain"> ## <summary> ## Domain to not audit. ## </summary> ## </param> # interface(`miscfiles_dontaudit_access_check_cert',` gen_require(` type cert_t; ') dontaudit $1 cert_t:file audit_access; dontaudit $1 cert_t:dir audit_access; ')
Close