404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@3.128.226.114: ~ $
3

>�\�&�@s�dZdZdZdZdZdZdZdZdZd	Z	d
Z
dZdZdZ
dZd
ZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZdZ dZ!d Z"d!Z#d"Z$d#Z%d$Z&d%Z'd&Z(d'S)(z�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
init_daemon_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)

permissive TEMPLATETYPE_t;
zO
type TEMPLATETYPE_initrc_exec_t;
init_script_file(TEMPLATETYPE_initrc_exec_t)
a#policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
domain_type(TEMPLATETYPE_t)
domain_entry_file(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role system_r types TEMPLATETYPE_t;

permissive TEMPLATETYPE_t;
z�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
inetd_service_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)

permissive TEMPLATETYPE_t;
aapolicy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

attribute_role TEMPLATETYPE_roles;
roleattribute system_r TEMPLATETYPE_roles;

type TEMPLATETYPE_t;
type TEMPLATETYPE_exec_t;
application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
role TEMPLATETYPE_roles types TEMPLATETYPE_t;

permissive TEMPLATETYPE_t;
z�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

sandbox_x_domain_template(TEMPLATETYPE)

permissive TEMPLATETYPE_t;
permissive TEMPLATETYPE_client_t;

z�policy_module(TEMPLATETYPE, 1.0.0)

########################################
#
# Declarations
#

apache_content_template(TEMPLATETYPE)

permissive httpd_TEMPLATETYPE_script_t;
z�allow TEMPLATETYPE_t self:fifo_file rw_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
�
zO
optional_policy(`
	dbus_system_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t)
')
z�
allow TEMPLATETYPE_t self:fifo_file manage_fifo_file_perms;
allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms;
z#
auth_use_nsswitch(TEMPLATETYPE_t)
z)
logging_send_syslog_msg(TEMPLATETYPE_t)
z)
sysnet_dns_name_resolve(TEMPLATETYPE_t)
z*
auth_domtrans_chk_passwd(TEMPLATETYPE_t)
z
mta_send_mail(TEMPLATETYPE_t)
zg
optional_policy(`
	dbus_system_bus_client(TEMPLATETYPE_t)
	dbus_connect_system_bus(TEMPLATETYPE_t)
')
z4
optional_policy(`
	kerberos_use(TEMPLATETYPE_t)
')
z{
optional_policy(`
	kerberos_keytab_template(TEMPLATETYPE, TEMPLATETYPE_t)
	kerberos_manage_host_rcache(TEMPLATETYPE_t)
')
z)
logging_send_audit_msgs(TEMPLATETYPE_t)
zj
optional_policy(`
	gen_require(`
		type USER_t;
		role USER_r;
	')

	TEMPLATETYPE_run(USER_t, USER_r)
')
z,
domain_use_interactive_fds(TEMPLATETYPE_t)
z&
files_read_etc_files(TEMPLATETYPE_t)
z-
miscfiles_read_localization(TEMPLATETYPE_t)
z.
## <summary>policy for TEMPLATETYPE</summary>a�

########################################
## <summary>
##	Execute TEMPLATETYPE_exec_t in the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
## <summary>
##	Domain allowed to transition.
## </summary>
## </param>
#
interface(`TEMPLATETYPE_domtrans',`
	gen_require(`
		type TEMPLATETYPE_t, TEMPLATETYPE_exec_t;
	')

	corecmd_search_bin($1)
	domtrans_pattern($1, TEMPLATETYPE_exec_t, TEMPLATETYPE_t)
')

######################################
## <summary>
##	Execute TEMPLATETYPE in the caller domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_exec',`
	gen_require(`
		type TEMPLATETYPE_exec_t;
	')

	corecmd_search_bin($1)
	can_exec($1, TEMPLATETYPE_exec_t)
')
ak
########################################
## <summary>
##	Execute TEMPLATETYPE in the TEMPLATETYPE domain, and
##	allow the specified role the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	The role to be allowed the TEMPLATETYPE domain.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_run',`
	gen_require(`
		type TEMPLATETYPE_t;
		attribute_role TEMPLATETYPE_roles;
	')

	TEMPLATETYPE_domtrans($1)
	roleattribute $2 TEMPLATETYPE_roles;
')

########################################
## <summary>
##	Role access for TEMPLATETYPE
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access
##	</summary>
## </param>
## <param name="domain">
##	<summary>
##	User domain for the role
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_role',`
	gen_require(`
		type TEMPLATETYPE_t;
		attribute_role TEMPLATETYPE_roles;
	')

	roleattribute $1 TEMPLATETYPE_roles;

	TEMPLATETYPE_domtrans($2)

	ps_process_pattern($2, TEMPLATETYPE_t)
	allow $2 TEMPLATETYPE_t:process { signull signal sigkill };
')
a�
########################################
## <summary>
##	Execute sandbox in the TEMPLATETYPE_t domain, and
##	allow the specified role the TEMPLATETYPE_t domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed to transition.
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	The role to be allowed the TEMPLATETYPE_t domain.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_transition',`
	gen_require(`
		type TEMPLATETYPE_t;
		type TEMPLATETYPE_client_t;
	')

	allow $1 TEMPLATETYPE_t:process { signal_perms transition };
	dontaudit $1 TEMPLATETYPE_t:process { noatsecure siginh rlimitinh };
	role $2 types TEMPLATETYPE_t;
	role $2 types TEMPLATETYPE_client_t;

	allow TEMPLATETYPE_t $1:process { sigchld signull };
	allow TEMPLATETYPE_t $1:fifo_file rw_inherited_fifo_file_perms;
	allow TEMPLATETYPE_client_t $1:process { sigchld signull };
	allow TEMPLATETYPE_client_t $1:fifo_file rw_inherited_fifo_file_perms;
')
a>
########################################
## <summary>
##	Change to the TEMPLATETYPE role.
## </summary>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_role_change',`
	gen_require(`
		role TEMPLATETYPE_r;
	')

	allow $1 TEMPLATETYPE_r;
')
a
########################################
## <summary>
##	Execute TEMPLATETYPE server in the TEMPLATETYPE domain.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_initrc_domtrans',`
	gen_require(`
		type TEMPLATETYPE_initrc_exec_t;
	')

	init_labeled_script_domtrans($1, TEMPLATETYPE_initrc_exec_t)
')
a�
########################################
## <summary>
##	Send and receive messages from
##	TEMPLATETYPE over dbus.
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
#
interface(`TEMPLATETYPE_dbus_chat',`
	gen_require(`
		type TEMPLATETYPE_t;
		class dbus send_msg;
	')

	allow $1 TEMPLATETYPE_t:dbus send_msg;
	allow TEMPLATETYPE_t $1:dbus send_msg;
')
a�
########################################
## <summary>
##	All of the rules required to administrate
##	an TEMPLATETYPE environment
## </summary>
## <param name="domain">
##	<summary>
##	Domain allowed access.
##	</summary>
## </param>
## <param name="role">
##	<summary>
##	Role allowed access.
##	</summary>
## </param>
## <rolecap/>
#
interface(`TEMPLATETYPE_admin',`
	gen_require(`
		type TEMPLATETYPE_t;z�
	')

	allow $1 TEMPLATETYPE_t:process { signal_perms };
	ps_process_pattern($1, TEMPLATETYPE_t)

    tunable_policy(`deny_ptrace',`',`
        allow $1 TEMPLATETYPE_t:process ptrace;
    ')
z#
		type TEMPLATETYPE_initrc_exec_t;z�
	TEMPLATETYPE_initrc_domtrans($1)
	domain_system_change_exemption($1)
	role_transition $2 TEMPLATETYPE_initrc_exec_t system_r;
	allow $2 system_r;
zb	optional_policy(`
		systemd_passwd_agent_exec($1)
		systemd_read_fifo_file_passwd_run($1)
	')
')
zEEXECUTABLE		--	gen_context(system_u:object_r:TEMPLATETYPE_exec_t,s0)
z #  No file context, leave blank
zKEXECUTABLE	--	gen_context(system_u:object_r:TEMPLATETYPE_initrc_exec_t,s0)
N))Zte_daemon_typesZte_initscript_typesZte_dbusd_typesZte_inetd_typesZte_userapp_typesZte_sandbox_typesZte_cgi_typesZte_daemon_rulesZte_inetd_rulesZte_dbusd_rulesZte_userapp_rulesZte_cgi_rulesZte_sandbox_rulesZte_uid_rulesZte_syslog_rulesZte_resolve_rulesZte_pam_rulesZ
te_mail_rulesZ
te_dbus_rulesZte_kerberos_rulesZte_manage_krb5_rcache_rulesZte_audit_rulesZte_run_rulesZte_fd_rulesZte_etc_rulesZte_localization_rulesZif_heading_rulesZif_program_rulesZif_user_program_rulesZif_sandbox_rulesZif_role_change_rulesZif_initscript_rulesZ
if_dbus_rulesZif_begin_adminZif_middle_adminZif_initscript_admin_typesZif_initscript_adminZif_end_adminZ
fc_programZfc_userZ
fc_initscript�rr� /usr/lib/python3.6/executable.py�<module>$sP
)9#

Filemanager

Name Type Size Permission Actions
__init__.cpython-36.opt-1.pyc File 113 B 0644
__init__.cpython-36.pyc File 113 B 0644
boolean.cpython-36.opt-1.pyc File 273 B 0644
boolean.cpython-36.pyc File 273 B 0644
etc_rw.cpython-36.opt-1.pyc File 2.66 KB 0644
etc_rw.cpython-36.pyc File 2.66 KB 0644
executable.cpython-36.opt-1.pyc File 8.66 KB 0644
executable.cpython-36.pyc File 8.66 KB 0644
network.cpython-36.opt-1.pyc File 12.39 KB 0644
network.cpython-36.pyc File 12.39 KB 0644
rw.cpython-36.opt-1.pyc File 2.81 KB 0644
rw.cpython-36.pyc File 2.81 KB 0644
script.cpython-36.opt-1.pyc File 3.27 KB 0644
script.cpython-36.pyc File 3.27 KB 0644
semodule.cpython-36.opt-1.pyc File 405 B 0644
semodule.cpython-36.pyc File 405 B 0644
spec.cpython-36.opt-1.pyc File 2.18 KB 0644
spec.cpython-36.pyc File 2.18 KB 0644
test_module.cpython-36.opt-1.pyc File 2.43 KB 0644
test_module.cpython-36.pyc File 2.43 KB 0644
tmp.cpython-36.opt-1.pyc File 2.5 KB 0644
tmp.cpython-36.pyc File 2.5 KB 0644
unit_file.cpython-36.opt-1.pyc File 1.11 KB 0644
unit_file.cpython-36.pyc File 1.11 KB 0644
user.cpython-36.opt-1.pyc File 3.32 KB 0644
user.cpython-36.pyc File 3.32 KB 0644
var_cache.cpython-36.opt-1.pyc File 2.96 KB 0644
var_cache.cpython-36.pyc File 2.96 KB 0644
var_lib.cpython-36.opt-1.pyc File 3.09 KB 0644
var_lib.cpython-36.pyc File 3.09 KB 0644
var_log.cpython-36.opt-1.pyc File 2.07 KB 0644
var_log.cpython-36.pyc File 2.07 KB 0644
var_run.cpython-36.opt-1.pyc File 1.98 KB 0644
var_run.cpython-36.pyc File 1.98 KB 0644
var_spool.cpython-36.opt-1.pyc File 2.94 KB 0644
var_spool.cpython-36.pyc File 2.94 KB 0644