Master tunable index:

Module: cvs

Layer: contrib

allow_cvs_read_shadow (Default: false)

Allow cvs daemon to read shadow

Global
allow_execheap (Default: false)

Allow unconfined executables to make their heap memory executable. Doing this is a really bad idea. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla

Global
allow_execmem (Default: false)

Allow unconfined executables to map a memory region as both executable and writable, this is dangerous and the executable should be reported in bugzilla")

Global
allow_execmod (Default: false)

Allow all unconfined executables to use libraries requiring text relocation that are not labeled textrel_shlib_t")

Global
allow_execstack (Default: false)

Allow unconfined executables to make their stack executable. This should never, ever be necessary. Probably indicates a badly coded executable, but could indicate an attack. This executable should be reported in bugzilla")

Module: ftp

Layer: contrib

allow_ftpd_anon_write (Default: false)

Allow ftp servers to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Module: ftp

Layer: contrib

allow_ftpd_full_access (Default: false)

Allow ftp servers to login to local users and read/write all files on the system, governed by DAC.

Module: ftp

Layer: contrib

allow_ftpd_use_cifs (Default: false)

Allow ftp servers to use cifs used for public file transfer services.

Module: ftp

Layer: contrib

allow_ftpd_use_nfs (Default: false)

Allow ftp servers to use nfs used for public file transfer services.

Module: rpc

Layer: contrib

allow_gssd_read_tmp (Default: true)

Allow gssd to read temp directory. For access to kerberos tgt.

Module: apache

Layer: contrib

allow_httpd_anon_write (Default: false)

Allow Apache to modify public files used for public file transfer services. Directories/Files must be labeled public_content_rw_t.

Module: apache

Layer: contrib

allow_httpd_mod_auth_pam (Default: false)

Allow Apache to use mod_auth_pam

Module: java

Layer: contrib

allow_java_execstack (Default: false)

Allow java executable stack

Module: kerberos

Layer: contrib

allow_kerberos (Default: false)

Allow confined applications to run with kerberos.

Module: mount

Layer: system

allow_mount_anyfile (Default: false)

Allow the mount command to mount any directory or file.

Module: mplayer

Layer: contrib

allow_mplayer_execstack (Default: false)

Allow mplayer executable stack

Module: rpc

Layer: contrib

allow_nfsd_anon_write (Default: false)

Allow nfs servers to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Global
allow_polyinstantiation (Default: false)

Enable polyinstantiated directory support.

Module: sysadm

Layer: roles

allow_ptrace (Default: false)

Allow sysadm to debug or ptrace all processes.

Module: rsync

Layer: contrib

allow_rsync_anon_write (Default: false)

Allow rsync to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Module: sasl

Layer: contrib

allow_saslauthd_read_shadow (Default: false)

Allow sasl to read shadow

Module: samba

Layer: contrib

allow_smbd_anon_write (Default: false)

Allow samba to modify public files used for public file transfer services. Files/Directories must be labeled public_content_rw_t.

Module: ssh

Layer: services

allow_ssh_keysign (Default: false)

allow host key based authentication

Module: userdomain

Layer: system

allow_user_mysql_connect (Default: false)

Allow users to connect to mysql

Module: userdomain

Layer: system

allow_user_postgresql_connect (Default: false)

Allow users to connect to PostgreSQL

Module: xserver

Layer: services

allow_write_xshm (Default: false)

Allows clients to write to the X server shared memory segments.

Global
allow_ypbind (Default: false)

Allow system to run with NIS

Module: zebra

Layer: contrib

allow_zebra_write_config (Default: false)

Allow zebra daemon to write it configuration files

Module: authlogin

Layer: system

authlogin_nsswitch_use_ldap (Default: false)

Allow users to resolve user passwd entries directly from ldap rather then using a sssd server

Module: cdrecord

Layer: contrib

cdrecord_read_content (Default: false)

Allow cdrecord to read various content. nfs, samba, removable devices, user temp and untrusted content files

Module: clamav

Layer: contrib

clamd_use_jit (Default: false)

Allow clamd to use JIT compiler

Module: cobbler

Layer: contrib

cobbler_anon_write (Default: false)

Allow Cobbler to modify public files used for public file transfer services.

Global
console_login (Default: true)

Allow logging in and using the system from /dev/console.

Module: cron

Layer: contrib

cron_can_relabel (Default: false)

Allow system cron jobs to relabel filesystem for restoring file contexts.

Module: dbadm

Layer: contrib

dbadm_manage_user_files (Default: false)

Allow dbadm to manage files in users home directories

Module: dbadm

Layer: contrib

dbadm_read_user_files (Default: false)

Allow dbadm to read files in users home directories

Module: dhcp

Layer: contrib

dhcpd_use_ldap (Default: false)

Allow DHCP daemon to use LDAP backends

Module: entropyd

Layer: contrib

entropyd_use_audio (Default: false)

Allow the use of the audio devices as the source for the entropy feeds

Module: exim

Layer: contrib

exim_can_connect_db (Default: false)

Allow exim to connect to databases (postgres, mysql)

Module: exim

Layer: contrib

exim_manage_user_files (Default: false)

Allow exim to create, read, write, and delete unprivileged user files.

Module: exim

Layer: contrib

exim_read_user_files (Default: false)

Allow exim to read unprivileged user files.

Module: cron

Layer: contrib

fcron_crond (Default: false)

Enable extra rules in the cron domain to support fcron.

Module: rhcs

Layer: contrib

fenced_can_network_connect (Default: false)

Allow fenced domain to connect to the network using TCP.

Module: ftp

Layer: contrib

ftp_home_dir (Default: false)

Allow ftp to read and write files in the user home directories

Module: git

Layer: contrib

git_cgi_enable_homedirs (Default: false)

Determine whether Git CGI can search home directories.

Module: git

Layer: contrib

git_cgi_use_cifs (Default: false)

Determine whether Git CGI can access cifs file systems.

Module: git

Layer: contrib

git_cgi_use_nfs (Default: false)

Determine whether Git CGI can access nfs file systems.

Module: git

Layer: contrib

git_session_send_syslog_msg (Default: false)

Determine whether Git session daemons can send syslog messages.

Module: git

Layer: contrib

git_session_users (Default: false)

Determine whether calling user domains can execute Git daemon in the git_session_t domain.

Module: git

Layer: contrib

git_system_enable_homedirs (Default: false)

Determine whether Git system daemon can search home directories.

Module: git

Layer: contrib

git_system_use_cifs (Default: false)

Determine whether Git system daemon can access cifs file systems.

Module: git

Layer: contrib

git_system_use_nfs (Default: false)

Determine whether Git system daemon can access nfs file systems.

Global
global_ssp (Default: false)

Enable reading of urandom for all domains.

This should be enabled when all programs are compiled with ProPolice/SSP stack smashing protection. All domains will be allowed to read from /dev/urandom.

Module: gpg

Layer: contrib

gpg_agent_env_file (Default: false)

Allow usage of the gpg-agent --write-env-file option. This also allows gpg-agent to manage user files.

Module: apache

Layer: contrib

httpd_builtin_scripting (Default: false)

Allow httpd to use built in scripting (usually php)

Module: apache

Layer: contrib

httpd_can_network_connect (Default: false)

Allow HTTPD scripts and modules to connect to the network using TCP.

Module: apache

Layer: contrib

httpd_can_network_connect_db (Default: false)

Allow HTTPD scripts and modules to connect to databases over the network.

Module: apache

Layer: contrib

httpd_can_network_relay (Default: false)

Allow httpd to act as a relay

Module: apache

Layer: contrib

httpd_can_sendmail (Default: false)

Allow http daemon to send mail

Module: apache

Layer: contrib

httpd_dbus_avahi (Default: false)

Allow Apache to communicate with avahi service via dbus

Module: apache

Layer: contrib

httpd_enable_cgi (Default: false)

Allow httpd cgi support

Module: apache

Layer: contrib

httpd_enable_ftp_server (Default: false)

Allow httpd to act as a FTP server by listening on the ftp port.

Module: apache

Layer: contrib

httpd_enable_homedirs (Default: false)

Allow httpd to read home directories

Module: apache

Layer: contrib

httpd_setrlimit (Default: false)

Allow httpd daemon to change its resource limits

Module: apache

Layer: contrib

httpd_ssi_exec (Default: false)

Allow HTTPD to run SSI executables in the same domain as system CGI scripts.

Module: apache

Layer: contrib

httpd_tty_comm (Default: false)

Unify HTTPD to communicate with the terminal. Needed for entering the passphrase for certificates at the terminal.

Module: apache

Layer: contrib

httpd_unified (Default: false)

Unify HTTPD handling of all content files.

Module: apache

Layer: contrib

httpd_use_cifs (Default: false)

Allow httpd to access cifs file systems

Module: apache

Layer: contrib

httpd_use_gpg (Default: false)

Allow httpd to run gpg

Module: apache

Layer: contrib

httpd_use_nfs (Default: false)

Allow httpd to access nfs file systems

Module: init

Layer: system

init_upstart (Default: false)

Enable support for upstart as the init program.

Global
mail_read_content (Default: false)

Allow email client to various content. nfs, samba, removable devices, and user temp files

Module: domain

Layer: kernel

mmap_low_allowed (Default: false)

Control the ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr.

Module: mozilla

Layer: contrib

mozilla_read_content (Default: false)

Allow confined web browsers to read home directory content

Module: mysql

Layer: contrib

mysql_connect_any (Default: false)

Allow mysqld to connect to all ports

Module: bind

Layer: contrib

named_write_master_zones (Default: false)

Allow BIND to write the master zone files. Generally this is used for dynamic DNS or zone transfers.

Global
nfs_export_all_ro (Default: false)

Allow any files/directories to be exported read/only via NFS.

Global
nfs_export_all_rw (Default: false)

Allow any files/directories to be exported read/write via NFS.

Module: openvpn

Layer: contrib

openvpn_enable_homedirs (Default: false)

Allow openvpn to read home directories

Module: portage

Layer: contrib

portage_use_nfs (Default: false)

Allow the portage domains to use NFS mounts (regular nfs_t)

Module: ppp

Layer: contrib

pppd_can_insmod (Default: false)

Allow pppd to load kernel modules for certain modems

Module: ppp

Layer: contrib

pppd_for_user (Default: false)

Allow pppd to be run for a regular user

Module: privoxy

Layer: contrib

privoxy_connect_any (Default: false)

Allow privoxy to connect to all ports, not just HTTP, FTP, and Gopher ports.

Module: puppet

Layer: contrib

puppet_manage_all_files (Default: false)

Allow Puppet client to manage all file types.

Module: qemu

Layer: contrib

qemu_full_network (Default: false)

Allow qemu to connect fully to the network

Module: qemu

Layer: contrib

qemu_use_cifs (Default: true)

Allow qemu to use cifs/Samba file systems

Module: qemu

Layer: contrib

qemu_use_comm (Default: false)

Allow qemu to use serial/parallel communication ports

Module: qemu

Layer: contrib

qemu_use_nfs (Default: true)

Allow qemu to use nfs file systems

Module: qemu

Layer: contrib

qemu_use_usb (Default: true)

Allow qemu to use usb devices

Module: ipsec

Layer: system

racoon_read_shadow (Default: false)

Allow racoon to read shadow

Module: rgmanager

Layer: contrib

rgmanager_can_network_connect (Default: false)

Allow rgmanager domain to connect to the network using TCP.

Module: rsync

Layer: contrib

rsync_export_all_ro (Default: false)

Allow rsync to export any files/directories read only.

Module: samba

Layer: contrib

samba_create_home_dirs (Default: false)

Allow samba to create new home directories (e.g. via PAM)

Module: samba

Layer: contrib

samba_domain_controller (Default: false)

Allow samba to act as the domain controller, add users, groups and change passwords.

Module: samba

Layer: contrib

samba_enable_home_dirs (Default: false)

Allow samba to share users home directories.

Module: samba

Layer: contrib

samba_export_all_ro (Default: false)

Allow samba to share any file/directory read only.

Module: samba

Layer: contrib

samba_export_all_rw (Default: false)

Allow samba to share any file/directory read/write.

Module: samba

Layer: contrib

samba_run_unconfined (Default: false)

Allow samba to run unconfined scripts

Module: samba

Layer: contrib

samba_share_fusefs (Default: false)

Allow samba to export ntfs/fusefs volumes.

Module: samba

Layer: contrib

samba_share_nfs (Default: false)

Allow samba to export NFS volumes.

Module: sanlock

Layer: contrib

sanlock_use_nfs (Default: false)

Allow confined virtual guests to manage nfs files

Module: sanlock

Layer: contrib

sanlock_use_samba (Default: false)

Allow confined virtual guests to manage cifs files

Module: postgresql

Layer: services

sepgsql_enable_users_ddl (Default: true)

Allow unprived users to execute DDL statement

Module: postgresql

Layer: services

sepgsql_transmit_client_label (Default: false)

Allow transmit client label to foreign database

Module: postgresql

Layer: services

sepgsql_unconfined_dbadm (Default: true)

Allow database admins to execute DML statement

Module: ftp

Layer: contrib

sftpd_anon_write (Default: false)

Allow anon internal-sftp to upload files, used for public file transfer services. Directories must be labeled public_content_rw_t.

Module: ftp

Layer: contrib

sftpd_enable_homedirs (Default: false)

Allow sftp-internal to read and write files in the user home directories

Module: ftp

Layer: contrib

sftpd_full_access (Default: false)

Allow sftp-internal to login to local users and read/write all files on the system, governed by DAC.

Module: smartmon

Layer: contrib

smartmon_3ware (Default: false)

Enable additional permissions needed to support devices on 3ware controllers.

Module: spamassassin

Layer: contrib

spamassassin_can_network (Default: false)

Allow user spamassassin clients to use the network.

Module: spamassassin

Layer: contrib

spamd_enable_home_dirs (Default: true)

Allow spamd to read/write user home directories.

Module: squid

Layer: contrib

squid_connect_any (Default: false)

Allow squid to connect to all ports, not just HTTP, FTP, and Gopher ports.

Module: squid

Layer: contrib

squid_use_tproxy (Default: false)

Allow squid to run as a transparent proxy (TPROXY)

Module: ssh

Layer: services

ssh_sysadm_login (Default: false)

Allow ssh logins as sysadm_r:sysadm_t

Module: telepathy

Layer: contrib

telepathy_connect_all_ports (Default: false)

Allow the Telepathy connection managers to connect to any network port.

Module: telepathy

Layer: contrib

telepathy_tcp_connect_generic_network_ports (Default: false)

Allow the Telepathy connection managers to connect to any generic TCP port.

Module: tftp

Layer: contrib

tftp_anon_write (Default: false)

Allow tftp to modify public files used for public file transfer services.

Module: tor

Layer: contrib

tor_bind_all_unreserved_ports (Default: false)

Allow tor daemon to bind tcp sockets to all unreserved ports.

Module: lpd

Layer: contrib

use_lpd_server (Default: false)

Use lpd server instead of cups

Global
use_nfs_home_dirs (Default: false)

Support NFS home directories

Global
use_samba_home_dirs (Default: false)

Support SAMBA home directories

Module: userdomain

Layer: system

user_direct_mouse (Default: false)

Allow regular users direct mouse access

Module: userdomain

Layer: system

user_dmesg (Default: false)

Allow users to read system messages.

Module: netutils

Layer: admin

user_ping (Default: false)

Control users use of ping and traceroute

Module: userdomain

Layer: system

user_rw_noexattrfile (Default: false)

Allow user to r/w files on filesystems that do not have extended attributes (FAT, CDROM, FLOPPY)

Global
user_tcp_server (Default: false)

Allow users to run TCP servers (bind to ports and accept connection from the same domain and outside users) disabling this forces FTP passive mode and may change other protocols.

Module: userdomain

Layer: system

user_ttyfile_stat (Default: false)

Allow w to display everyone

Module: varnishd

Layer: contrib

varnishd_connect_any (Default: false)

Allow varnishd to connect to all ports, not just HTTP.

Module: vbetool

Layer: contrib

vbetool_mmap_zero_ignore (Default: false)

Ignore vbetool mmap_zero errors.

Module: virt

Layer: contrib

virt_use_comm (Default: false)

Allow virt to use serial/parallell communication ports

Module: virt

Layer: contrib

virt_use_fusefs (Default: false)

Allow virt to read fuse files

Module: virt

Layer: contrib

virt_use_nfs (Default: false)

Allow virt to manage nfs files

Module: virt

Layer: contrib

virt_use_samba (Default: false)

Allow virt to manage cifs files

Module: virt

Layer: contrib

virt_use_sysfs (Default: false)

Allow virt to manage device configuration, (pci)

Module: virt

Layer: contrib

virt_use_usb (Default: true)

Allow virt to use usb devices

Module: webadm

Layer: contrib

webadm_manage_user_files (Default: false)

Allow webadm to manage files in users home directories

Module: webadm

Layer: contrib

webadm_read_user_files (Default: false)

Allow webadm to read files in users home directories

Module: wine

Layer: contrib

wine_mmap_zero_ignore (Default: false)

Ignore wine mmap_zero errors.

Module: xserver

Layer: services

xdm_sysadm_login (Default: false)

Allow xdm logins as sysadm

Module: xen

Layer: contrib

xen_use_nfs (Default: false)

Allow xen to manage nfs files

Module: xen

Layer: contrib

xend_run_blktap (Default: true)

Allow xend to run blktapctrl/tapdisk. Not required if using dedicated logical volumes for disk images.

Module: xen

Layer: contrib

xend_run_qemu (Default: true)

Allow xend to run qemu-dm. Not required if using paravirt and no vfb.

Module: xguest

Layer: contrib

xguest_connect_network (Default: true)

Allow xguest to configure Network Manager

Module: xguest

Layer: contrib

xguest_mount_media (Default: true)

Allow xguest users to mount removable media

Module: xguest

Layer: contrib

xguest_use_bluetooth (Default: true)

Allow xguest to use blue tooth devices

Module: xserver

Layer: services

xserver_object_manager (Default: false)

Support X userspace object manager